default search action
Stelvio Cimato
Person information
- affiliation: University of Milan, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j27]Shi Dong, Stelvio Cimato, Joarder Kamruzzaman, Yongsheng Hao:
Special Section Guest Editorial: Real-Time Image Steganography and Steganalysis. J. Electronic Imaging 33(1) (2024) - [c73]Jahanzeb Shahid, Stelvio Cimato, Muhammad Zia:
A Sharded Blockchain Architecture for Healthcare Data. COMPSAC 2024: 1794-1799 - [c72]Andrea Migliore, Stelvio Cimato, Gabriella Trucco:
Efficient Secure Computation of Edit Distance on Genomic Data. ICISSP 2024: 878-883 - 2023
- [j26]Carlo Blundo, Stelvio Cimato:
Role mining under User-Distribution cardinality constraint. J. Inf. Secur. Appl. 78: 103611 (2023) - [j25]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
Heuristics for constrained role mining in the post-processing framework. J. Ambient Intell. Humaniz. Comput. 14(8): 9925-9937 (2023) - 2022
- [j24]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints. Comput. J. 65(6): 1386-1411 (2022) - [j23]Anna Bernasconi, Stelvio Cimato, Valentina Ciriani, Maria Chiara Molteni:
Multiplicative Complexity of XOR Based Regular Functions. IEEE Trans. Computers 71(11): 2927-2939 (2022) - [c71]Emanuele Bellini, Iolanda Aversa, Stelvio Cimato, Antonio Esposito:
A Blockchain-based Trustworthy Cloud Services Digital Ecosystem. CSR 2022: 118-124 - 2021
- [c70]Emanuele Bellini, Stelvio Cimato, Ernesto Damiani, Beniamino Di Martino, Antonio Esposito:
Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services. CISIS 2021: 606-615 - 2020
- [j22]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
Managing Constraints in Role Based Access Control. IEEE Access 8: 140497-140511 (2020) - [j21]Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani:
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem. J. Inf. Secur. Appl. 51: 102462 (2020) - [j20]Zhili Zhou, Ching-Nung Yang, Cheonshik Kim, Stelvio Cimato:
Introduction to the special issue on deep learning for real-time information hiding and forensics. J. Real Time Image Process. 17(1): 1-5 (2020) - [c69]Lara Mauri, Ernesto Damiani, Stelvio Cimato:
Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work. CLOUD 2020: 53-62 - [c68]Stelvio Cimato, Stefano Nicolò:
Towards Efficient and Secure Analysis of Large Datasets. COMPSAC 2020: 1351-1356 - [c67]Anna Bernasconi, Stelvio Cimato, Valentina Ciriani, Maria Chiara Molteni:
Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security. DAC 2020: 1-6 - [c66]Lara Mauri, Stelvio Cimato, Ernesto Damiani:
Untangling the XRP Ledger: Insights and Analysis. ICISSP (Revised Selected Papers) 2020: 48-72 - [c65]Lara Mauri, Stelvio Cimato, Ernesto Damiani:
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol. ICISSP 2020: 52-63 - [c64]Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Elvinia Riccobene, Sadegh Astaneh:
Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges. MSTEC 2020: 79-91
2010 – 2019
- 2019
- [c63]Chiara Braghin, Stelvio Cimato, Simone Raimondi Cominesi, Ernesto Damiani, Lara Mauri:
Towards Blockchain-Based E-Voting Systems. BIS (Workshops) 2019: 274-286 - [c62]Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Lara Mauri, Elvinia Riccobene:
A Model Driven Approach for Cyber Security Scenarios Deployment. IOSec/MSTEC/FINSEC@ESORICS 2019: 107-122 - [c61]Stelvio Cimato, Valentina Ciriani, Ernesto Damiani, Maryam Ehsanpour:
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits. STM 2019: 158-167 - [e9]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - [e8]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - 2018
- [c60]Perpetus Jacques Houngbo, Joël T. Hounsou, Ernesto Damiani, Rasool Asal, Stelvio Cimato, Fulvio Frati, Chan Yeob Yeun:
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype. AFRICATEK 2018: 47-56 - [c59]Perpetus Jacques Houngbo, Joël T. Hounsou, Ernesto Damiani, Rasool Asal, Stelvio Cimato, Fulvio Frati, Chan Yeob Yeun:
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based. AFRICATEK 2018: 109-124 - [c58]Stelvio Cimato, Ernesto Damiani:
Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything. From Database to Cyber Security 2018: 113-124 - [c57]Chiara Braghin, Stelvio Cimato, Alessio Della Libera:
Are mHealth Apps Secure? A Case Study. COMPSAC (2) 2018: 335-340 - [c56]Stelvio Cimato:
Message from the SAPSE 2018 Workshop Organizers. COMPSAC (2) 2018: 688 - [c55]Lara Mauri, Stelvio Cimato, Ernesto Damiani:
A Comparative Analysis of Current Cryptocurrencies. ICISSP 2018: 127-138 - [c54]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
PostProcessing in Constrained Role Mining. IDEAL (1) 2018: 204-214 - [e7]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1. IEEE Computer Society 2018, ISBN 978-1-5386-2667-2 [contents] - [e6]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2. IEEE Computer Society 2018 [contents] - 2017
- [c53]Ernesto Damiani, Perpetus Jacques Houngbo, Joël T. Hounsou, Rasool Asal, Stelvio Cimato, Fulvio Frati, Dina Shehada, Chan Yeob Yeun:
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency. AFRICATEK 2017: 159-168 - [c52]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud. SCC@AsiaCCS 2017: 67-74 - [c51]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining. COMPSAC (2) 2017: 149-154 - [c50]Maryam Ehsanpour, Stelvio Cimato, Valentina Ciriani, Ernesto Damiani:
Exploiting Quantum Gates in Secure Computation. DSD 2017: 291-294 - [c49]Stelvio Cimato, Valentina Ciriani, Ernesto Damiani, Maryam Ehsanpour:
A multiple valued logic approach for the synthesis of garbled circuits. VLSI-SoC 2017: 1-5 - [e5]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1. IEEE Computer Society 2017, ISBN 978-1-5386-0367-3 [contents] - [e4]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2. IEEE Computer Society 2017 [contents] - [i3]Ernesto Damiani, Perpetus Jacques Houngbo, Rasool Asal, Stelvio Cimato, Fulvio Frati, Joël T. Hounsou, Dina Shehada, Chan Yeob Yeun:
Pay-with-a-Selfie, a human-centred digital payment system. CoRR abs/1706.07187 (2017) - 2016
- [c48]Stelvio Cimato:
Message from the SAPSE Workshop Organizers. COMPSAC Workshops 2016: 354 - [c47]Stelvio Cimato, Ernesto Damiani, Silvia Mella, Ching-Nung Yang:
Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks. ICCCS (1) 2016: 456-467 - [c46]Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai:
3-Out-of-n Cheating Prevention Visual Cryptographic Schemes. ICISSP 2016: 400-406 - [p1]Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud. Computational Intelligence and Quantitative Software Engineering 2016: 173-207 - 2015
- [j19]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
Privacy-Preserving Query Processing by Multi-Party Computation. Comput. J. 58(10): 2195-2212 (2015) - [j18]Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini, Antonio Zilli:
Toward Economic-Aware Risk Assessment on the Cloud. IEEE Secur. Priv. 13(6): 30-37 (2015) - [j17]Mohammad Ali Hadavi, Rasool Jalili, Ernesto Damiani, Stelvio Cimato:
Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Sec. 14(6): 513-529 (2015) - [c45]Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Joël T. Hounsou, Judicaël Tandjiékpon:
Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography. AFRICOMM 2015: 136-141 - [c44]Stelvio Cimato:
Message from the SAPSE 2015 Workshop Organizer. COMPSAC Workshops 2015: 3 - [c43]Hossain Shahriar, Stelvio Cimato, Jingyu Zhou, Katsuyoshi Iida:
Message from the Fast Abstract Chairs. COMPSAC Workshops 2015: 635 - [c42]Stelvio Cimato, Silvia Mella, Ruggero Susella:
Partial Key Exposure Attacks on RSA with Exponent Blinding. ICETE (Selected Papers) 2015: 364-385 - [c41]Stelvio Cimato, Silvia Mella, Ruggero Susella:
New Results for Partial Key Exposure on RSA with Exponent Blinding. SECRYPT 2015: 136-147 - [c40]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani, Chan Yeob Yeun:
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries. TrustCom/BigDataSE/ISPA (1) 2015: 1357-1362 - 2014
- [j16]Ernesto Damiani, Stelvio Cimato, Gabriele Gianini:
A risk model for cloud processes. ISC Int. J. Inf. Secur. 6(2): 99-123 (2014) - [j15]Stelvio Cimato, James C. N. Yang, Chih-Cheng Wu:
Visual Cryptography Based Watermarking. Trans. Data Hiding Multim. Secur. 9: 91-109 (2014) - 2013
- [j14]Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani:
Clustering Models in Secure Clustered Multiparty Computation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(2): 63-76 (2013) - [c39]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test. CAiSE Workshops 2013: 466-477 - [c38]Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani:
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol. ICT-EurAsia 2013: 447-452 - [c37]Stelvio Cimato:
Visual Cryptography Schemes for Graph Based Access Structures. IIH-MSP 2013: 365-368 - [c36]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
A Multi-Party Protocol for Privacy-Preserving Range Queries. Secure Data Management 2013: 108-120 - [c35]Stelvio Cimato, Ernesto Damiani, Francesco Zavatarelli, Renato Menicocci:
Towards the Certification of Cloud Services. SERVICES 2013: 92-97 - 2012
- [c34]Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Risk assessment of credit securities: The notion and the issues. DEST 2012: 1-5 - [c33]Mohammad Ali Hadavi, Ernesto Damiani, Rasool Jalili, Stelvio Cimato, Zeinab Ganjei:
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing. DPM/SETOP 2012: 201-216 - [c32]Stelvio Cimato, Ching-Nung Yang, Chih-Cheng Wu:
Visual Cryptography Based Watermarking: Definition and Meaning. IWDW 2012: 435-448 - [c31]Romaric Tchokpon, Stelvio Cimato, Nadia Bennani:
Ensuring XML Integrity Using Watermarking Techniques. SITIS 2012: 668-674 - [c30]Carlo Blundo, Stelvio Cimato:
Constrained Role Mining. STM 2012: 289-304 - [i2]Carlo Blundo, Stelvio Cimato:
Constrained Role Mining. CoRR abs/1203.3744 (2012) - 2011
- [j13]Florian Kerschbaum, Axel Schröpfer, Antonio Zilli, Richard Pibernik, Octavian Catrina, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato, Ernesto Damiani:
Secure Collaborative Supply-Chain Management. Computer 44(9): 38-43 (2011) - [r1]Fabio Scotti, Stelvio Cimato, Roberto Sassi:
Biometric Privacy. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 101-104 - 2010
- [j12]Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Managing key hierarchies for access control enforcement: Heuristic approaches. Comput. Secur. 29(5): 533-547 (2010) - [c29]Nadia Bennani, Ernesto Damiani, Stelvio Cimato:
Toward Cloud-Based Key Management for Outsourced Databases. COMPSAC Workshops 2010: 232-236 - [c28]Marco Anisetti, Ernesto Damiani, Fulvio Frati, Stelvio Cimato, Gabriele Gianini:
Using incentive schemes to alleviate supply chain risks. MEDES 2010: 221-228 - [c27]Fatiha Benali, Nadia Bennani, Gabriele Gianini, Stelvio Cimato:
A Distributed and Privacy-Preserving Method for Network Intrusion Detection. OTM Conferences (2) 2010: 861-875 - [c26]Carlo Blundo, Stelvio Cimato:
A simple role mining algorithm. SAC 2010: 1958-1962
2000 – 2009
- 2009
- [c25]Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. SEC 2009: 364-375 - [c24]Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Privacy Preserving Risk Assessment of Credit Securities. SITIS 2009: 506-513 - 2008
- [c23]Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti:
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System. ACSAC 2008: 130-139 - [c22]Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti:
A Multi-biometric Verification System for the Privacy Protection of Iris Templates. CISIS 2008: 227-234 - [c21]Stelvio Cimato:
A Lightweight Protocol for Dynamic RFID Identification. COMPSAC 2008: 673-678 - [e3]Sushil Jajodia, Pierangela Samarati, Stelvio Cimato:
Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy. IFIP 278, Springer 2008, ISBN 978-0-387-09698-8 [contents] - 2007
- [j11]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1-3): 261-276 (2007) - [c20]Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti:
A Biometric Verification System Addressing Privacy Concerns. CIS 2007: 594-598 - 2006
- [j10]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Probabilistic Visual Cryptography Schemes. Comput. J. 49(1): 97-107 (2006) - [j9]Stelvio Cimato, Antonella Cresti, Paolo D'Arco:
A unified model for unconditionally secure key distribution. J. Comput. Secur. 14(1): 45-64 (2006) - [j8]Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual cryptography schemes with optimal pixel expansion. Theor. Comput. Sci. 369(1-3): 169-182 (2006) - [c19]Vincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato:
A Web Service Based Micro-payment System. ISCC 2006: 328-333 - [i1]Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual Cryptography Schemes with Optimal Pixel Expansion. IACR Cryptol. ePrint Arch. 2006: 170 (2006) - 2005
- [j7]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Optimal Colored Threshold Visual Cryptography Schemes. Des. Codes Cryptogr. 35(3): 311-335 (2005) - [j6]Carlo Blundo, Stelvio Cimato, Annalisa De Bonis:
Secure E-Coupons. Electron. Commer. Res. 5(1): 117-139 (2005) - [j5]Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4): 199-206 (2005) - [j4]Stelvio Cimato, Alfredo De Santis, Umberto Ferraro Petrillo:
Overcoming the obfuscation of Java programs by identifier renaming. J. Syst. Softw. 78(1): 60-72 (2005) - [c18]Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco:
Design and Implementation of an Inline Certified E-mail Service. CANS 2005: 186-199 - [c17]Carlo Blundo, Stelvio Cimato, Roberto De Prisco:
A Lightweight Approach to Authenticated Web Caching. SAINT 2005: 157-163 - [e2]Carlo Blundo, Stelvio Cimato:
Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3352, Springer 2005, ISBN 3-540-24301-1 [contents] - 2004
- [j3]Carlo Blundo, Stelvio Cimato:
A Software Infrastructure for Authenticated Web Metering. Computer 37(4): 28-33 (2004) - [c16]Carlo Blundo, Stelvio Cimato:
A Framework for Authenticated Web Services. ECOWS 2004: 61-71 - [c15]Carlo Blundo, Stelvio Cimato:
A Platform for Secure E-Gambling. ITCC (2) 2004: 768-772 - [c14]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Colored Visual Cryptography Without Color Darkening. SCN 2004: 235-248 - 2003
- [c13]Stelvio Cimato, Paolo D'Arco, Ivan Visconti:
Anonymous Group Communication in Mobile Networks. ICTCS 2003: 316-328 - [c12]Carlo Blundo, Stelvio Cimato, Roberto De Prisco:
Certified Email: Design and Implementation of a New Optimistic Protocol.. ISCC 2003: 828-833 - [c11]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Contrast optimal colored visual cryptography schemes. ITW 2003: 139-142 - [c10]Carlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara:
Modeling A Certified Email Protocol using I/O Automata. MEFISTO 2003: 339-359 - [e1]Stelvio Cimato, Clemente Galdi, Giuseppe Persiano:
Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers. Lecture Notes in Computer Science 2576, Springer 2003, ISBN 3-540-00420-3 [contents] - 2002
- [j2]Carlo Blundo, Stelvio Cimato, Barbara Masucci:
A note on optimal metering schemes. Inf. Process. Lett. 84(6): 319-326 (2002) - [c9]Carlo Blundo, Stelvio Cimato:
SAWM: a tool for secure and authenticated web metering. SEKE 2002: 641-648 - [c8]Carlo Blundo, Stelvio Cimato, Annalisa De Bonis:
A lightweight protocol for the generation and distribution of secure e-coupons. WWW 2002: 542-552 - 2001
- [c7]Stelvio Cimato:
Design of an Authentication Protocol for Gsm Javacards. ICISC 2001: 355-368 - [c6]Stelvio Cimato, Annalisa De Bonis:
Online Advertising: Secure E-coupons. ICTCS 2001: 370-383
1990 – 1999
- 1999
- [c5]Stelvio Cimato, Paolo Ciancarini:
A Formal Approach to the Specification of Java Components. ECOOP Workshops 1999: 107-108 - [c4]Stelvio Cimato:
Specifying component-based Java applications (Short Paper). FMOODS 1999 - 1997
- [j1]Paolo Ciancarini, Stelvio Cimato, Cecilia Mascolo:
Engineering Formal Requirements: An Analysis and Testing Method for Z Documents. Ann. Softw. Eng. 3: 189-219 (1997) - 1996
- [c3]Stelvio Cimato, Cecilia Mascolo:
Analyzing and Animating Declarative Specifications. APPIA-GULP-PRODE 1996: 295-308 - [c2]Paolo Ciancarini, Stelvio Cimato:
Animating a Non-executable Formal Specification with a Distributed Symbolic Language. DISCO 1996: 200-201 - [c1]