Giorgia Azzurra Marson

Orcid: 0000-0001-5264-7285

According to our database1, Giorgia Azzurra Marson authored at least 24 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Closing the Gap: Achieving Better Accuracy-Robustness Tradeoffs against Query-Based Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
LISA: LIghtweight single-server Secure Aggregation with a public source of randomness.
CoRR, 2023

Short Paper: Estimating Patch Propagation Times Across Blockchain Forks.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains.
IEEE Trans. Serv. Comput., 2022

Estimating Patch Propagation Times across (Blockchain) Forks.
CoRR, 2022

DLT-based End-to-end Inter-domain Transport Network Slice with SLA Management Using Cloud-based SDN Controllers: Demo Session.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2022

2021
BaFFLe: Backdoor Detection via Feedback-based Federated Learning.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

On the Synchronization Power of Token Smart Contracts.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Mitosis: Practically Scaling Permissioned Blockchains.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
On the Security of Randomized Defenses Against Adversarial Samples.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2018
Mix'n'Squeeze: Thwarting Adaptive Adversarial Samples Using Randomized Squeezing.
CoRR, 2018

A Cryptographic Look at Multi-party Channels.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
Real-World Aspects of Secure Channels: Fragmentation, Causality, and Forward Security.
PhD thesis, 2017

Security Notions for Bidirectional Channels.
IACR Trans. Symmetric Cryptol., 2017

With one it is easy, with many it gets complicated: Understanding Channel Security for Groups.
IACR Cryptol. ePrint Arch., 2017

Data Is a Stream: Security of Stream-Based Channels.
IACR Cryptol. ePrint Arch., 2017

2016
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
IACR Cryptol. ePrint Arch., 2016

2014
Even more practical secure logging: Tree-based Seekable Sequential Key Generators.
IACR Cryptol. ePrint Arch., 2014

Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
IACR Cryptol. ePrint Arch., 2014

2013
Practical Secure Logging: Seekable Sequential Key Generators.
IACR Cryptol. ePrint Arch., 2013

A Cryptographic Analysis of OPACITY.
IACR Cryptol. ePrint Arch., 2013

A Cryptographic Analysis of OPACITY - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
On the Non-malleability of the Fiat-Shamir Transform.
IACR Cryptol. ePrint Arch., 2012


  Loading...