Stelvio Cimato
Orcid: 0000-0003-1737-6218Affiliations:
- University of Milan, Italy
According to our database1,
Stelvio Cimato
authored at least 102 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dti.unimi.it
On csauthors.net:
Bibliography
2024
Adv. Math. Commun., 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2023
J. Inf. Secur. Appl., November, 2023
J. Ambient Intell. Humaniz. Comput., 2023
2022
IEEE Trans. Computers, 2022
Comput. J., 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
Proceedings of the Complex, Intelligent and Software Intensive Systems, 2021
2020
Introduction to the special issue on deep learning for real-time information hiding and forensics.
J. Real Time Image Process., 2020
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem.
J. Inf. Secur. Appl., 2020
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
Proceedings of the Security and Trust Management - 15th International Workshop, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Business Information Systems Workshops, 2019
2018
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the From Database to Cyber Security, 2018
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based.
Proceedings of the Emerging Technologies for Developing Countries, 2018
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype.
Proceedings of the Emerging Technologies for Developing Countries, 2018
2017
Proceedings of the 2017 IFIP/IEEE International Conference on Very Large Scale Integration, 2017
Proceedings of the Euromicro Conference on Digital System Design, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
Proceedings of the Emerging Technologies for Developing Countries, 2017
2016
Proceedings of the Computational Intelligence and Quantitative Software Engineering, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Int. J. Inf. Sec., 2015
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015
2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Advanced Information Systems Engineering Workshops, 2013
2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Comput. Secur., 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the On the Move to Meaningful Internet Systems, 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
2009
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009
Proceedings of the Emerging Challenges for Security, 2009
2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
J. Syst. Softw., 2005
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Web Services, European Conference, 2004
2003
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003
2002
Proceedings of the Eleventh International World Wide Web Conference, 2002
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002
2001
Proceedings of the Theoretical Computer Science, 7th Italian Conference, 2001
Proceedings of the Information Security and Cryptology, 2001
1999
Specifying component-based Java applications (Short Paper).
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 1999
A Formal Approach to the Specification of Java Components.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999
1997
Ann. Softw. Eng., 1997
1996
Engineering Formal Requirements: Analysis and Testing.
Proceedings of the 8th International Conference on Software Engineering and Knowledge Engineering, 1996
Animating a Non-executable Formal Specification with a Distributed Symbolic Language.
Proceedings of the Design and Implementation of Symbolic Computation Systems, 1996
Analyzing and Animating Declarative Specifications.
Proceedings of the 1996 Joint Conf. on Declarative Programming, 1996