Sara Ricci

Orcid: 0000-0003-0842-4951

According to our database1, Sara Ricci authored at least 42 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Understanding Cybersecurity Education Gaps in Europe.
IEEE Trans. Educ., April, 2024

Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography.
IEEE Access, 2024

Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

Lattice-based Multisignature Optimization for RAM Constrained Devices.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Lattice-Based Threshold Signature Implementation for Constrained Devices.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

DJM-CYBER: A Joint Master in Advanced Cybersecurity.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Threshold Signature for Privacy-Preserving Blockchain.
Proceedings of the Business Process Management: Blockchain, Robotic Process Automation, and Central and Eastern Europe Forum, 2022

Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs.
IACR Cryptol. ePrint Arch., 2021

Privacy-preserving data splitting: a combinatorial approach.
Des. Codes Cryptogr., 2021

Privacy-Enhancing Group Signcryption Scheme.
IEEE Access, 2021

Post-Quantum Era Privacy Protection for Intelligent Infrastructures.
IEEE Access, 2021

Framework, Tools and Good Practices for Cybersecurity Curricula.
IEEE Access, 2021

Towards CRYSTALS-Kyber VHDL Implementation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Hardware-based Cryptographic Accelerator for Post Quantum Era.
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021

Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

PESTLE Analysis of Cybersecurity Education.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Cybersecurity Curricula Designer.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Secret Sharing-based Authenticated Key Agreement Protocol.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Privacy-Preserving Online Parking Based on Smart Contracts.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds.
Knowl. Inf. Syst., 2020

Hardware-Accelerated Cryptography for Software-Defined Networks with P4.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

2019
A Privacy-Enhancing Framework for Internet of Things Services.
IACR Cryptol. ePrint Arch., 2019

Local bounds for the optimal information ratio of secret sharing schemes.
Des. Codes Cryptogr., 2019

Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Privacy-enhancing Cloud Computing Solution for Big Data.
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019

Decentralized Privacy-preserving Access for Low Emission Zones.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Outsourcing Computation on Non-Encrypted SensitiveData to Untrusted Clouds.
PhD thesis, 2018

Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds.
Inf. Sci., 2018

Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Anonymous Data Collection Scheme from Short Group Signatures.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Anonymous Credentials with Practical Revocation using Elliptic Curves.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Methodology to Compare Anonymization Methods Regarding Their Risk-Utility Trade-off.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017

2016
Bounds on the Information Ratios of Secret Sharing Schemes for Close Access Structures.
IACR Cryptol. ePrint Arch., 2016

Privacy-Preserving Cloud-Based Statistical Analyses on Sensitive Categorical Data.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2016

2015
Disclosure risk assessment via record linkage by a maximum-knowledge attacker.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Privacy-preserving distributed statistical computation to a semi-honest multi-cloud.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015


  Loading...