Giuseppe Ateniese

Orcid: 0000-0002-0848-878X

According to our database1, Giuseppe Ateniese authored at least 103 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions.
IACR Cryptol. ePrint Arch., 2024

Hacking Back the AI-Hacker: Prompt Injection as a Defense Against LLM-driven Cyberattacks.
CoRR, 2024

LLMmap: Fingerprinting For Large Language Models.
CoRR, 2024

Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Watermarks in the Sand: Impossibility of Strong Watermarking for Language Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Atomic Swaps for Boneh-Lynn-Shacham (BLS) Based Blockchains.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models.
IACR Cryptol. ePrint Arch., 2023

Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services.
IACR Cryptol. ePrint Arch., 2023

Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation.
IACR Cryptol. ePrint Arch., 2023

Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications.
IEEE Trans. Netw. Sci. Eng., 2022

Eluding Secure Aggregation in Federated Learning via Model Inconsistency.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Immunization against complete subversion without random oracles.
Theor. Comput. Sci., 2021

Match Me if You Can: Matchmaking Encryption and Its Applications.
J. Cryptol., 2021

Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity.
IACR Cryptol. ePrint Arch., 2021

Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries.
Proceedings of the 30th USENIX Security Symposium, 2021

Unleashing the Tiger: Inference Attacks on Split Learning.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Subversion-resilient signatures: Definitions, constructions and applications.
Theor. Comput. Sci., 2020

Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
IACR Cryptol. ePrint Arch., 2020

Interpretable Probabilistic Password Strength Meters via Deep Learning.
Proceedings of the Computer Security - ESORICS 2020, 2020

Is AI Taking Over the World? No, but It's Making it Less Private.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020

2019
Improving Password Guessing via Representation Learning.
IACR Cryptol. ePrint Arch., 2019

Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains.
IACR Cryptol. ePrint Arch., 2019

Audita: A Blockchain-based Auditing Framework for Off-chain Storage.
IACR Cryptol. ePrint Arch., 2019

PassGAN: A Deep Learning Approach for Password Guessing.
Proceedings of the Applied Cryptography and Network Security, 2019

Public Immunization Against Complete Subversion Without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Secure Outsourcing of Cryptographic Circuits Manufacturing.
Proceedings of the Provable Security, 2018

A Family of FDH Signature Schemes Based on the Quadratic Residuosity Assumption.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks.
ACM Trans. Embed. Comput. Syst., 2017

HELIOS: Outsourcing of Security Operations in Green Wireless Sensor Networks.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends.
IACR Cryptol. ePrint Arch., 2016

Secure Outsourcing of Circuit Manufacturing.
IACR Cryptol. ePrint Arch., 2016

Entangled cloud storage.
Future Gener. Comput. Syst., 2016

Nearly Optimal Verifiable Data Streaming.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
Recent Advances in Security and Privacy in Big Data.
J. Univers. Comput. Sci., 2015

Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.
Int. J. Secur. Networks, 2015

Nearly Optimal Verifiable Data Streaming (Full Version).
IACR Cryptol. ePrint Arch., 2015

Subversion-Resilient Signature Schemes.
IACR Cryptol. ePrint Arch., 2015

Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage.
IACR Cryptol. ePrint Arch., 2015

No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.
CoRR, 2015

From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain.
Proceedings of the Network and System Security - 9th International Conference, 2015

No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Proceedings of the Network and System Security - 9th International Conference, 2015

Entangled Encodings and Data Entanglement.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

2014
Fault-tolerant oblivious assignment with m slots in synchronous systems.
J. Parallel Distributed Comput., 2014

Accountable Storage.
IACR Cryptol. ePrint Arch., 2014

Certified Bitcoins.
IACR Cryptol. ePrint Arch., 2014

"To Share or not to Share" in Client-Side Encrypted Clouds.
Proceedings of the Information Security - 17th International Conference, 2014

No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2013
A note on time-bound hierarchical key assignment schemes.
Inf. Process. Lett., 2013

VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data.
IACR Cryptol. ePrint Arch., 2013

Proofs of Space: When Space is of the Essence.
IACR Cryptol. ePrint Arch., 2013

Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
J. Cryptol., 2012

Efficient Query Integrity for Outsourced Dynamic Databases.
IACR Cryptol. ePrint Arch., 2012

Oblivious Assignment with m Slots.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

2011
Remote data checking using provable data possession.
ACM Trans. Inf. Syst. Secur., 2011

High-Entropy Visual Identification for Touch Screen Devices.
IACR Cryptol. ePrint Arch., 2011

2010
FastAD: an authenticated directory for billions of objects.
ACM SIGOPS Oper. Syst. Rev., 2010

(If) Size Matters: Size-Hiding Private Set Intersection.
IACR Cryptol. ePrint Arch., 2010

Deniable cloud storage: sharing files via public-key deniability.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Remote data checking for network coding-based distributed storage systems.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006.
Int. J. Appl. Cryptogr., 2009

Universally Anonymous IBE based on the Quadratic Residuosity Assumption.
IACR Cryptol. ePrint Arch., 2009

Proofs of Storage from Homomorphic Identification Protocols.
Proceedings of the Advances in Cryptology, 2009

2008
Scalable and Efficient Provable Data Possession.
IACR Cryptol. ePrint Arch., 2008

Key-Private Proxy Re-Encryption.
IACR Cryptol. ePrint Arch., 2008

MR-PDP: Multiple-Replica Provable Data Possession.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Provable Data Possession at Untrusted Stores.
IACR Cryptol. ePrint Arch., 2007

Secret Handshakes with Dynamic and Fuzzy Matching.
Proceedings of the Network and Distributed System Security Symposium, 2007

Design and Implementation of Verifiable Audit Trails for a Versioning File System.
Proceedings of the 5th USENIX Conference on File and Storage Technologies, 2007

2006
Survivable Monitoring in Dynamic Networks.
IEEE Trans. Mob. Comput., 2006

Improved proxy re-encryption schemes with applications to secure distributed storage.
ACM Trans. Inf. Syst. Secur., 2006

Identity-Based Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2006

2005
Proxy Re-Signatures: New Definitions, Algorithms, and Applications.
IACR Cryptol. ePrint Arch., 2005

Practical Group Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

Verifiable audit trails for a versioning file system.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Sanitizable Signatures.
Proceedings of the Computer Security, 2005

Untraceable RFID tags via insubvertible encryption.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

On the Performance and Analysis of DNS Security Extensions.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Verifiable encryption of digital signatures and applications.
ACM Trans. Inf. Syst. Secur., 2004

On the Key Exposure Problem in Chameleon Hashes.
IACR Cryptol. ePrint Arch., 2004

A Provably Secure Nyberg-Rueppel Signature Variant with Applications.
IACR Cryptol. ePrint Arch., 2004

2003
Identity-based Chameleon Hash and Applications.
IACR Cryptol. ePrint Arch., 2003

2002
Efficient Group Signatures without Trapdoors.
IACR Cryptol. ePrint Arch., 2002

Anonymous E-prescriptions.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Medical Information Privacy Assurance: Cryptographic and System Aspects.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption.
Proceedings of the Topics in Cryptology, 2002

2001
Extended capabilities for visual cryptography.
Theor. Comput. Sci., 2001

Quasi-Efficient Revocation of Group Signatures.
IACR Cryptol. ePrint Arch., 2001

TRICERT: A Distributed Certified E-Mail Scheme.
Proceedings of the Network and Distributed System Security Symposium, 2001

A new approach to DNS security (DNSSEC).
Proceedings of the CCS 2001, 2001

2000
New multiparty authentication services and key agreement protocols.
IEEE J. Sel. Areas Commun., 2000

Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
Proceedings of the Advances in Cryptology, 2000

1999
Untraceable mobility or how to travel incognito.
Comput. Networks, 1999

Group Signatures <i>Á la carte</i>.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

Some Open Issues and New Directions in Group Signatures.
Proceedings of the Financial Cryptography, 1999

Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures.
Proceedings of the CCS '99, 1999

1998
Authenticated Group Key Agreement and Friends.
Proceedings of the CCS '98, 1998

1996
Visual Cryptography for General Access Structures
Electron. Colloquium Comput. Complex., 1996

Constructions and Bounds for Visual Cryptography.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996


  Loading...