Stelvio Cimato

Orcid: 0000-0003-1737-6218

Affiliations:
  • University of Milan, Italy


According to our database1, Stelvio Cimato authored at least 102 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Special Section Guest Editorial: Real-Time Image Steganography and Steganalysis.
Adv. Math. Commun., 2024

Efficient Secure Computation of Edit Distance on Genomic Data.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

A Sharded Blockchain Architecture for Healthcare Data.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
Role mining under User-Distribution cardinality constraint.
J. Inf. Secur. Appl., November, 2023

Heuristics for constrained role mining in the post-processing framework.
J. Ambient Intell. Humaniz. Comput., 2023

2022
Multiplicative Complexity of XOR Based Regular Functions.
IEEE Trans. Computers, 2022

Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints.
Comput. J., 2022

A Blockchain-based Trustworthy Cloud Services Digital Ecosystem.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services.
Proceedings of the Complex, Intelligent and Software Intensive Systems, 2021

2020
Introduction to the special issue on deep learning for real-time information hiding and forensics.
J. Real Time Image Process., 2020

A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem.
J. Inf. Secur. Appl., 2020

Managing Constraints in Role Based Access Control.
IEEE Access, 2020

Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

Untangling the XRP Ledger: Insights and Analysis.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

Towards Efficient and Secure Analysis of Large Datasets.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

A Model Driven Approach for Cyber Security Scenarios Deployment.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Towards Blockchain-Based E-Voting Systems.
Proceedings of the Business Information Systems Workshops, 2019

2018
PostProcessing in Constrained Role Mining.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

A Comparative Analysis of Current Cryptocurrencies.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Message from the SAPSE 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Are mHealth Apps Secure? A Case Study.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything.
Proceedings of the From Database to Cyber Security, 2018

Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based.
Proceedings of the Emerging Technologies for Developing Countries, 2018

Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype.
Proceedings of the Emerging Technologies for Developing Countries, 2018

2017
Pay-with-a-Selfie, a human-centred digital payment system.
CoRR, 2017

A multiple valued logic approach for the synthesis of garbled circuits.
Proceedings of the 2017 IFIP/IEEE International Conference on Very Large Scale Integration, 2017

Exploiting Quantum Gates in Secure Computation.
Proceedings of the Euromicro Conference on Digital System Design, 2017

PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency.
Proceedings of the Emerging Technologies for Developing Countries, 2017

2016
Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud.
Proceedings of the Computational Intelligence and Quantitative Software Engineering, 2016

3-Out-of-n Cheating Prevention Visual Cryptographic Schemes.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Message from the SAPSE Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Security and searchability in secret sharing-based data outsourcing.
Int. J. Inf. Sec., 2015

Toward Economic-Aware Risk Assessment on the Cloud.
IEEE Secur. Priv., 2015

Privacy-Preserving Query Processing by Multi-Party Computation.
Comput. J., 2015

Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

New Results for Partial Key Exposure on RSA with Exponent Blinding.
Proceedings of the SECRYPT 2015, 2015

Partial Key Exposure Attacks on RSA with Exponent Blinding.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Message from the Fast Abstract Chairs.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Message from the SAPSE 2015 Workshop Organizer.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

2014
Visual Cryptography Based Watermarking.
Trans. Data Hiding Multim. Secur., 2014

A risk model for cloud processes.
ISC Int. J. Inf. Secur., 2014

2013
Clustering Models in Secure Clustered Multiparty Computation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Towards the Certification of Cloud Services.
Proceedings of the IEEE Ninth World Congress on Services, 2013

A Multi-Party Protocol for Privacy-Preserving Range Queries.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

Visual Cryptography Schemes for Graph Based Access Structures.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
Constrained Role Mining.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Ensuring XML Integrity Using Watermarking Techniques.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Visual Cryptography Based Watermarking: Definition and Meaning.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Risk assessment of credit securities: The notion and the issues.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

2011
Biometric Privacy.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Collaborative Supply-Chain Management.
Computer, 2011

2010
Managing key hierarchies for access control enforcement: Heuristic approaches.
Comput. Secur., 2010

A simple role mining algorithm.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Distributed and Privacy-Preserving Method for Network Intrusion Detection.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

Using incentive schemes to alleviate supply chain risks.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Toward Cloud-Based Key Management for Outsourced Databases.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Privacy Preserving Risk Assessment of Credit Securities.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Proceedings of the Emerging Challenges for Security, 2009

2008
A Lightweight Protocol for Dynamic RFID Identification.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

A Multi-biometric Verification System for the Privacy Protection of Iris Templates.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Colored visual cryptography without color darkening.
Theor. Comput. Sci., 2007

A Biometric Verification System Addressing Privacy Concerns.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Visual cryptography schemes with optimal pixel expansion.
Theor. Comput. Sci., 2006

A unified model for unconditionally secure key distribution.
J. Comput. Secur., 2006

Probabilistic Visual Cryptography Schemes.
Comput. J., 2006

A Web Service Based Micro-payment System.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Overcoming the obfuscation of Java programs by identifier renaming.
J. Syst. Softw., 2005

Ideal contrast visual cryptography schemes with reversing.
Inf. Process. Lett., 2005

Secure E-Coupons.
Electron. Commer. Res., 2005

Optimal Colored Threshold Visual Cryptography Schemes.
Des. Codes Cryptogr., 2005

A Lightweight Approach to Authenticated Web Caching.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

Design and Implementation of an Inline Certified E-mail Service.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
A Software Infrastructure for Authenticated Web Metering.
Computer, 2004

A Platform for Secure E-Gambling.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Framework for Authenticated Web Services.
Proceedings of the Web Services, European Conference, 2004

2003
Modeling A Certified Email Protocol using I/O Automata.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

Contrast optimal colored visual cryptography schemes.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Certified Email: Design and Implementation of a New Optimistic Protocol..
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Anonymous Group Communication in Mobile Networks.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

2002
A note on optimal metering schemes.
Inf. Process. Lett., 2002

A lightweight protocol for the generation and distribution of secure e-coupons.
Proceedings of the Eleventh International World Wide Web Conference, 2002

SAWM: a tool for secure and authenticated web metering.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

2001
Online Advertising: Secure E-coupons.
Proceedings of the Theoretical Computer Science, 7th Italian Conference, 2001

Design of an Authentication Protocol for Gsm Javacards.
Proceedings of the Information Security and Cryptology, 2001

1999
Specifying component-based Java applications (Short Paper).
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 1999

A Formal Approach to the Specification of Java Components.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

1997
Engineering Formal Requirements: An Analysis and Testing Method for Z Documents.
Ann. Softw. Eng., 1997

1996
Engineering Formal Requirements: Analysis and Testing.
Proceedings of the 8th International Conference on Software Engineering and Knowledge Engineering, 1996

Animating a Non-executable Formal Specification with a Distributed Symbolic Language.
Proceedings of the Design and Implementation of Symbolic Computation Systems, 1996

Analyzing and Animating Declarative Specifications.
Proceedings of the 1996 Joint Conf. on Declarative Programming, 1996


  Loading...