| 2009 |
36 | | Carlo Blundo,
Stelvio Cimato,
Sabrina De Capitani di Vimercati,
Alfredo De Santis,
Sara Foresti,
Stefano Paraboschi,
Pierangela Samarati:
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
SEC 2009: 364-375 |
| 2008 |
35 | | Sushil Jajodia,
Pierangela Samarati,
Stelvio Cimato:
Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy
Springer 2008 |
34 | | Stelvio Cimato,
Marco Gamassi,
Vincenzo Piuri,
Roberto Sassi,
Fabio Scotti:
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System.
ACSAC 2008: 130-139 |
33 | | Stelvio Cimato:
A Lightweight Protocol for Dynamic RFID Identification.
COMPSAC 2008: 673-678 |
| 2007 |
32 | | Stelvio Cimato,
Marco Gamassi,
Vincenzo Piuri,
Roberto Sassi,
Fabio Scotti:
A Biometric Verification System Addressing Privacy Concerns.
CIS 2007: 594-598 |
31 | | Stelvio Cimato,
Roberto De Prisco,
Alfredo De Santis:
Colored visual cryptography without color darkening.
Theor. Comput. Sci. 374(1-3): 261-276 (2007) |
| 2006 |
30 | | Vincenzo Auletta,
Carlo Blundo,
Stelvio Cimato,
Guerriero Raimato:
A Web Service Based Micro-payment System.
ISCC 2006: 328-333 |
29 | | Stelvio Cimato,
Roberto De Prisco,
Alfredo De Santis:
Probabilistic Visual Cryptography Schemes.
Comput. J. 49(1): 97-107 (2006) |
28 | | Stelvio Cimato,
Antonella Cresti,
Paolo D'Arco:
A unified model for unconditionally secure key distribution.
Journal of Computer Security 14(1): 45-64 (2006) |
27 | | Carlo Blundo,
Stelvio Cimato,
Alfredo De Santis:
Visual cryptography schemes with optimal pixel expansion.
Theor. Comput. Sci. 369(1-3): 169-182 (2006) |
| 2005 |
26 | | Carlo Blundo,
Stelvio Cimato:
Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers
Springer 2005 |
25 | | Stelvio Cimato,
Clemente Galdi,
Raffaella Giordano,
Barbara Masucci,
Gildo Tomasco:
Design and Implementation of an Inline Certified E-mail Service.
CANS 2005: 186-199 |
24 | | Carlo Blundo,
Stelvio Cimato,
Roberto De Prisco:
A Lightweight Approach to Authenticated Web Caching.
SAINT 2005: 157-163 |
23 | | Stelvio Cimato,
Roberto De Prisco,
Alfredo De Santis:
Optimal Colored Threshold Visual Cryptography Schemes.
Des. Codes Cryptography 35(3): 311-335 (2005) |
22 | | Carlo Blundo,
Stelvio Cimato,
Annalisa De Bonis:
Secure E-Coupons.
Electronic Commerce Research 5(1): 117-139 (2005) |
21 | | Stelvio Cimato,
Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Ideal contrast visual cryptography schemes with reversing.
Inf. Process. Lett. 93(4): 199-206 (2005) |
20 | | Stelvio Cimato,
Alfredo De Santis,
Umberto Ferraro Petrillo:
Overcoming the obfuscation of Java programs by identifier renaming.
Journal of Systems and Software 78(1): 60-72 (2005) |
| 2004 |
19 | | Carlo Blundo,
Stelvio Cimato:
A Framework for Authenticated Web Services.
ECOWS 2004: 61-71 |
18 | | Carlo Blundo,
Stelvio Cimato:
A Platform for Secure E-Gambling.
ITCC (2) 2004: 768-772 |
17 | | Stelvio Cimato,
Roberto De Prisco,
Alfredo De Santis:
Colored Visual Cryptography Without Color Darkening.
SCN 2004: 235-248 |
16 | | Carlo Blundo,
Stelvio Cimato,
Roberto De Prisco,
Anna Lisa Ferrara:
Modeling A Certified Email Protocol using I/O Automata.
Electr. Notes Theor. Comput. Sci. 99: 339-359 (2004) |
15 | | Carlo Blundo,
Stelvio Cimato:
A Software Infrastructure for Authenticated Web Metering.
IEEE Computer 37(4): 28-33 (2004) |
| 2003 |
14 | | Stelvio Cimato,
Clemente Galdi,
Giuseppe Persiano:
Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers
Springer 2003 |
13 | | Stelvio Cimato,
Paolo D'Arco,
Ivan Visconti:
Anonymous Group Communication in Mobile Networks.
ICTCS 2003: 316-328 |
12 | | Carlo Blundo,
Stelvio Cimato,
Roberto De Prisco:
Certified Email: Design and Implementation of a New Optimistic Protocol..
ISCC 2003: 828-833 |
| 2002 |
11 | | Carlo Blundo,
Stelvio Cimato:
SAWM: a tool for secure and authenticated web metering.
SEKE 2002: 641-648 |
10 | | Carlo Blundo,
Stelvio Cimato,
Annalisa De Bonis:
A lightweight protocol for the generation and distribution of secure e-coupons.
WWW 2002: 542-552 |
9 | | Carlo Blundo,
Stelvio Cimato,
Barbara Masucci:
A note on optimal metering schemes.
Inf. Process. Lett. 84(6): 319-326 (2002) |
| 2001 |
8 | | Stelvio Cimato:
Design of an Authentication Protocol for Gsm Javacards.
ICISC 2001: 355-368 |
7 | | Stelvio Cimato,
Annalisa De Bonis:
Online Advertising: Secure E-coupons.
ICTCS 2001: 370-383 |
| 1999 |
6 | | Stelvio Cimato,
Paolo Ciancarini:
A Formal Approach to the Specification of Java Components.
ECOOP Workshops 1999: 107-108 |
5 | | Stelvio Cimato:
Specifying component-based Java applications (Short Paper).
FMOODS 1999 |
| 1997 |
4 | | Paolo Ciancarini,
Stelvio Cimato,
Cecilia Mascolo:
Engineering Formal Requirements: An Analysis and Testing Method for Z Documents.
Ann. Software Eng. 3: 189-219 (1997) |
| 1996 |
3 | | Stelvio Cimato,
Cecilia Mascolo:
Analyzing and Animating Declarative Specifications.
APPIA-GULP-PRODE 1996: 295-308 |
2 | | Paolo Ciancarini,
Stelvio Cimato:
Animating a Non-executable Formal Specification with a Distributed Symbolic Language.
DISCO 1996: 200-201 |
1 | | Paolo Ciancarini,
Stelvio Cimato,
Cecilia Mascolo:
Engineering Formal Requirements: Analysis and Testing.
SEKE 1996: 385-392 |