Number of items: 10.
Conference or Workshop Item (A Paper)
Krupp, Johannes and Schröder, Dominique and Simkin, Mark and Fiore, Dario and Ateniese, Giuseppe and Nürnberger, Stefan
(2016)
Nearly Optimal Verifiable Data Streaming.
Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015)
ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013)
Verifiable Delegation of Computation on Outsourced Data.
Catalano, Dario and Fiore, Dario and Gennaro, Rosario and Vamvourellis, Konstantinos
(2013)
Algebraic (Trapdoor) One-Way Functions and Their Applications.
Catalano, Dario and Fiore, Dario
(2013)
Practical Homomorphic MACs for Arithmetic Circuits.
Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013)
Privacy-Preserving Accountable Computation.
Catalano, Dario and Fiore, Dario
(2013)
Vector Commitments and Their Applications.
Fiore, Dario and Schröder, Dominique
(2012)
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations.
Article
Troncoso, Carmela and Payer, Matthias and Hubaux, Jean-Pierre and Salathé, Marcel and Larus, James and Lueks, Wouter and Stadler, Theresa and Pyrgelis, Apostolos and Antonioli, Daniele and Barman, Ludovic and Chatel, Sylvain and Paterson, Kenneth G. and Capkun, Srdjan and Basin, David and Beutel, Jan and Jackson, Dennis and Roeschlin, Marc and Leu, Patrick and Preneel, Bart and Smart, Nigel and Abidin, Aysajan and Gürses, Seda and Veale, Michael and Cremers, Cas and Backes, Michael and Tippenhauer, Nils Ole and Binns, Reuben and Cattuto, Ciro and Barrat, Alain and Fiore, Dario and Barbosa, Manuel and Oliveira, Rui and Pereira, José
(2020)
Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Engineering Bulletin Volume 43, Number 2, June 2020.
pp. 36-66.
Bresson, Emmanuel and Catalano, Dario and Raimondo, Mario and Fiore, Dario and Gennaro, Rosario
(2013)
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
International Journal of Information Security, 12 (6).
pp. 439-465.
This list was generated on Thu Nov 21 16:53:23 2024 CET.