default search action
Alfredo De Santis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j125]Roberto De Prisco, Alfredo De Santis, Francesco Palmieri:
Bounds and Protocols for Graph-Based Distributed Secret Sharing. IEEE Trans. Dependable Secur. Comput. 21(1): 434-448 (2024) - [j124]Alfredo De Santis, Anna Lisa Ferrara, Manuela Flores, Barbara Masucci:
Provably-Secure One-Message Unilateral Entity Authentication Schemes. IEEE Trans. Dependable Secur. Comput. 21(4): 1665-1679 (2024) - [j123]Roberto Bruno, Roberto De Prisco, Alfredo De Santis, Ugo Vaccaro:
Bounds and Algorithms for Alphabetic Codes and Binary Search Trees. IEEE Trans. Inf. Theory 70(10): 6974-6988 (2024) - 2023
- [j122]Roberto De Prisco, Alfredo De Santis, Delfina Malandrino, Rocco Zaccagnino:
An improved privacy attack on smartphones exploiting the accelerometer. J. Inf. Secur. Appl. 75: 103479 (2023) - [j121]Roberto De Prisco, Alfredo De Santis, Francesco Palmieri:
Improved Protocols for Distributed Secret Sharing. IEEE Trans. Dependable Secur. Comput. 20(5): 3558-3571 (2023) - 2022
- [j120]Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis, Francesco Palmieri, Raffaele Pizzolante:
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments. ACM Trans. Internet Techn. 22(2): 32:1-32:21 (2022) - 2021
- [j119]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
Secret sharing schemes for infinite sets of participants: A new design technique. Theor. Comput. Sci. 859: 149-161 (2021) - 2020
- [j118]Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis, Francesco Palmieri, Raffaele Pizzolante:
Compression-based steganography. Concurr. Comput. Pract. Exp. 32(8) (2020) - [j117]Roberto De Prisco, Alfredo De Santis, Pompeo Faruolo, Marco Mannetta:
Design of an outdoor position certification authority. Int. J. Embed. Syst. 12(4): 404-413 (2020) - [j116]Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis, Francesco Palmieri, Raffaele Pizzolante, Xiaofei Xing:
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices. Inf. Sci. 508: 393-404 (2020) - [j115]Christian Esposito, Massimo Ficco, Aniello Castiglione, Francesco Palmieri, Alfredo De Santis:
Distributed Group Key Management for Event Notification Confidentiality Among Sensors. IEEE Trans. Dependable Secur. Comput. 17(3): 566-580 (2020) - 2019
- [j114]Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis, Francesco Palmieri, Raffaele Pizzolante:
One-pass lossless data hiding and compression of remote sensing data. Future Gener. Comput. Syst. 90: 222-239 (2019) - [j113]Ugo Fiore, Alfredo De Santis, Francesca Perla, Paolo Zanetti, Francesco Palmieri:
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Inf. Sci. 479: 448-455 (2019) - [j112]Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis, Gianluca Roscigno:
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud. IEEE Trans. Big Data 5(4): 425-438 (2019) - 2018
- [j111]Christian Esposito, Alfredo De Santis, Genny Tortora, Henry Chang, Kim-Kwang Raymond Choo:
Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? IEEE Cloud Comput. 5(1): 31-37 (2018) - [j110]Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Francesco Palmieri, Aniello Castiglione:
On the protection of consumer genomic data in the Internet of Living Things. Comput. Secur. 74: 384-400 (2018) - [j109]Roberto De Prisco, Alfredo De Santis, Marco Mannetta:
Reducing costs in HSM-based data centers. J. High Speed Networks 24(4): 363-373 (2018) - [j108]Christian Esposito, Aniello Castiglione, Francesco Palmieri, Alfredo De Santis:
Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures. IEEE Trans. Ind. Informatics 14(8): 3669-3678 (2018) - 2017
- [j107]Arcangelo Castiglione, Raffaele Pizzolante, Christian Esposito, Alfredo De Santis, Francesco Palmieri, Aniello Castiglione:
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants. Future Gener. Comput. Syst. 67: 230-241 (2017) - [j106]Arcangelo Castiglione, Paolo D'Arco, Alfredo De Santis, Rosario Russo:
Secure group communication schemes for dynamic heterogeneous distributed computing. Future Gener. Comput. Syst. 74: 313-324 (2017) - [j105]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Xinyi Huang, Aniello Castiglione:
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme. Inf. Sci. 387: 56-74 (2017) - [j104]Ilsun You, Gabriele Lenzini, Alfredo De Santis:
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Syst. J. 11(2): 371-372 (2017) - [j103]Arcangelo Castiglione, Raffaele Pizzolante, Francesco Palmieri, Barbara Masucci, Bruno Carpentieri, Alfredo De Santis, Aniello Castiglione:
On-Board Format-Independent Security of Functional Magnetic Resonance Images. ACM Trans. Embed. Comput. Syst. 16(2): 56:1-56:15 (2017) - [j102]Ugo Fiore, Aniello Castiglione, Alfredo De Santis, Francesco Palmieri:
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices. IEEE Trans. Sustain. Comput. 2(2): 90-99 (2017) - 2016
- [j101]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci:
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes. IEEE Trans. Dependable Secur. Comput. 13(4): 451-460 (2016) - [j100]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Jin Li, Xinyi Huang:
Hierarchical and Shared Access Control. IEEE Trans. Inf. Forensics Secur. 11(4): 850-865 (2016) - [j99]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Xinyi Huang:
Cryptographic Hierarchical Access Control for Dynamic Structures. IEEE Trans. Inf. Forensics Secur. 11(10): 2349-2364 (2016) - 2015
- [j98]Arcangelo Castiglione, Raffaele Pizzolante, Alfredo De Santis, Bruno Carpentieri, Aniello Castiglione, Francesco Palmieri:
Cloud-based adaptive compression and secure management services for 3D healthcare data. Future Gener. Comput. Syst. 43-44: 120-134 (2015) - [j97]Arcangelo Castiglione, Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Alfredo De Santis:
Modeling energy-efficient secure communications in multi-mode wireless mobile devices. J. Comput. Syst. Sci. 81(8): 1464-1478 (2015) - [j96]Arcangelo Castiglione, Raffaele Pizzolante, Francesco Palmieri, Alfredo De Santis, Bruno Carpentieri, Aniello Castiglione:
Secure and reliable data communication in developing regions and rural areas. Pervasive Mob. Comput. 24: 117-128 (2015) - [j95]Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo:
Using HTML5 to prevent detection of drive-by-download web malware. Secur. Commun. Networks 8(7): 1237-1255 (2015) - [j94]Paolo D'Arco, Alfredo De Santis:
Anonymous protocols: Notions and equivalence. Theor. Comput. Sci. 581: 9-25 (2015) - [j93]Giuliana Carullo, Aniello Castiglione, Alfredo De Santis, Francesco Palmieri:
A triadic closure and homophily-based recommendation system for online social networks. World Wide Web 18(6): 1579-1601 (2015) - 2014
- [j92]Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Alfredo De Santis:
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems. Int. J. Parallel Program. 42(5): 755-775 (2014) - [j91]Aniello Castiglione, Roberto De Prisco, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
A botnet-based command and control approach relying on swarm intelligence. J. Netw. Comput. Appl. 38: 22-33 (2014) - [j90]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
Measure-independent characterization of contrast optimal visual cryptography schemes. J. Syst. Softw. 95: 89-99 (2014) - [j89]Roberto De Prisco, Alfredo De Santis:
On the Relation of Random Grid and Deterministic Visual Cryptography. IEEE Trans. Inf. Forensics Secur. 9(4): 653-665 (2014) - 2013
- [j88]Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis:
Automated Production of Predetermined Digital Evidence. IEEE Access 1: 216-231 (2013) - [j87]Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Alfredo De Santis:
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines. Appl. Soft Comput. 13(1): 615-627 (2013) - [j86]Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Alfredo De Santis:
Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122: 13-23 (2013) - [j85]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
A note on time-bound hierarchical key assignment schemes. Inf. Process. Lett. 113(5-6): 151-155 (2013) - [j84]Alfredo De Santis, Aniello Castiglione, Ugo Fiore, Francesco Palmieri:
An intelligent security architecture for distributed firewalling environments. J. Ambient Intell. Humaniz. Comput. 4(2): 223-234 (2013) - [j83]Roberto De Prisco, Alfredo De Santis:
Color visual cryptography schemes for black and white secret images. Theor. Comput. Sci. 510: 62-86 (2013) - 2012
- [j82]Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
An asynchronous covert channel using spam. Comput. Math. Appl. 63(2): 437-447 (2012) - [j81]Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Alfredo De Santis, Pompeo Faruolo, Fabio Petagna, Umberto Ferraro Petrillo:
Engineering a secure mobile messaging framework. Comput. Secur. 31(6): 771-781 (2012) - [j80]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. J. Cryptol. 25(2): 243-270 (2012) - 2011
- [j79]Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis, Francesco Palmieri:
Hiding Information into OOXML Documents: New Steganographic Perspectives. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(4): 59-83 (2011) - [j78]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Efficient provably-secure hierarchical key assignment schemes. Theor. Comput. Sci. 412(41): 5684-5699 (2011) - [j77]Paolo D'Arco, Alfredo De Santis:
On Ultralightweight RFID Authentication Protocols. IEEE Trans. Dependable Secur. Comput. 8(4): 548-563 (2011) - 2010
- [j76]Roberto De Prisco, Alfredo De Santis:
Cheating Immune Threshold Visual Secret Sharing. Comput. J. 53(9): 1485-1496 (2010) - [j75]Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Managing key hierarchies for access control enforcement: Heuristic approaches. Comput. Secur. 29(5): 533-547 (2010) - [j74]Aniello Castiglione, Alfredo De Santis, Claudio Soriente:
Security and privacy issues in the Portable Document Format. J. Syst. Softw. 83(10): 1813-1822 (2010) - [j73]Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Variations on a theme by Akl and Taylor: Security and tradeoffs. Theor. Comput. Sci. 411(1): 213-227 (2010) - 2008
- [j72]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
An attack on a payment scheme. Inf. Sci. 178(5): 1418-1421 (2008) - [j71]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, Moti Yung:
On Monotone Formula Composition of Perfect Zero-Knowledge Languages. SIAM J. Comput. 38(4): 1300-1329 (2008) - [j70]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
New constructions for provably-secure time-bound hierarchical key assignment schemes. Theor. Comput. Sci. 407(1-3): 213-230 (2008) - [j69]Giuseppe Cattaneo, Alfredo De Santis, Umberto Ferraro Petrillo:
Visualization of cryptographic protocols with GRACE. J. Vis. Lang. Comput. 19(2): 258-290 (2008) - 2007
- [j68]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
On Unconditionally Secure Distributed Oblivious Transfer. J. Cryptol. 20(3): 323-373 (2007) - [j67]Alfredo De Santis, Barbara Masucci:
New results on non-perfect sharing of multiple secrets. J. Syst. Softw. 80(2): 216-223 (2007) - [j66]Aniello Castiglione, Alfredo De Santis, Claudio Soriente:
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata. J. Syst. Softw. 80(5): 750-764 (2007) - [j65]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1-3): 261-276 (2007) - 2006
- [j64]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Probabilistic Visual Cryptography Schemes. Comput. J. 49(1): 97-107 (2006) - [j63]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Unconditionally secure key assignment schemes. Discret. Appl. Math. 154(2): 234-252 (2006) - [j62]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Enforcing the security of a time-bound hierarchical key assignment scheme. Inf. Sci. 176(12): 1684-1694 (2006) - [j61]Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual cryptography schemes with optimal pixel expansion. Theor. Comput. Sci. 369(1-3): 169-182 (2006) - [j60]Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri:
Neural Network Techniques for Proactive Password Checking. IEEE Trans. Dependable Secur. Comput. 3(4): 327-339 (2006) - [j59]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
On Self-Healing Key Distribution Schemes. IEEE Trans. Inf. Theory 52(12): 5455-5467 (2006) - 2005
- [j58]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Optimal Colored Threshold Visual Cryptography Schemes. Des. Codes Cryptogr. 35(3): 311-335 (2005) - [j57]Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4): 199-206 (2005) - [j56]Stelvio Cimato, Alfredo De Santis, Umberto Ferraro Petrillo:
Overcoming the obfuscation of Java programs by identifier renaming. J. Syst. Softw. 78(1): 60-72 (2005) - [j55]Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Ljupco Kocarev:
Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 52-I(7): 1382-1393 (2005) - 2004
- [j54]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo:
Design of Self-Healing Key Distribution Schemes. Des. Codes Cryptogr. 32(1-3): 15-44 (2004) - [j53]Alfredo De Santis, Barbara Masucci:
Anonymous Membership Broadcast Schemes. Des. Codes Cryptogr. 32(1-3): 135-151 (2004) - [j52]Francis Y. L. Chin, Alfredo De Santis, Anna Lisa Ferrara, Ngai Lam Ho, S. K. Kim:
A simple algorithm for the constrained sequence problems. Inf. Process. Lett. 90(4): 175-179 (2004) - [j51]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Cryptographic key assignment schemes for any access control policy. Inf. Process. Lett. 92(4): 199-205 (2004) - [j50]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
HYPPOCRATES: a new proactive password checker. J. Syst. Softw. 71(1-2): 163-175 (2004) - [j49]Alfredo De Santis, Claudio Soriente:
A blocker-proof conditional access system. IEEE Trans. Consumer Electron. 50(2): 591-596 (2004) - [j48]Annalisa De Bonis, Alfredo De Santis:
Randomness in secret sharing and visual cryptography schemes. Theor. Comput. Sci. 314(3): 351-374 (2004) - 2003
- [j47]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
Contrast Optimal Threshold Visual Cryptography Schemes. SIAM J. Discret. Math. 16(2): 224-261 (2003) - 2001
- [j46]Carlo Blundo, Annalisa De Bonis, Alfredo De Santis:
Improved Schemes for Visual Cryptography. Des. Codes Cryptogr. 24(3): 255-278 (2001) - [j45]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
A t-private k-database information retrieval scheme. Int. J. Inf. Sec. 1(1): 64-68 (2001) - [j44]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1-2): 143-161 (2001) - [j43]Alfredo De Santis, Antonio Giorgio Gaggia, Ugo Vaccaro:
Bounds on entropy in a guessing game. IEEE Trans. Inf. Theory 47(1): 468-473 (2001) - 2000
- [j42]Alfredo De Santis, Barbara Masucci:
On secret set schemes. Inf. Process. Lett. 74(5-6): 243-251 (2000) - [j41]Carlo Blundo, Alfredo De Santis, Moni Naor:
Visual cryptography for grey level images. Inf. Process. Lett. 75(6): 255-259 (2000) - 1999
- [j40]Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro:
Randomness Complexity of Private Computation. Comput. Complex. 8(2): 145-168 (1999) - [j39]Alfredo De Santis, Giovanni Di Crescenzo, Oded Goldreich, Giuseppe Persiano:
The Graph Clustering Problem has a Perfect Zero-Knowledge Interactive Proof. Inf. Process. Lett. 69(4): 201-206 (1999) - [j38]Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia:
Probability of Shares in Secret Sharing Schemes. Inf. Process. Lett. 72(5-6): 169-175 (1999) - [j37]Alfredo De Santis, Barbara Masucci:
A Lower Bound on the Encoding Length in Lossy Transmission. Inf. Sci. 116(2-4): 129-146 (1999) - [j36]Carlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata:
On a Fallacious Bound for Authentication Codes. J. Cryptol. 12(3): 155-159 (1999) - [j35]Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
On the Contrast in Visual Cryptography Schemes. J. Cryptol. 12(4): 261-289 (1999) - [j34]Alfredo De Santis, Barbara Masucci:
Multiple ramp schemes. IEEE Trans. Inf. Theory 45(5): 1720-1728 (1999) - 1998
- [j33]Carlo Blundo, Alfredo De Santis:
Visual cryptography schemes with perfect reconstruction of black pixels. Comput. Graph. 22(4): 449-455 (1998) - [j32]Roberto De Prisco, Alfredo De Santis:
On the Data Expansion of the Huffman Compression Algorithm. Comput. J. 41(3): 137-144 (1998) - [j31]Roberto De Prisco, Alfredo De Santis:
On Lower Bounds for the Redundancy of Optimal Codes. Des. Codes Cryptogr. 15(1): 29-45 (1998) - [j30]Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung:
Perfectly Secure Key Distribution for Dynamic Conferences. Inf. Comput. 146(1): 1-23 (1998) - [j29]Carlo Blundo, Alfredo De Santis, Ugo Vaccaro:
On Secret Sharing Schemes. Inf. Process. Lett. 65(1): 25-32 (1998) - 1997
- [j28]Roberto De Prisco, Alfredo De Santis:
Catastrophic Faults in Reconfigurable Systolic Linear Arrays. Discret. Appl. Math. 75(2): 105-123 (1997) - [j27]Carlo Blundo, Alfredo De Santis, Roberto de Simone, Ugo Vaccaro:
Tight Bounds on the Information Rate of Secret Sharing Schemes. Des. Codes Cryptogr. 11(2): 107-122 (1997) - [j26]Alfredo De Santis, Giuseppe Persiano:
Guest editorial. Eur. Trans. Telecommun. 8(5): 443 (1997) - [j25]Carlo Blundo, Alfredo De Santis:
Lower Bounds for Robust Secret Sharing Schemes. Inf. Process. Lett. 63(6): 317-321 (1997) - [j24]Roberto De Prisco, Alfredo De Santis:
A new bound for the data expansion of Huffman codes. IEEE Trans. Inf. Theory 43(6): 2028-2032 (1997) - 1996
- [j23]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Visual Cryptography for General Access Structures. Inf. Comput. 129(2): 86-106 (1996) - [j22]Carlo Blundo, Alfredo De Santis, Ugo Vaccaro:
Randomness in Distribution Protocols. Inf. Comput. 131(2): 111-139 (1996) - [j21]Roberto De Prisco, Alfredo De Santis:
On the Redundancy Achieved by Huffman Codes. Inf. Sci. 88(1-4): 131-148 (1996) - [j20]Alfredo De Santis, Giuseppe Persiano:
The Power of Preprocessing in Zero-Knowledge Proofs of Knowledge. J. Cryptol. 9(3): 129-148 (1996) - [j19]Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro:
On the Information Rate of Secret Sharing Schemes. Theor. Comput. Sci. 154(2): 283-306 (1996) - [j18]Roberto De Prisco, Alfredo De Santis:
New Lower Bounds on the Cost of Binary Search Trees. Theor. Comput. Sci. 156(1&2): 315-325 (1996) - [j17]Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro:
Fully Dynamic Secret Sharing Schemes. Theor. Comput. Sci. 165(2): 407-440 (1996) - 1995
- [j16]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
Zero-Knowledge Arguments and Public-Key Cryptography. Inf. Comput. 121(1): 23-40 (1995) - [j15]Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro:
Graph Decompositions and Secret Sharing Schemes. J. Cryptol. 8(1): 39-64 (1995) - [j14]Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia, Ugo Vaccaro:
New bounds on the information rate of secret sharing schemes. IEEE Trans. Inf. Theory 41(2): 549-554 (1995) - 1994
- [j13]Alfredo De Santis, Giuseppe Persiano:
Tight Upper and Lower Bounds on the Path Length of Binary Trees. SIAM J. Comput. 23(1): 12-23 (1994) - [j12]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
The Knowledge Complexity of Quadratic Residuosity Languages. Theor. Comput. Sci. 132(2): 291-317 (1994) - [j11]Renato M. Capocelli, Alfredo De Santis, Giuseppe Persiano:
Binary prefix codes ending in a "1". IEEE Trans. Inf. Theory 40(4): 1296-1302 (1994) - 1993
- [j10]Roberto De Prisco, Alfredo De Santis:
On Binary Search Trees. Inf. Process. Lett. 45(5): 249-253 (1993) - [j9]Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro:
On the Size of Shares for Secret Sharing Schemes. J. Cryptol. 6(3): 157-167 (1993) - 1992
- [j8]Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro:
On the construction of statistically synchronizable codes. IEEE Trans. Inf. Theory 38(2): 407-414 (1992) - [j7]Renato M. Capocelli, Alfredo De Santis:
On the redundancy of optimal codes with limited word length. IEEE Trans. Inf. Theory 38(2): 439-445 (1992) - 1991
- [j6]Manuel Blum, Alfredo De Santis, Silvio Micali, Giuseppe Persiano:
Noninteractive Zero-Knowledge. SIAM J. Comput. 20(6): 1084-1118 (1991) - [j5]Renato M. Capocelli, Alfredo De Santis:
A note on D-ary Huffman codes. IEEE Trans. Inf. Theory 37(1): 174-179 (1991) - [j4]Renato M. Capocelli, Alfredo De Santis:
New bounds on the redundancy of Huffman codes. IEEE Trans. Inf. Theory 37(4): 1095-1104 (1991) - 1989
- [j3]Renato M. Capocelli, Alfredo De Santis:
Tight upper bounds on the redundancy of Huffman codes. IEEE Trans. Inf. Theory 35(5): 1084-1091 (1989) - 1988
- [j2]Renato M. Capocelli, Alfredo De Santis, Inder Jeet Taneja:
Bounds on the entropy series. IEEE Trans. Inf. Theory 34(1): 134-138 (1988) - 1986
- [j1]Renato M. Capocelli, Alfredo De Santis:
Regular universal codeword sets. IEEE Trans. Inf. Theory 32(1): 129-133 (1986)
Conference and Workshop Papers
- 2024
- [c111]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci, Giorgio Venditti:
An Information-Theoretic Approach to Anonymous Access Control. ISIT 2024: 3326-3331 - [c110]Roberta Cimorelli Belfiore, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Hierarchical Key Assignment Schemes with Key Rotation. SACMAT 2024 - 2023
- [c109]Alfredo De Santis, Barbara Masucci:
New Results on Distributed Secret Sharing Protocols. DBSec 2023: 51-68 - 2021
- [c108]Roberto De Prisco, Alfredo De Santis, Rocco Zaccagnino:
An Accelerometer-based Privacy Attack on Smartphones. ITASEC 2021: 193-206 - 2018
- [c107]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes. CSS 2018: 157-167 - [c106]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis, Angel L. Pérez del Pozo, Ugo Vaccaro:
Probabilistic Secret Sharing. MFCS 2018: 64:1-64:16 - [c105]Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis, Francesco Palmieri, Raffaele Pizzolante:
Data hiding using compressed archives. RACS 2018: 136-142 - 2017
- [c104]Alfredo De Santis, Manuela Flores, Barbara Masucci:
One-Message Unilateral Entity Authentication Schemes. ARES 2017: 25:1-25:6 - [c103]Roberto De Prisco, Alfredo De Santis, Marco Mannetta:
Reducing Costs in HSM-Based Data Centers. GPC 2017: 3-14 - 2016
- [c102]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione:
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures. ACISP (2) 2016: 37-54 - [c101]Antonio Colella, Aniello Castiglione, Alfredo De Santis, Christian Esposito, Francesco Palmieri:
Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks. NBiS 2016: 70-75 - 2015
- [c100]Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Francesco Palmieri, Aniello Castiglione:
Format-Independent Protection of DNA Microarray Images. 3PGCIC 2015: 351-357 - [c99]Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Aniello Castiglione:
Reversible Copyright Protection for DNA Microarray Images. 3PGCIC 2015: 707-712 - [c98]Arcangelo Castiglione, Alfredo De Santis, Raffaele Pizzolante, Aniello Castiglione, Vincenzo Loia, Francesco Palmieri:
On the Protection of fMRI Images in Multi-domain Environments. AINA 2015: 476-481 - [c97]Aniello Castiglione, Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Raffaele Pizzolante:
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence. MIST@CCS 2015: 29-39 - [c96]Luigi Di Biasi, Roberto Fino, Rosaura Parisi, Lucia Sessa, Giuseppe Cattaneo, Alfredo De Santis, Pio Iannelli, Stefano Piotto:
Novel Algorithm for Efficient Distribution of Molecular Docking Calculations. WIVACE 2015: 65-74 - [c95]Lucia Sessa, Luigi Di Biasi, Simona Concilio, Giuseppe Cattaneo, Alfredo De Santis, Pio Iannelli, Stefano Piotto:
A New Flexible Protocol for Docking Studies. WIVACE 2015: 117-126 - 2014
- [c94]Arcangelo Castiglione, Alfredo De Santis, Aniello Castiglione, Francesco Palmieri:
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update. AINA 2014: 351-358 - [c93]Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Vincenzo Loia, Alfredo De Santis:
Multimedia-based battery drain attacks for Android devices. CCNC 2014: 145-150 - [c92]Arcangelo Castiglione, Raffaele Pizzolante, Bruno Carpentieri, Alfredo De Santis:
An Efficient Protocol for Reliable Data Communication on Dataless Devices. IMIS 2014: 517-522 - [c91]Giuliana Carullo, Aniello Castiglione, Alfredo De Santis:
Friendship Recommendations in Online Social Networks. INCoS 2014: 42-48 - [c90]Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Aniello Castiglione:
Protection of Microscopy Images through Digital Watermarking Techniques. INCoS 2014: 65-72 - [c89]Arcangelo Castiglione, Raffaele Pizzolante, Alfredo De Santis, Ciriaco D'Ambrosio:
A Collaborative Decision-Support System for Secure Analysis of Cranial Disorders. INCoS 2014: 189-196 - [c88]Antonio Colella, Aniello Castiglione, Alfredo De Santis:
The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach. INCoS 2014: 350-355 - [c87]Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis:
Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images. NBiS 2014: 91-98 - [c86]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci:
Hierarchical and Shared Key Assignment. NBiS 2014: 263-270 - [c85]Ugo Fiore, Aniello Castiglione, Alfredo De Santis, Francesco Palmieri:
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome. NBiS 2014: 355-360 - 2013
- [c84]Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis:
Analyzing the Internet Stability in Presence of Disasters. CD-ARES Workshops 2013: 253-268 - [c83]Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Francesco Palmieri:
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness. CD-ARES Workshops 2013: 414-429 - [c82]Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis:
Forensically-Sound Methods to Collect Live Network Evidence. AINA 2013: 405-412 - [c81]Giuliana Carullo, Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment. AINA 2013: 1113-1120 - [c80]Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes. ICITS 2013: 39-55 - [c79]Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Aniello Castiglione, Francesco Palmieri:
On Secure Data Management in Health-Care Environment. IMIS 2013: 666-671 - [c78]Arcangelo Castiglione, Alfredo De Santis, Aniello Castiglione, Francesco Palmieri, Ugo Fiore:
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications. INCoS 2013: 157-165 - [c77]Paolo D'Arco, Alfredo De Santis:
Key privacy and anonymous protocols. PST 2013: 11-18 - 2012
- [c76]Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, Kangbin Yim:
How to Forge a Digital Alibi on Mac OS X. CD-ARES 2012: 430-444 - [c75]Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis, Gerardo Costabile, Mattia Epifani:
The Forensic Analysis of a False Digital Alibi. IMIS 2012: 114-121 - [c74]Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
Device Tracking in Private Networks via NAPT Log Analysis. IMIS 2012: 603-608 - 2011
- [c73]Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis, Francesco Palmieri:
New Steganographic Techniques for the OOXML File Format. ARES 2011: 344-358 - [c72]Alfredo De Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Mario Ianulardo:
Automated Construction of a False Digital Alibi. ARES 2011: 359-373 - [c71]Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis:
Steganography and Secure Communication on Online Social Networks and Online Photo Sharing. BWCCA 2011: 363-368 - [c70]Pietro Albano, Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis:
A Novel Anti-forensics Technique for the Android OS. BWCCA 2011: 380-385 - [c69]Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis:
Automatic, Selective and Secure Deletion of Digital Evidence. BWCCA 2011: 392-398 - [c68]Roberto De Prisco, Alfredo De Santis:
Using Colors to Improve Visual Cryptography for Black and White Images. ICITS 2011: 182-201 - [c67]Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
E-mail-Based Covert Channels for Asynchronous Message Steganography. IMIS 2011: 503-508 - [c66]Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis:
A Forensic Analysis of Images on Online Social Networks. INCoS 2011: 679-684 - [c65]Pietro Albano, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis:
On the Construction of a False Digital Alibi on the Android OS. INCoS 2011: 685-690 - [c64]Aniello Castiglione, Alfredo De Santis, Francesco Palmieri:
Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis. INCoS 2011: 691-697 - [c63]Maurizio Cembalo, Alfredo De Santis, Umberto Ferraro Petrillo:
SAVI: a new system for advanced SQL visualization. SIGITE Conference 2011: 165-170 - 2010
- [c62]Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats. BWCCA 2010: 475-481 - [c61]Alfredo De Santis, Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Fabio Petagna, Umberto Ferraro Petrillo:
An Extensible Framework for Efficient Secure SMS. CISIS 2010: 843-850 - [c60]Aniello Castiglione, Marco Cepparulo, Alfredo De Santis, Francesco Palmieri:
Towards a Lawfully Secure and Privacy Preserving Video Surveillance System. EC-Web 2010: 73-84 - 2009
- [c59]Giuseppe Cattaneo, Alfredo De Santis, Umberto Ferraro Petrillo:
DISCERN: A collaborative visualization system for learning cryptographic protocols. CollaborateCom 2009: 1-8 - [c58]Aniello Castiglione, Roberto De Prisco, Alfredo De Santis:
Do You Trust Your Phone? EC-Web 2009: 50-61 - [c57]Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. MFCS 2009: 247-257 - [c56]Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. SEC 2009: 364-375 - 2008
- [c55]Paolo D'Arco, Alfredo De Santis:
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. AFRICACRYPT 2008: 27-39 - [c54]Luigi Catuogno, Alfredo De Santis:
An internet role-game for the laboratory of network security course. ITiCSE 2008: 240-244 - 2007
- [c53]Alfredo De Santis, Claudio Soriente:
Modified Original Smart Cards and Smart Card Clone Countermeasures. CIS 2007: 878-882 - [c52]Paolo D'Arco, Alfredo De Santis:
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation. ICITS 2007: 46-64 - [c51]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Efficient Provably-Secure Hierarchical Key Assignment Schemes. MFCS 2007: 371-382 - [c50]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
New constructions for provably-secure time-bound hierarchical key assignment schemes. SACMAT 2007: 133-138 - 2006
- [c49]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-secure time-bound hierarchical key assignment schemes. CCS 2006: 288-297 - [c48]Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis, Fabio Petagna, Umberto Ferraro Petrillo:
SPEECH: Secure Personal End-to-End Communication with Handheld. ISSE 2006: 287-297 - [c47]Roberto De Prisco, Alfredo De Santis:
Cheating Immune (2, n)-Threshold Visual Secret Sharing. SCN 2006: 216-228 - 2005
- [c46]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. WCC 2005: 202-217 - 2004
- [c45]Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
Definitions and Bounds for Self-Healing Key Distribution Schemes. ICALP 2004: 234-245 - [c44]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
On NC1 Boolean Circuit Composition of Non-interactive Perfect Zero-Knowledge. MFCS 2004: 356-367 - [c43]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Colored Visual Cryptography Without Color Darkening. SCN 2004: 235-248 - 2003
- [c42]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Contrast optimal colored visual cryptography schemes. ITW 2003: 139-142 - 2002
- [c41]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
A Novel Approach to Proactive Password Checking. InfraSec 2002: 30-39 - [c40]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
Randomness-Optimal Characterization of Two NP Proof Systems. RANDOM 2002: 179-193 - [c39]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson:
New Results on Unconditionally Secure Distributed Oblivious Transfer. Selected Areas in Cryptography 2002: 291-309 - 2001
- [c38]Alfredo De Santis, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, Amit Sahai:
Robust Non-interactive Zero Knowledge. CRYPTO 2001: 566-598 - [c37]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
Hyppocrates. ISC 2001: 63-80 - [c36]Annalisa De Bonis, Alfredo De Santis:
Secret Sharing and Visual Cryptography Schemes. SEC 2001: 123-138 - 2000
- [c35]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
Necessary and Sufficient Assumptions for Non-iterative Zero-Knowledge Proofs of Knowledge for All NP Relations. ICALP 2000: 451-462 - [c34]Annalisa De Bonis, Alfredo De Santis:
Randomness in Visual Cryptography. STACS 2000: 626-638 - 1999
- [c33]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
Non-Interactive Zero-Knowledge: A Low-Randomness Characterization of NP. ICALP 1999: 271-280 - 1998
- [c32]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
Communication-Efficient Anonymous Group Identification. CCS 1998: 73-82 - [c31]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, Moti Yung:
Image Density is Complete for Non-Interactive-SZK (Extended Abstract). ICALP 1998: 784-795 - 1997
- [c30]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
Randomness-Efficient Non-Interactive Zero-Knowledge (Extended Abstract). ICALP 1997: 716-726 - 1996
- [c29]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Constructions and Bounds for Visual Cryptography. ICALP 1996: 416-428 - 1995
- [c28]Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, Ugo Vaccaro:
On the Number of Random Bits in Totally Private Computation. ICALP 1995: 171-182 - 1994
- [c27]Alfredo De Santis, Tatsuaki Okamoto, Giuseppe Persiano:
Zero-Knowledge Proofs of Computational Power in the Shared String Model. ASIACRYPT 1994: 182-192 - [c26]Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro:
Multi-Secret Sharing Schemes. CRYPTO 1994: 150-163 - [c25]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, Moti Yung:
On Monotone Formula Closure of SZK. FOCS 1994: 454-465 - [c24]Carlo Blundo, Alfredo De Santis, Ugo Vaccaro:
Randomness in Distributed Protocols. ICALP 1994: 568-579 - [c23]Alfredo De Santis, Yvo Desmedt, Yair Frankel, Moti Yung:
How to share a function securely. STOC 1994: 522-533 - 1993
- [c22]Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
Secret Sharing and Perfect Zero Knowledge. CRYPTO 1993: 73-84 - [c21]Carlo Blundo, Antonella Cresti, Alfredo De Santis, Ugo Vaccaro:
Fully Dynamic Secret Sharing Schemes. CRYPTO 1993: 110-125 - [c20]Marco Carpentieri, Alfredo De Santis, Ugo Vaccaro:
Size of Shares and Probability of Cheating in Threshold Schemes. EUROCRYPT 1993: 118-125 - [c19]Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro:
Secret Sharing Schemes with Veto Capabilities. Algebraic Coding 1993: 82-89 - [c18]Carlo Blundo, Alfredo De Santis, Ugo Vaccaro:
Efficient Sharing of Many Secrets. STACS 1993: 692-703 - 1992
- [c17]Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro:
On the Information Rate of Secret Sharing Schemes (Extended Abstract). CRYPTO 1992: 148-167 - [c16]Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung:
Perfectly-Secure Key Distribution for Dynamic Conferences. CRYPTO 1992: 471-486 - [c15]Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, Ugo Vaccaro:
Graph Decompositions and Secret Sharing Schemes. EUROCRYPT 1992: 1-24 - [c14]Alfredo De Santis, Giuseppe Persiano:
Zero-Knowledge Proofs of Knowledge Without Interaction (Extended Abstract). FOCS 1992: 427-436 - [c13]Alfredo De Santis, Giuseppe Persiano, Moti Yung:
One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier. ICALP 1992: 28-40 - [c12]Alfredo De Santis, Giuseppe Persiano:
Communication Efficient Zero-Knowledge Proofs of Knowledge (With Applications to Electronic Cash). STACS 1992: 449-460 - 1991
- [c11]Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro:
On the Size of Shares for Secret Sharing Schemes. CRYPTO 1991: 101-113 - [c10]Alfredo De Santis, Giuseppe Persiano:
An Optimal Algorithm for the Construction of Optimal Prefix Codes with Given Fringe. Data Compression Conference 1991: 297-306 - [c9]Alfredo De Santis, Giuseppe Persiano:
Tight Bounds on the Path Length of Binary Trees. STACS 1991: 478-487 - 1990
- [c8]Alfredo De Santis, Moti Yung:
Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems. CRYPTO 1990: 366-377 - [c7]Renato M. Capocelli, Alfredo De Santis:
Minimum codeword length and redundancy of Huffman codes. EUROCODE 1990: 309-317 - [c6]Alfredo De Santis, Giuseppe Persiano:
Public-Randomness in Public Key Cryptography. EUROCRYPT 1990: 46-62 - [c5]Alfredo De Santis, Moti Yung:
On the Design of Provably Secure Cryptographic Hash Functions. EUROCRYPT 1990: 412-431 - 1988
- [c4]Alfredo De Santis, George Markowsky, Mark N. Wegman:
Learning Probabilistic Prediction Functions. COLT 1988: 312-328 - [c3]Alfredo De Santis, Silvio Micali, Giuseppe Persiano:
Non-Interactive Zero-Knowledge with Preprocessing. CRYPTO 1988: 269-282 - [c2]Alfredo De Santis, George Markowsky, Mark N. Wegman:
Learning Probabilistic Prediction Functions (Extended Abstract). FOCS 1988: 110-119 - 1987
- [c1]Alfredo De Santis, Silvio Micali, Giuseppe Persiano:
Non-Interactive Zero-Knowledge Proof Systems. CRYPTO 1987: 52-72
Editorship
- 2014
- [e3]Leonard Barolli, Fatos Xhafa, Makoto Takizawa, Tomoya Enokido, Aniello Castiglione, Alfredo De Santis:
17th International Conference on Network-Based Information Systems, NBiS 2014, Salerno, Italy, September 10-12, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4224-4 [contents] - 1997
- [e2]Bruno Carpentieri, Alfredo De Santis, Ugo Vaccaro, James A. Storer:
Compression and Complexity of SEQUENCES 1997, Positano, Amalfitan Coast, Salerno, Italy, June 11-13, 1997, Proceedings. IEEE 1997, ISBN 0-8186-8132-2 [contents] - 1995
- [e1]Alfredo De Santis:
Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings. Lecture Notes in Computer Science 950, Springer 1995, ISBN 3-540-60176-7 [contents]
Informal and Other Publications
- 2024
- [i16]Roberto Bruno, Roberto De Prisco, Alfredo De Santis, Ugo Vaccaro:
Bounds and Algorithms for Alphabetic Codes and Binary Search Trees. CoRR abs/2407.16443 (2024) - 2021
- [i15]Francis Yuk-Lun Chin, Ngai Lam Ho, Alfredo De Santis, S. K. Kim:
A Simple Algorithm for the Constrained Sequence Problems. CoRR abs/2103.02919 (2021) - 2015
- [i14]Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo:
Using HTML5 to Prevent Detection of Drive-by-Download Web Malware. CoRR abs/1507.03467 (2015) - 2014
- [i13]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci:
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2014: 752 (2014) - 2013
- [i12]Roberto De Prisco, Alfredo De Santis:
On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography. IACR Cryptol. ePrint Arch. 2013: 818 (2013) - 2012
- [i11]Alfredo De Santis, Moti Yung:
"Metaproofs" (and their Cryptographic Applications). IACR Cryptol. ePrint Arch. 2012: 495 (2012) - 2008
- [i10]Paolo D'Arco, Alfredo De Santis:
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2008: 470 (2008) - 2006
- [i9]Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual Cryptography Schemes with Optimal Pixel Expansion. IACR Cryptol. ePrint Arch. 2006: 170 (2006) - [i8]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2006: 225 (2006) - [i7]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Efficient Provably-Secure Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2006: 479 (2006) - [i6]Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2006: 483 (2006) - 2004
- [i5]Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Ljupco Kocarev:
Security of public key cryptosystems based on Chebyshev Polynomials. CoRR cs.CR/0411030 (2004) - 1998
- [i4]Alfredo De Santis, Giovanni Di Crescenzo, Oded Goldreich, Giuseppe Persiano:
The Graph Clustering Problem has a Perfect Zero-Knowledge Proof. Electron. Colloquium Comput. Complex. TR98 (1998) - [i3]Alfredo De Santis, Giovanni Di Crescenzo, Oded Goldreich, Giuseppe Persiano:
The Graph Clustering Problem has a Perfect Zero-Knowledge Proof. IACR Cryptol. ePrint Arch. 1998: 2 (1998) - 1996
- [i2]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Visual Cryptography for General Access Structures. Electron. Colloquium Comput. Complex. TR96 (1996) - [i1]Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
On the Contrast in Visual Cryptography Schemes. IACR Cryptol. ePrint Arch. 1996: 13 (1996)
Coauthor Index
aka: Douglas R. Stinson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 18:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint