Giuseppe Ateniese
Orcid: 0000-0002-0848-878X
According to our database1,
Giuseppe Ateniese
authored at least 103 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Hacking Back the AI-Hacker: Prompt Injection as a Defense Against LLM-driven Cyberattacks.
CoRR, 2024
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services.
IACR Cryptol. ePrint Arch., 2023
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation.
IACR Cryptol. ePrint Arch., 2023
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
2022
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications.
IEEE Trans. Netw. Sci. Eng., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Theor. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Theor. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Applied Cryptography and Network Security, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Proceedings of the Provable Security, 2018
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017
ACM Trans. Embed. Comput. Syst., 2017
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
2015
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.
Int. J. Secur. Networks, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.
CoRR, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
2014
J. Parallel Distributed Comput., 2014
Proceedings of the Information Security - 17th International Conference, 2014
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
2010
ACM SIGOPS Oper. Syst. Rev., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
Int. J. Appl. Cryptogr., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 5th USENIX Conference on File and Storage Technologies, 2007
2006
Improved proxy re-encryption schemes with applications to secure distributed storage.
ACM Trans. Inf. Syst. Secur., 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
ACM Trans. Inf. Syst. Secur., 2004
IACR Cryptol. ePrint Arch., 2004
2003
2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Topics in Cryptology, 2002
2001
Proceedings of the Network and Distributed System Security Symposium, 2001
2000
IEEE J. Sel. Areas Commun., 2000
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999
Proceedings of the Financial Cryptography, 1999
Proceedings of the CCS '99, 1999
1998
1996
Electron. Colloquium Comput. Complex., 1996
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996