Giuseppe Ateniese
Stevens Institute of Technology
H-index: 57
North America-United States
Top articles of Giuseppe Ateniese
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation | Cryptology ePrint Archive | Giuseppe Ateniese Foteini Baldimtsi Matteo Campanelli Danilo Francati Ioanna Karantaidou | 2023 |
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting) | Giuseppe Ateniese Long Chen Danilo Francati Dimitrios Papadopoulos Qiang Tang | 2023/5/2 | |
Distributed key secret for rewritable blockchain | 2023/4/27 | ||
Authentication processing service | 2023/1/24 | ||
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data | arXiv preprint arXiv:2301.07628 | Dario Pasquini Giuseppe Ateniese Carmela Troncoso | 2023/1/18 |
Watermarks in the sand: Impossibility of strong watermarking for generative models | arXiv preprint arXiv:2311.04378 | Hanlin Zhang Benjamin L Edelman Danilo Francati Daniele Venturi Giuseppe Ateniese | 2023/11/7 |
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services | Cryptology ePrint Archive | Dario Pasquini Danilo Francati Giuseppe Ateniese Evgenios M Kornaropoulos | 2023 |
System and process for generating passwords or password guesses | 2023/6/6 | ||
Preface-ACNS 2022 | LECTURE NOTES IN COMPUTER SCIENCE | D Venturi G Ateniese | 2022 |
Eluding secure aggregation in federated learning via model inconsistency | Dario Pasquini Danilo Francati Giuseppe Ateniese | 2022/11/7 | |
Blockchain operation stack for rewritable blockchain | 2022/10/4 | ||
Applied Cryptography and Network Security: 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings | Giuseppe Ateniese Daniele Venturi | 2022/6/17 | |
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications | IEEE Transactions on NanoBioscience | Jin-Woo Kim Jangho Kim Deok-Ho Kim | 2016/12 |
Immunization against complete subversion without random oracles | Theoretical Computer Science | Giuseppe Ateniese Danilo Francati Bernardo Magri Daniele Venturi | 2021/3/6 |
Reducing bias in modeling real-world password strength via deep learning and dynamic dictionaries | Dario Pasquini Marco Cianfriglia Giuseppe Ateniese Massimo Bernaschi | 2021 | |
Unleashing the tiger: Inference attacks on split learning | Dario Pasquini Giuseppe Ateniese Massimo Bernaschi | 2021/11/12 | |
Match me if you can: matchmaking encryption and its applications | Journal of Cryptology | Giuseppe Ateniese Danilo Francati David Nunez Daniele Venturi | 2021/7 |
Audita: A blockchain-based auditing framework for off-chain storage | Danilo Francati Giuseppe Ateniese Abdoulaye Faye Andrea Maria Milazzo Angelo Massimo Perillo | 2021/5/24 | |
Improving password guessing via representation learning | Dario Pasquini Ankit Gangwal Giuseppe Ateniese Massimo Bernaschi Mauro Conti | 2021/5/24 | |
Subversion-resilient signatures: Definitions, constructions and applications | Theoretical Computer Science | Giuseppe Ateniese Bernardo Magri Daniele Venturi | 2020/6/8 |