Giovanni Russello
Orcid: 0000-0001-6987-0803
According to our database1,
Giovanni Russello
authored at least 114 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Result Pattern Hiding Boolean Searchable Encryption: Achieving Negligible False Positive Rates in Low Storage Overhead.
IACR Cryptol. ePrint Arch., 2024
SoK: Identifying Limitations and Bridging Gaps of Cybersecurity Capability Maturity Models (CCMMs).
CoRR, 2024
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection.
Proceedings of the 2024 European Symposium on Usable Security, 2024
2023
<i>HT2ML</i>: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE.
Comput. Secur., December, 2023
Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy.
Proc. Priv. Enhancing Technol., April, 2023
CoRR, 2023
CoRR, 2023
What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility.
CoRR, 2023
A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility.
Proceedings of the 35th Australian Computer-Human Interaction Conference, 2023
AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Selective Encryption Framework for Securing Communication in Industrial Control Systems.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2022
Automated Security-focused Network Configuration Management: State of the Art, Challenges, and Future Directions.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage.
ACM Trans. Priv. Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Collusion Defender: Preserving Subscribers' Privacy in Publish and Subscribe Systems.
IEEE Trans. Dependable Secur. Comput., 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Real-time Smartphone Activity Classification Using Inertial Sensors - Recognition of Scrolling, Typing, and Watching Videos While Sitting or Walking.
Sensors, 2020
CUPS: Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update.
Secur. Priv., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the 2nd IEEE Conference on Multimedia Information Processing and Retrieval, 2019
2018
J. Inf. Secur. Appl., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018
PU-ABE: Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources.
Proceedings of the 13th IEEE International Conference on e-Science, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Comput. Secur., 2013
Proceedings of the Distributed Applications and Interoperable Systems, 2013
Proceedings of the CCSW'13, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Design and implementation of a confidentiality and access control solution for publish/subscribe systems.
Comput. Networks, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
J. Syst. Softw., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the POLICY 2011, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Poster: ESPOON<sub>ERBAC</sub>: enforcing security policies in outsourced environments with encrypted RBAC.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Sci. Comput. Program., 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Providing Confidentiality in Content-based Publish/subscribe Systems.
Proceedings of the SECRYPT 2010, 2010
Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios.
Proceedings of the POLICY 2010, 2010
Proceedings of the POLICY 2010, 2010
An opportunistic authority evaluation scheme for data security in crisis management scenarios.
Proceedings of the 5th ACM Symposium on Information, 2010
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions.
Proceedings of the POLICY 2009, 2009
Proceedings of the POLICY 2009, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008
Proceedings of the Managing Large-Scale Service Deployment, 2008
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008
Proceedings of the Component-Based Software Engineering, 11th International Symposium, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Sci. Comput. Program., 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2005
Dynamically Adapting Tuple Replication for Managing Availability in a Shared Data Space.
Proceedings of the Coordination Models and Languages, 7th International Conference, 2005
2004
Proceedings of the Euro-Par 2004 Parallel Processing, 2004
Proceedings of the On the Move to Meaningful Internet Systems 2004: CoopIS, 2004
2003
Customizable Data Distribution for Shared Data Spaces.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003
2002
Proceedings of the Seventh IEEE International High-Level Design Validation and Test Workshop 2002, 2002