-
1Academic Journal
المؤلفون: Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi
المصدر: IEEE Access, Vol 8, Pp 140497-140511 (2020)
مصطلحات موضوعية: Role mining, RBAC, constrained role mining, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
2
المؤلفون: Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
المصدر: Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031306167
-
3
المؤلفون: Stelvio Cimato, Luisa Siniscalchi, Carlo Blundo
المصدر: Blundo, C, Cimato, S & Siniscalchi, L 2022, ' Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints ', Computer Journal, vol. 65, no. 6, pp. 1386-1411 . https://doi.org/10.1093/comjnl/bxaa186
مصطلحات موضوعية: Theoretical computer science, RBAC, General Computer Science, Computer science, access control, heuristics, 02 engineering and technology, Permission, constrained role mining, 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Cardinality (SQL statements), Heuristics
-
4Electronic Resource
المؤلفون: Peter Scholl and Mark Simkin and Luisa Siniscalchi, Scholl, Peter, Simkin, Mark, Siniscalchi, Luisa
مصطلحات الفهرس: Multi-party computation, covert security, public verifiability, InProceedings, Text, doc-type:ResearchArticle, publishedVersion
URL:
https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2022.8
Is Part Of LIPIcs, Volume 230, 3rd Conference on Information-Theoretic Cryptography (ITC 2022) -
5
المؤلفون: STELVIO CIMATO, Carlo BLUNDO, Luisa Siniscalchi
المصدر: Blundo, C, Cimato, S & Siniscalchi, L 2023, ' Heuristics for constrained role mining in the post-processing framework ', Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 8, pp. 9925-9937 . https://doi.org/10.1007/s12652-021-03648-1
مصطلحات موضوعية: Access control, Constrained role mining, Heuristic, RBAC, General Computer Science
-
6
المؤلفون: Divesh Aggarwal, Maciej Obremski, Joao Ribeiro, Mark Simkin, Luisa Siniscalchi
المصدر: Aggarwal, D, Obremski, M, Ribeiro, J, Simkin, M & Siniscalchi, L 2022, ' Privacy Amplification with Tamperable Memory via Non-Malleable Two-Source Extractors ', IEEE Transactions on Information Theory, vol. 68, no. 8, pp. 5475-5495 . https://doi.org/10.1109/TIT.2022.3167404
مصطلحات موضوعية: randomness extractors, tamperable memory, Privacy amplification, Library and Information Sciences, non-malleability, Computer Science Applications, Information Systems
-
7
المؤلفون: Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi
المصدر: Theory of Cryptography ISBN: 9783031223648
مصطلحات موضوعية: NETWORK PROTOCOL, KNOWLEDGE ARGUMENT, ONE-WAY FUNCTION, ONE-WAY FUNCTION, KNOWLEDGE ARGUMENT, NETWORK PROTOCOL
-
8
المؤلفون: Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov
المصدر: Lecture Notes in Computer Science ISBN: 9783031147906
-
9
المؤلفون: Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Hendrik Waldner
المصدر: Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031069437
-
10
المؤلفون: Luisa Siniscalchi, Sophia Yakoubov, Divya Ravi, Ivan Damgård, Bernardo Magri
المصدر: Advances in Cryptology – CRYPTO 2021-41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)مصطلحات موضوعية: 010201 computation theory & mathematics, Computer science, 010102 general mathematics, 0102 computer and information sciences, 0101 mathematics, Computer security, computer.software_genre, 01 natural sciences, computer
-
11
المصدر: Topics in Cryptology – CT-RSA 2021-Cryptographers’ Track at the RSA Conference 2021, Virtual Event, May 17–20, 2021, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSAمصطلحات موضوعية: Cryptocurrency, 021103 operations research, Blockchain, Computer science, 0211 other engineering and technologies, 020206 networking & telecommunications, 02 engineering and technology, Computer security, computer.software_genre, First generation, Identity management, Accountability, 0202 electrical engineering, electronic engineering, information engineering, computer, Database transaction, Anonymity
-
12
المؤلفون: Alessandra Scafuro, Ivan Visconti, Luisa Siniscalchi
المساهمون: Garay, Juan A.
المصدر: Scafuro, A, Siniscalchi, L & Visconti, I 2021, Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains . in J A Garay (ed.), Public-Key Cryptography – PKC 2021 : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II . Springer Science and Business Media Deutschland GmbH, Lecture Notes in Computer Science, vol. LNCS 12711, pp. 469-498, 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, Virtual, Online, 10/05/2021 . https://doi.org/10.1007/978-3-030-75248-4_17
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021
Public-Key Cryptography – PKC 2021 ISBN: 9783030752477
Public Key Cryptography (2)
Public-Key Cryptography – PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part IIمصطلحات موضوعية: Theoretical computer science, Publicly verifiable zero knowledge, Computer science, String (computer science), (Collapsing) blockchain, Verifiable secret sharing, Zero-knowledge proof, 16. Peace & justice, Mathematical proof, Computer Science::Cryptography and Security, Random oracle
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d7355c747c21ca8fd14eb301e67e6f10
https://pure.au.dk/portal/da/publications/publicly-verifiable-zero-knowledge-from-collapsing-blockchains(f15c1128-9f35-4675-8ea3-f9443ec0d6cc).html -
13
المؤلفون: Luisa Siniscalchi, Hendrik Waldner, Michele Ciampi
المصدر: Public-Key Cryptography – PKC 2021 ISBN: 9783030752446
Public Key Cryptography (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021
Public-Key Cryptography – PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part Iمصطلحات موضوعية: Discrete mathematics, Scheme (programming language), 050101 languages & linguistics, Class (set theory), Computer science, 05 social sciences, 02 engineering and technology, Function (mathematics), computer.software_genre, Separable space, Bounded function, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, 0501 psychology and cognitive sciences, Compiler, Special case, computer, Computer Science::Cryptography and Security, Functional encryption, computer.programming_language
-
14
المؤلفون: Luisa Siniscalchi, Carmen De Maio, Mimmo Parente, Carlo Blundo
المصدر: FUZZ-IEEE
مصطلحات موضوعية: PSI-CA, 0209 industrial biotechnology, Measure (data warehouse), Social network, Computer science, business.industry, Twitter, 02 engineering and technology, World Wide Web, 020901 industrial engineering & automation, Advertisement Recommendation, Privacy, Social Media Analysis, Server, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Rough set, Layer (object-oriented design), business
-
15Conference
المؤلفون: Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi
المساهمون: Reisman, Sorel, Iqbal Ahamed, Sheikh, Demartini, Claudio, Blundo, Carlo, Cimato, Stelvio, Siniscalchi, Luisa
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-1-5386-0367-3; info:eu-repo/semantics/altIdentifier/isbn/978-1-5386-0368-0; info:eu-repo/semantics/altIdentifier/wos/WOS:000424861900026; ispartofbook:41st IEEE Annual Computer Software and Applications Conference (COMPSAC); 41st IEEE Annual Computer Software and Applications Conference (COMPSAC); volume:2; firstpage:149; lastpage:154; numberofpages:6; http://hdl.handle.net/11386/4700576; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85032869326
-
16
المؤلفون: Varun Raj, Luisa Siniscalchi, Tomasz Kazana, Ivan Damgård, Maciej Obremski
المساهمون: Beimel, Amos, Dziembowski, Stefan
المصدر: Damgård, I, Kazana, T, Obremski, M, Raj, V & Siniscalchi, L 2018, Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments . in A Beimel & S Dziembowski (eds), Theory of Cryptography . vol. 11240, Springer VS, Cham, Lecture Notes in Computer Science (LNCS), no. 11240, pp. 225-254, Theory of Cryptography Conference, Goa, India, 11/11/2018 . https://doi.org/10.1007/978-3-030-03810-6_9
Theory of Cryptography ISBN: 9783030038090
TCC (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Theory of Cryptography
Theory of Cryptography-16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIمصطلحات موضوعية: Discrete mathematics, Computer science, Code word, Data_CODINGANDINFORMATIONTHEORY, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, GeneralLiterature_MISCELLANEOUS, 010201 computation theory & mathematics, Venturi effect, 0202 electrical engineering, electronic engineering, information engineering, Error correcting, 020201 artificial intelligence & image processing, Relaxation (approximation)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::64e7a987535f6f054ed715f4d0e6b3d6
https://pure.au.dk/portal/da/publications/continuous-nmc-secure-against-permutations-and-overwrites-with-applications-to-cca-secure-commitments(5f759336-0a25-4eae-8da1-e15406756779).html -
17
المؤلفون: Stelvio Cimato, Carlo Blundo, Luisa Siniscalchi
المصدر: Intelligent Data Engineering and Automated Learning – IDEAL 2018 ISBN: 9783030034924
IDEAL (1)مصطلحات موضوعية: Set (abstract data type), 021110 strategic, defence & security studies, Cardinality, Theoretical computer science, Computer science, 020204 information systems, 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Permission, Heuristics, Security policy
-
18
المؤلفون: Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
المساهمون: Kalai, Yael, Reyzin, Leonid
المصدر: Theory of Cryptography ISBN: 9783319704999
TCC (1)
Ciampi, M, Ostrovsky, R, Siniscalchi, L & Visconti, I 2017, Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds . in Y Kalai & L Reyzin (eds), Theory of Cryptography . Lecture Notes in Computer Science, vol. 10677, Springer International Publishing AG, Cham, pp. 711-742, 15th Theory of Cryptography Conference, Baltimore, United States, 12/11/15 . https://doi.org/10.1007/978-3-319-70500-2_24مصطلحات موضوعية: Coin flipping, 010201 computation theory & mathematics, Computer science, Computer Science (all), 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Theoretical Computer Science, 0102 computer and information sciences, 02 engineering and technology, Zero-knowledge proof, Arithmetic, 01 natural sciences
وصف الملف: application/pdf
-
19
المؤلفون: Luisa Siniscalchi, Rafail Ostrovsky, Michele Ciampi, Ivan Visconti
المساهمون: Kalai, Yael, Reyzin, Leonid
المصدر: Theory of Cryptography ISBN: 9783319704999
TCC (1)
Ciampi, M, Ostrovsky, R, Siniscalchi, L & Visconti, I 2017, Round-Optimal Secure Two-Party Computation from Trapdoor Permutations . in Y Kalai & L Reyzin (eds), Theory of Cryptography . Lecture Notes in Computer Science, vol. 10677, Springer International Publishing AG, Cham, pp. 678-710, 15th Theory of Cryptography Conference, Baltimore, United States, 12/11/15 . https://doi.org/10.1007/978-3-319-70500-2_23مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Theoretical computer science, Computer science, Round complexity, Computation, Computer Science (all), TheoryofComputation_GENERAL, Claw-free permutation, 0102 computer and information sciences, 02 engineering and technology, Theoretical Computer Science, 01 natural sciences, Work (electrical), 010201 computation theory & mathematics, Secure two-party computation, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Trapdoor function
وصف الملف: application/pdf
-
20
المؤلفون: Luisa Siniscalchi, Stelvio Cimato, Carlo Blundo
المصدر: COMPSAC (2)
مصطلحات موضوعية: 021110 strategic, defence & security studies, Computer science, business.industry, 0211 other engineering and technologies, Authorization, Access control, 02 engineering and technology, Permission, Computer security, computer.software_genre, Security policy, Data science, Filter (software), Cardinality, 0202 electrical engineering, electronic engineering, information engineering, Role-based access control, 020201 artificial intelligence & image processing, business, computer