Antonio Nicolosi
Antonio Nicolosi
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
International Conference on the Theory and Applications of Cryptographic …, 2004
Verifying and enforcing network paths with ICING
J Naous, M Walfish, A Nicolosi, D Mazières, M Miller, A Seehra
Proceedings of the Seventh COnference on emerging Networking EXperiments and …, 2011
Non-interactive zero-knowledge from homomorphic encryption
I Damgård, N Fazio, A Nicolosi
Theory of Cryptography Conference, 41-59, 2006
Proactive Two-Party Signatures for User Authentication.
A Nicolosi, MN Krohn, Y Dodis, D Mazieres
NDSS, 2003
P2PCast: A peer-to-peer multicast scheme for streaming data
A Nicolosi, S Annapureddy
Proceedings of First IRIS Student Workshop August, 2003
The nebula future internet architecture
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
The Future Internet Assembly, 16-26, 2013
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
Efficient Private Techniques for Verifying Social Proximity.
MJ Freedman, A Nicolosi
IPTPS 5, 1, 2007
Cryptographic accumulators: Definitions, constructions and applications
N Fazio, A Nicolosi
Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002
A Policy Framework for the Future Internet.
A Seehra, J Naous, M Walfish, D Mazieres, A Nicolosi, S Shenker
Hotnets, 2009
Theory of cryptography
S Halevi, T Rabin
third theory of cryptography conference, TCC, 4-7, 2006
A brief overview of the NEBULA future internet architecture
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
ACM SIGCOMM Computer Communication Review 44 (3), 81-86, 2014
Nebula-a future internet that supports trustworthy cloud computing
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
Traitor tracing with optimal transmission rate
N Fazio, A Nicolosi, DH Phan
International Conference on Information Security, 71-88, 2007
HBN: An HB-like protocol secure against man-in-the-middle attacks.
C Bosley, K Haralambiev, A Nicolosi
IACR Cryptol. ePrint Arch. 2011, 350, 2011
Secure acknowledgment of multicast messages in open peer-to-peer networks
A Nicolosi, D Mazieres
International Workshop on Peer-to-Peer Systems, 259-268, 2004
Broadcast steganography
N Fazio, AR Nicolosi, IM Perera
Cryptographers’ Track at the RSA Conference, 64-84, 2014
Efficient bounded distance decoders for Barnes-Wall lattices
D Micciancio, A Nicolosi
2008 IEEE International Symposium on Information Theory, 2484-2488, 2008
Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings
D Catalano, N Fazio, R Gennaro, A Nicolosi
Springer Science & Business Media, 2011
A poroplastic model for hygro-chemo-mechanical damage of concrete
M Cuomo, A Nicolosi
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20