Alessandro Sorniotti
According to our database1,
Alessandro Sorniotti
authored at least 54 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
2021
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status.
IACR Cryptol. ePrint Arch., 2021
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
StreamChain: Building a Low-Latency Permissioned Blockchain For Enterprise Use-Cases.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
2019
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric.
CoRR, 2018
Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018
Proceedings of the Thirteenth EuroSys Conference, 2018
2017
2016
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution.
Comput. Commun., 2016
2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
2013
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Comput. Secur., 2013
Proceedings of the IEEE 29th Symposium on Mass Storage Systems and Technologies, 2013
2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs.
Proceedings of the Fourth European Workshop on System Security, 2011
2010
PhD thesis, 2010
Comput. Secur., 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
2009
Int. J. Wirel. Inf. Networks, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability, 2009
2008
Comput. Commun. Rev., 2008
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008
Design guidelines for integration of wireless sensor networks with enterprise systems.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008
2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007