If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 2 Similar Profiles
Cryptography Engineering & Materials Science
Servers Engineering & Materials Science
Group Signature Mathematics
Electronic document identification systems Engineering & Materials Science
Signature Scheme Mathematics
Network protocols Engineering & Materials Science
Visual Cryptography Mathematics
Group Scheme Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1996 2017

4 Citations

Accountable storage

Ateniese, G., Goodrich, M. T., Lekakis, V., Papamanthou, C., Paraskevas, E. & Tamassia, R., Jan 1 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Springer Verlag, p. 623-644 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 LNCS).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Network protocols
Server
Outsourcing
Bloom Filter
7 Citations

Deep Models under the GAN: Information leakage from collaborative deep learning

Hitaj, B., Ateniese, G. & Perez-Cruz, F., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 603-618 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Deep learning
Classifiers
Servers

HELIOS: Outsourcing of Security Operations in Green Wireless Sensor Networks

Ateniese, G., Bianchi, G., Capossele, A. T., Petrioli, C. & Spenza, D., Nov 14 2017, 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-June. 8108500

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Harvesting
Wireless Sensor Networks
Wireless sensor networks
Energy utilization
31 Citations

Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage

Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y. & Min, G., Apr 1 2017, In : IEEE Transactions on Information Forensics and Security. 12, 4, p. 767-778 12 p., 7586112.

Stevens Institute of Technology

Research output: Contribution to journalArticle

Data privacy
Servers
Network protocols
Authentication
Data storage equipment
7 Citations

Low-cost standard signatures for energy-harvesting wireless sensor networks

Ateniese, G., Bianchi, G., Capossele, A. T., Petrioli, C. & Spenza, D., Apr 1 2017, In : ACM Transactions on Embedded Computing Systems. 16, 3, 2994603.

Research output: Contribution to journalArticle

Energy harvesting
Wireless sensor networks
Costs
Sensor nodes
Authentication