If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Cryptography Engineering & Materials Science
Servers Engineering & Materials Science
Group Signature Mathematics
Electronic document identification systems Engineering & Materials Science
Network protocols Engineering & Materials Science
Outsourcing Engineering & Materials Science
Signature Scheme Mathematics
Group Scheme Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1996 2019

PassGAN: A deep learning approach for password guessing

Hitaj, B., Gasti, P., Ateniese, G. & Perez-Cruz, F., Jan 1 2019, Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Proceedings. Gauthier-Umaña, V., Deng, R. H., Yung, M. & Ochoa, M. (eds.). Springer Verlag, p. 217-237 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11464 LNCS).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Password
Glossaries
Learning systems
Learning algorithms
Personnel

Public immunization against complete subversion without random oracles

Ateniese, G., Francati, D., Magri, B. & Venturi, D., Jan 1 2019, Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Proceedings. Gauthier-Umaña, V., Deng, R. H., Yung, M. & Ochoa, M. (eds.). Springer Verlag, p. 465-485 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11464 LNCS).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Immunization
Random Oracle
Seed
Hashing
Randomness

A family of FDH signature schemes based on the quadratic residuosity assumption

Ateniese, G., Fech, K. & Magri, B., Jan 1 2018, Progress in Cryptology – INDOCRYPT 2018 - 19th International Conference on Cryptology in India, Proceedings. Chakraborty, D. & Iwata, T. (eds.). Springer Verlag, p. 248-262 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11356 LNCS).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure outsourcing of cryptographic circuits manufacturing

Ateniese, G., Kiayias, A., Magri, B., Tselekounis, Y. & Venturi, D., Jan 1 2018, Provable Security - 12th International Conference, ProvSec 2018, Proceedings. Baek, J., Susilo, W. & Kim, J. (eds.). Springer Verlag, p. 75-93 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11192 LNCS).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Integrated circuits
Networks (circuits)
Fabrication
Hardware
4 Citations (Scopus)

Accountable storage

Ateniese, G., Goodrich, M. T., Lekakis, V., Papamanthou, C., Paraskevas, E. & Tamassia, R., Jan 1 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Springer Verlag, p. 623-644 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 LNCS).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Network protocols
Outsourcing
Bandwidth
Compensation and Redress