FERRARA, Anna Lisa
FERRARA, Anna Lisa
DIPARTIMENTO DI BIOSCIENZE E TERRITORIO
A note on time-bound hierarchical key assignment schemes
2013-01-01 Ateniese, Giuseppe; De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara
An Attack on a Payment Scheme
2008-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
An Information-Theoretic Approach to Anonymous Access Control
2024-01-01 De Santis, A.; Ferrara, A. L.; Masucci, B.; Venditti, G.
Analyzing temporal role based access control models
2012-01-01 Emre, Uzun; Vijayalakshmi, Atluri; Shamik, Sural; Jaideep, Vaidya; Parlato, G; Ferrara, Anna Lisa; Parthasarathy, Madhusudan
Analyzing temporal role based access control models
2012-01-01 Uzun, E; Atluri, V; Sural, S; Vaidya, J; Parlato, G; Ferrara, Anna Lisa; Madhusudan, P.
Cryptographic Key Assignment Schemes for any Access Control Policy
2004-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Cryptographically enforced RBAC
2013-01-01 Ferrara, Anna Lisa; Fuchsbauer, Georg; Warinschi, Bogdan
Efficient Provably-Secure Hierarchical Key Assignment Schemes
2007-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Efficient provably-secure hierarchical key assignment schemes
2011-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme
2006-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Fuzzy-based approach to assess and prioritize privacy risks
2020-01-01 Hart, S.; Ferrara, A. L.; Paci, F.
Hierarchical Key Assignment Schemes with Key Rotation
2024-01-01 Cimorelli Belfiore, R.; De Santis, A.; Ferrara, A. L.; Masucci, B.
Ideal Contrast Visual Cryptography Schemes with Reversing
2005-01-01 Cimato, S; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Identity-Based Matchmaking Encryption from Standard Lattice Assumptions
2024-01-01 Cimorelli Belfiore, R.; De Cosmo, A.; Ferrara, A. L.
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
2008-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Policy analysis for self-administrated role-based access control
2013-01-01 Ferrara, Anna Lisa; Madhusudan, P.; Parlato, Gennaro
Policy Privacy in Cryptographic Access Control
2015-01-01 Ferrara, Anna Lisa; Fachsbauer, Georg; Liu, Bin; Warinschi, Bogdan
Practical Short Signature Batch Verification
2009-01-01 Ferrara, Anna Lisa; Green, M; Hohenberger, S; Pedersen, M.
Preventing unauthorized data flows
2017-01-01 Uzun, Emre; Parlato, Gennaro; Atluri, Vijayalakshmi; Ferrara, Anna Lisa; Vaidya, Jaideep; Sural, Shamik; Lorenzi, David
Provably-Secure One-Message Unilateral Entity Authentication Schemes
2024-01-01 De Santis, A.; Ferrara, A. L.; Flores, M.; Masucci, B.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A note on time-bound hierarchical key assignment schemes | 1-gen-2013 | Ateniese, Giuseppe; De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara | |
An Attack on a Payment Scheme | 1-gen-2008 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
An Information-Theoretic Approach to Anonymous Access Control | 1-gen-2024 | De Santis, A.; Ferrara, A. L.; Masucci, B.; Venditti, G. | |
Analyzing temporal role based access control models | 1-gen-2012 | Emre, Uzun; Vijayalakshmi, Atluri; Shamik, Sural; Jaideep, Vaidya; Parlato, G; Ferrara, Anna Lisa; Parthasarathy, Madhusudan | |
Analyzing temporal role based access control models | 1-gen-2012 | Uzun, E; Atluri, V; Sural, S; Vaidya, J; Parlato, G; Ferrara, Anna Lisa; Madhusudan, P. | |
Cryptographic Key Assignment Schemes for any Access Control Policy | 1-gen-2004 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Cryptographically enforced RBAC | 1-gen-2013 | Ferrara, Anna Lisa; Fuchsbauer, Georg; Warinschi, Bogdan | |
Efficient Provably-Secure Hierarchical Key Assignment Schemes | 1-gen-2007 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Efficient provably-secure hierarchical key assignment schemes | 1-gen-2011 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme | 1-gen-2006 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Fuzzy-based approach to assess and prioritize privacy risks | 1-gen-2020 | Hart, S.; Ferrara, A. L.; Paci, F. | |
Hierarchical Key Assignment Schemes with Key Rotation | 1-gen-2024 | Cimorelli Belfiore, R.; De Santis, A.; Ferrara, A. L.; Masucci, B. | |
Ideal Contrast Visual Cryptography Schemes with Reversing | 1-gen-2005 | Cimato, S; De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Identity-Based Matchmaking Encryption from Standard Lattice Assumptions | 1-gen-2024 | Cimorelli Belfiore, R.; De Cosmo, A.; Ferrara, A. L. | |
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes | 1-gen-2008 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Policy analysis for self-administrated role-based access control | 1-gen-2013 | Ferrara, Anna Lisa; Madhusudan, P.; Parlato, Gennaro | |
Policy Privacy in Cryptographic Access Control | 1-gen-2015 | Ferrara, Anna Lisa; Fachsbauer, Georg; Liu, Bin; Warinschi, Bogdan | |
Practical Short Signature Batch Verification | 1-gen-2009 | Ferrara, Anna Lisa; Green, M; Hohenberger, S; Pedersen, M. | |
Preventing unauthorized data flows | 1-gen-2017 | Uzun, Emre; Parlato, Gennaro; Atluri, Vijayalakshmi; Ferrara, Anna Lisa; Vaidya, Jaideep; Sural, Shamik; Lorenzi, David | |
Provably-Secure One-Message Unilateral Entity Authentication Schemes | 1-gen-2024 | De Santis, A.; Ferrara, A. L.; Flores, M.; Masucci, B. |