Giuseppe Persiano
Orcid: 0000-0001-6579-4807Affiliations:
- University of Salerno, Italy
According to our database1,
Giuseppe Persiano
authored at least 183 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on dia.unisa.it
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 51st International Colloquium on Automata, Languages, and Programming, 2024
2023
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography.
Proc. Priv. Enhancing Technol., October, 2023
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption.
Proc. Priv. Enhancing Technol., January, 2023
IACR Cryptol. ePrint Arch., 2023
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Algorithms and Complexity - 13th International Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Electron. Colloquium Comput. Complex., 2020
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
IACR Cryptol. ePrint Arch., 2019
Leakage Cell Probe Model: Lower Bounds for Key-Equality Mitigation in Encrypted Multi-Maps.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Electron. Colloquium Comput. Complex., 2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Statement from EATCS President and vice Presidents about the recent US travel restrictions to foreigners.
Bull. EATCS, 2017
Bull. EATCS, 2017
Proceedings of the Web and Internet Economics - 13th International Conference, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017
2016
Bull. EATCS, 2016
Discrete Preference Games in Heterogeneous Social Networks: Subverted Majorities and the Swing Player.
CoRR, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
2015
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles.
IACR Cryptol. ePrint Arch., 2015
Bull. EATCS, 2015
Algorithmica, 2015
Proceedings of the Web and Internet Economics - 11th International Conference, 2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Knowl. Inf. Syst., 2014
Impossibility Results for Leakage-Resilient Zero Knowledge and Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Bull. EATCS, 2014
CoRR, 2014
Ad Hoc Networks, 2014
Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014
2013
Theory Comput. Syst., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Algorithms - ESA 2013, 2013
2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Fun with Algorithms - 6th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Auton. Agents Multi Agent Syst., 2011
Auton. Agents Multi Agent Syst., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
2010
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Trustworthly Global Computing - 5th International Symposium, 2010
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
2009
Proceedings of the Encyclopedia of Optimization, Second Edition, 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009
Private-Key Hidden Vector Encryption with Key Privacy.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
SIAM J. Comput., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Internet and Network Economics, 4th International Workshop, 2008
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Computer Security, 2008
Proceedings of the Computer Security, 2008
Proceedings of the ECOWS 2008, 2008
2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
2006
Proceedings of the Efficient Approximation and Online Algorithms, 2006
IACR Cryptol. ePrint Arch., 2006
Electron. Colloquium Comput. Complex., 2006
Discret. Appl. Math., 2006
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model.
Proceedings of the Mathematical Foundations of Computer Science 2006, 2006
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the STACS 2004, 2004
Proceedings of the SPAA 2004: Proceedings of the Sixteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2004
On NC<sup>1</sup> Boolean Circuit Composition of Non-interactive Perfect Zero-Knowledge.
Proceedings of the Mathematical Foundations of Computer Science 2004, 2004
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004
Proceedings of the Financial Cryptography, 2004
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model.
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
2003
ACM Trans. Inf. Syst. Secur., 2003
Proceedings of the Approximation and Online Algorithms, First International Workshop, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Randomization and Approximation Techniques, 6th International Workshop, 2002
2001
Theor. Comput. Sci., 2001
Comput. Artif. Intell., 2001
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001
Optimal and Approximate Station Placement in Networks (With Applications to Multicasting and Space Efficient Traversals).
Proceedings of the STACS 2001, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Necessary and Sufficient Assumptions for Non-iterative Zero-Knowledge Proofs of Knowledge for All NP Relations.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
Efficient Automatic Simulation of Parallel Computation on Network of Workstations.
Proceedings of the ICALP Workshops 2000, 2000
User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol.
Proceedings of the CCS 2000, 2000
1999
Inf. Process. Lett., 1999
Algorithmica, 1999
Proceedings of the Distributed Computing, 1999
Proceedings of the Automata, 1999
1998
Placing Resources on a Growing Line.
J. Algorithms, 1998
Electron. Colloquium Comput. Complex., 1998
Wavelength Routing of Symmetric Communication Requests in Directed Fiber Trees.
Proceedings of the SIROCCO'98, 1998
Proceedings of the Mathematical Foundations of Computer Science 1998, 1998
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
Proceedings of the Multichannel Optical Networks: Theory and Practice, 1998
Proceedings of the CCS '98, 1998
1997
Bandwidth Allocation Algorithms on Tree-Shaped All-Optical Networks with Wavelength Converters.
Proceedings of the SIROCCO'97, 1997
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997
Proceedings of the Network Design: Connectivity and Facilities Location, 1997
1996
Theor. Comput. Sci., 1996
The Power of Preprocessing in Zero-Knowledge Proofs of Knowledge.
J. Cryptol., 1996
Inf. Process. Lett., 1996
Proceedings of the Algorithms, 1996
Proceedings of the Algorithms, 1996
1995
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995
1994
Theor. Comput. Sci., 1994
SIAM J. Comput., 1994
Parallel Process. Lett., 1994
Math. Syst. Theory, 1994
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the Advances in Cryptology, 1993
1992
Communication Efficient Zero-Knowledge Proofs of Knowledge (With Applications to Electronic Cash).
Proceedings of the STACS 92, 1992
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, 1992
1991
Proceedings of the IEEE Data Compression Conference, 1991
1990
Proceedings of the Advances in Cryptology, 1990
1988
Proceedings of the Advances in Cryptology, 1988
1987
Proceedings of the Advances in Cryptology, 1987