Paolo Palmieri
Orcid: 0000-0002-9819-4880Affiliations:
- University College Cork, Department of Computer Science, Ireland (since 2017)
- Cranfield University, Cranfield Defence and Security, Shrivenam, UK (2016 - 2017)
- Bournemouth University, Department of Computing and Informatics, Poole, UK (2015 - 2016)
- Delft University of Technology, The Netherlands (2013 - 2015)
- Université Catholique de Louvain, Belgium (PhD 2013)
According to our database1,
Paolo Palmieri
authored at least 46 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
De-anonymisation of real-world location traces: two attacks based on the hidden Markov model.
J. Locat. Based Serv., July, 2024
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems.
J. Supercomput., March, 2024
A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi Localization.
IEEE Trans. Inf. Forensics Secur., 2024
A Novel Approach to E-Voting With Group Identity-Based Identification and Homomorphic Encryption Scheme.
IEEE Access, 2024
Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs.
IACR Cryptol. ePrint Arch., 2023
A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023
An Anonymous Multi-receiver Certificateless Hybrid Signcryption (AMCLHS) using mKEM-DEM for Broadcast Communication.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
Treating a different kind of patient: curing security weaknesses in digital health systems of the future.
Proceedings of the 9th International Workshop on Advances in Sensors and Interfaces, 2023
2022
J. Univers. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Two de-anonymization attacks on real-world location data based on a hidden Markov model.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
2021
Introduction to the special issue on privacy and security for location-based services and devices.
J. Inf. Secur. Appl., 2021
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher.
IACR Cryptol. ePrint Arch., 2021
Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning.
CAAI Trans. Intell. Technol., 2021
2020
A Survey of Advanced Encryption for Database Security: Primitives, Schemes, and Attacks.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
A secure, distributed and scalable infrastructure for remote generation and use of cryptographic keys.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020
2019
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019
2018
Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols.
IEEE Trans. Inf. Forensics Secur., 2018
Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
2017
J. Cyber Secur. Mobil., 2017
Private inter-network routing for Wireless Sensor Networks and the Internet of Things.
Proceedings of the Computing Frontiers Conference, 2017
2016
Anonymity networks and access to information during conflicts: Towards a distributed network organisation.
Proceedings of the 8th International Conference on Cyber Conflict, 2016
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
2015
Comput. Commun., 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?
Int. J. Inf. Manag., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Information and Computer Security, 2014
2013
Unconditional secure cooperation on real-world networks : the case of oblivious transfer.
PhD thesis, 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the Advances in Information and Computer Security, 2013
2012
Location-aware Mobile Services for a Smart City: Design, Implementation and Deployment.
J. Theor. Appl. Electron. Commer. Res., 2012
2011
Proceedings of the Provable Security - 5th International Conference, 2011
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010