FERRARA, Anna Lisa

FERRARA, Anna Lisa  

DIPARTIMENTO DI BIOSCIENZE E TERRITORIO  

Mostra records
Risultati 1 - 20 di 32 (tempo di esecuzione: 0.052 secondi).
Titolo Data di pubblicazione Autore(i) File
A note on time-bound hierarchical key assignment schemes 1-gen-2013 Ateniese, Giuseppe; De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara
An Attack on a Payment Scheme 1-gen-2008 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
An Information-Theoretic Approach to Anonymous Access Control 1-gen-2024 De Santis, A.; Ferrara, A. L.; Masucci, B.; Venditti, G.
Analyzing temporal role based access control models 1-gen-2012 Emre, Uzun; Vijayalakshmi, Atluri; Shamik, Sural; Jaideep, Vaidya; Parlato, G; Ferrara, Anna Lisa; Parthasarathy, Madhusudan
Analyzing temporal role based access control models 1-gen-2012 Uzun, E; Atluri, V; Sural, S; Vaidya, J; Parlato, G; Ferrara, Anna Lisa; Madhusudan, P.
Cryptographic Key Assignment Schemes for any Access Control Policy 1-gen-2004 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Cryptographically enforced RBAC 1-gen-2013 Ferrara, Anna Lisa; Fuchsbauer, Georg; Warinschi, Bogdan
Efficient Provably-Secure Hierarchical Key Assignment Schemes 1-gen-2007 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Efficient provably-secure hierarchical key assignment schemes 1-gen-2011 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme 1-gen-2006 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Fuzzy-based approach to assess and prioritize privacy risks 1-gen-2020 Hart, S.; Ferrara, A. L.; Paci, F.
Hierarchical Key Assignment Schemes with Key Rotation 1-gen-2024 Cimorelli Belfiore, R.; De Santis, A.; Ferrara, A. L.; Masucci, B.
Ideal Contrast Visual Cryptography Schemes with Reversing 1-gen-2005 Cimato, S; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Identity-Based Matchmaking Encryption from Standard Lattice Assumptions 1-gen-2024 Cimorelli Belfiore, R.; De Cosmo, A.; Ferrara, A. L.
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 1-gen-2008 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Policy analysis for self-administrated role-based access control 1-gen-2013 Ferrara, Anna Lisa; Madhusudan, P.; Parlato, Gennaro
Policy Privacy in Cryptographic Access Control 1-gen-2015 Ferrara, Anna Lisa; Fachsbauer, Georg; Liu, Bin; Warinschi, Bogdan
Practical Short Signature Batch Verification 1-gen-2009 Ferrara, Anna Lisa; Green, M; Hohenberger, S; Pedersen, M.
Preventing unauthorized data flows 1-gen-2017 Uzun, Emre; Parlato, Gennaro; Atluri, Vijayalakshmi; Ferrara, Anna Lisa; Vaidya, Jaideep; Sural, Shamik; Lorenzi, David
Provably-Secure One-Message Unilateral Entity Authentication Schemes 1-gen-2024 De Santis, A.; Ferrara, A. L.; Flores, M.; Masucci, B.