If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 4 Similar Profiles
Cryptography Engineering & Materials Science
Servers Engineering & Materials Science
Group Signature Mathematics
Electronic document identification systems Engineering & Materials Science
Signature Scheme Mathematics
Network protocols Engineering & Materials Science
Outsourcing Engineering & Materials Science
Visual Cryptography Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1996 2018

A family of FDH signature schemes based on the quadratic residuosity assumption

Ateniese, G., Fech, K. & Magri, B., Jan 1 2018, Progress in Cryptology – INDOCRYPT 2018 - 19th International Conference on Cryptology in India, Proceedings. Chakraborty, D. & Iwata, T. (eds.). Springer Verlag, p. 248-262 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11356 LNCS).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure outsourcing of cryptographic circuits manufacturing

Ateniese, G., Kiayias, A., Magri, B., Tselekounis, Y. & Venturi, D., Jan 1 2018, Provable Security - 12th International Conference, ProvSec 2018, Proceedings. Baek, J., Susilo, W. & Kim, J. (eds.). Springer Verlag, p. 75-93 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11192 LNCS).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Integrated Circuits
Integrated circuits
Manufacturing
Fabrication
4 Citations

Accountable storage

Ateniese, G., Goodrich, M. T., Lekakis, V., Papamanthou, C., Paraskevas, E. & Tamassia, R., Jan 1 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Springer Verlag, p. 623-644 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 LNCS).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Network protocols
Server
Outsourcing
Bloom Filter
10 Citations

Deep Models under the GAN: Information leakage from collaborative deep learning

Hitaj, B., Ateniese, G. & Perez-Cruz, F., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 603-618 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Deep learning
Classifiers
Servers

HELIOS: Outsourcing of Security Operations in Green Wireless Sensor Networks

Ateniese, G., Bianchi, G., Capossele, A. T., Petrioli, C. & Spenza, D., Nov 14 2017, 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-June. 8108500

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Harvesting
Wireless Sensor Networks
Wireless sensor networks
Energy utilization