default search action
Stelvio Cimato
Person information
- affiliation: University of Milan, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Shi Dong, Stelvio Cimato, Joarder Kamruzzaman, Yongsheng Hao:
Special Section Guest Editorial: Real-Time Image Steganography and Steganalysis. J. Electronic Imaging 33(1) (2024) - [c73]Jahanzeb Shahid, Stelvio Cimato, Muhammad Zia:
A Sharded Blockchain Architecture for Healthcare Data. COMPSAC 2024: 1794-1799 - [c72]Andrea Migliore, Stelvio Cimato, Gabriella Trucco:
Efficient Secure Computation of Edit Distance on Genomic Data. ICISSP 2024: 878-883 - 2023
- [j26]Carlo Blundo, Stelvio Cimato:
Role mining under User-Distribution cardinality constraint. J. Inf. Secur. Appl. 78: 103611 (2023) - [j25]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
Heuristics for constrained role mining in the post-processing framework. J. Ambient Intell. Humaniz. Comput. 14(8): 9925-9937 (2023) - 2022
- [j24]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints. Comput. J. 65(6): 1386-1411 (2022) - [j23]Anna Bernasconi, Stelvio Cimato, Valentina Ciriani, Maria Chiara Molteni:
Multiplicative Complexity of XOR Based Regular Functions. IEEE Trans. Computers 71(11): 2927-2939 (2022) - [c71]Emanuele Bellini, Iolanda Aversa, Stelvio Cimato, Antonio Esposito:
A Blockchain-based Trustworthy Cloud Services Digital Ecosystem. CSR 2022: 118-124 - 2021
- [c70]Emanuele Bellini, Stelvio Cimato, Ernesto Damiani, Beniamino Di Martino, Antonio Esposito:
Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services. CISIS 2021: 606-615 - 2020
- [j22]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
Managing Constraints in Role Based Access Control. IEEE Access 8: 140497-140511 (2020) - [j21]Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani:
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem. J. Inf. Secur. Appl. 51: 102462 (2020) - [j20]Zhili Zhou, Ching-Nung Yang, Cheonshik Kim, Stelvio Cimato:
Introduction to the special issue on deep learning for real-time information hiding and forensics. J. Real Time Image Process. 17(1): 1-5 (2020) - [c69]Lara Mauri, Ernesto Damiani, Stelvio Cimato:
Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work. CLOUD 2020: 53-62 - [c68]Stelvio Cimato, Stefano Nicolò:
Towards Efficient and Secure Analysis of Large Datasets. COMPSAC 2020: 1351-1356 - [c67]Anna Bernasconi, Stelvio Cimato, Valentina Ciriani, Maria Chiara Molteni:
Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security. DAC 2020: 1-6 - [c66]Lara Mauri, Stelvio Cimato, Ernesto Damiani:
Untangling the XRP Ledger: Insights and Analysis. ICISSP (Revised Selected Papers) 2020: 48-72 - [c65]Lara Mauri, Stelvio Cimato, Ernesto Damiani:
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol. ICISSP 2020: 52-63 - [c64]Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Elvinia Riccobene, Sadegh Astaneh:
Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges. MSTEC 2020: 79-91
2010 – 2019
- 2019
- [c63]Chiara Braghin, Stelvio Cimato, Simone Raimondi Cominesi, Ernesto Damiani, Lara Mauri:
Towards Blockchain-Based E-Voting Systems. BIS (Workshops) 2019: 274-286 - [c62]Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Lara Mauri, Elvinia Riccobene:
A Model Driven Approach for Cyber Security Scenarios Deployment. IOSec/MSTEC/FINSEC@ESORICS 2019: 107-122 - [c61]Stelvio Cimato, Valentina Ciriani, Ernesto Damiani, Maryam Ehsanpour:
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits. STM 2019: 158-167 - [e9]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - [e8]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - 2018
- [c60]Perpetus Jacques Houngbo, Joël T. Hounsou, Ernesto Damiani, Rasool Asal, Stelvio Cimato, Fulvio Frati, Chan Yeob Yeun:
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype. AFRICATEK 2018: 47-56 - [c59]Perpetus Jacques Houngbo, Joël T. Hounsou, Ernesto Damiani, Rasool Asal, Stelvio Cimato, Fulvio Frati, Chan Yeob Yeun:
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based. AFRICATEK 2018: 109-124 - [c58]Stelvio Cimato, Ernesto Damiani:
Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything. From Database to Cyber Security 2018: 113-124 - [c57]Chiara Braghin, Stelvio Cimato, Alessio Della Libera:
Are mHealth Apps Secure? A Case Study. COMPSAC (2) 2018: 335-340 - [c56]Stelvio Cimato:
Message from the SAPSE 2018 Workshop Organizers. COMPSAC (2) 2018: 688 - [c55]Lara Mauri, Stelvio Cimato, Ernesto Damiani:
A Comparative Analysis of Current Cryptocurrencies. ICISSP 2018: 127-138 - [c54]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
PostProcessing in Constrained Role Mining. IDEAL (1) 2018: 204-214 - [e7]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1. IEEE Computer Society 2018, ISBN 978-1-5386-2667-2 [contents] - [e6]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2. IEEE Computer Society 2018 [contents] - 2017
- [c53]Ernesto Damiani, Perpetus Jacques Houngbo, Joël T. Hounsou, Rasool Asal, Stelvio Cimato, Fulvio Frati, Dina Shehada, Chan Yeob Yeun:
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency. AFRICATEK 2017: 159-168 - [c52]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud. SCC@AsiaCCS 2017: 67-74 - [c51]Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining. COMPSAC (2) 2017: 149-154 - [c50]Maryam Ehsanpour, Stelvio Cimato, Valentina Ciriani, Ernesto Damiani:
Exploiting Quantum Gates in Secure Computation. DSD 2017: 291-294 - [c49]Stelvio Cimato, Valentina Ciriani, Ernesto Damiani, Maryam Ehsanpour:
A multiple valued logic approach for the synthesis of garbled circuits. VLSI-SoC 2017: 1-5 - [e5]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1. IEEE Computer Society 2017, ISBN 978-1-5386-0367-3 [contents] - [e4]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2. IEEE Computer Society 2017 [contents] - [i3]Ernesto Damiani, Perpetus Jacques Houngbo, Rasool Asal, Stelvio Cimato, Fulvio Frati, Joël T. Hounsou, Dina Shehada, Chan Yeob Yeun:
Pay-with-a-Selfie, a human-centred digital payment system. CoRR abs/1706.07187 (2017) - 2016
- [c48]Stelvio Cimato:
Message from the SAPSE Workshop Organizers. COMPSAC Workshops 2016: 354 - [c47]Stelvio Cimato, Ernesto Damiani, Silvia Mella, Ching-Nung Yang:
Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks. ICCCS (1) 2016: 456-467 - [c46]Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai:
3-Out-of-n Cheating Prevention Visual Cryptographic Schemes. ICISSP 2016: 400-406 - [p1]Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud. Computational Intelligence and Quantitative Software Engineering 2016: 173-207 - 2015
- [j19]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
Privacy-Preserving Query Processing by Multi-Party Computation. Comput. J. 58(10): 2195-2212 (2015) - [j18]Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini, Antonio Zilli:
Toward Economic-Aware Risk Assessment on the Cloud. IEEE Secur. Priv. 13(6): 30-37 (2015) - [j17]Mohammad Ali Hadavi, Rasool Jalili, Ernesto Damiani, Stelvio Cimato:
Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Sec. 14(6): 513-529 (2015) - [c45]Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Joël T. Hounsou, Judicaël Tandjiékpon:
Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography. AFRICOMM 2015: 136-141 - [c44]Stelvio Cimato:
Message from the SAPSE 2015 Workshop Organizer. COMPSAC Workshops 2015: 3 - [c43]Hossain Shahriar, Stelvio Cimato, Jingyu Zhou, Katsuyoshi Iida:
Message from the Fast Abstract Chairs. COMPSAC Workshops 2015: 635 - [c42]Stelvio Cimato, Silvia Mella, Ruggero Susella:
Partial Key Exposure Attacks on RSA with Exponent Blinding. ICETE (Selected Papers) 2015: 364-385 - [c41]Stelvio Cimato, Silvia Mella, Ruggero Susella:
New Results for Partial Key Exposure on RSA with Exponent Blinding. SECRYPT 2015: 136-147 - [c40]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani, Chan Yeob Yeun:
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries. TrustCom/BigDataSE/ISPA (1) 2015: 1357-1362 - 2014
- [j16]Ernesto Damiani, Stelvio Cimato, Gabriele Gianini:
A risk model for cloud processes. ISC Int. J. Inf. Secur. 6(2): 99-123 (2014) - [j15]Stelvio Cimato, James C. N. Yang, Chih-Cheng Wu:
Visual Cryptography Based Watermarking. Trans. Data Hiding Multim. Secur. 9: 91-109 (2014) - 2013
- [j14]Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani:
Clustering Models in Secure Clustered Multiparty Computation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(2): 63-76 (2013) - [c39]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test. CAiSE Workshops 2013: 466-477 - [c38]Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani:
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol. ICT-EurAsia 2013: 447-452 - [c37]Stelvio Cimato:
Visual Cryptography Schemes for Graph Based Access Structures. IIH-MSP 2013: 365-368 - [c36]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
A Multi-Party Protocol for Privacy-Preserving Range Queries. Secure Data Management 2013: 108-120 - [c35]Stelvio Cimato, Ernesto Damiani, Francesco Zavatarelli, Renato Menicocci:
Towards the Certification of Cloud Services. SERVICES 2013: 92-97 - 2012
- [c34]Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Risk assessment of credit securities: The notion and the issues. DEST 2012: 1-5 - [c33]Mohammad Ali Hadavi, Ernesto Damiani, Rasool Jalili, Stelvio Cimato, Zeinab Ganjei:
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing. DPM/SETOP 2012: 201-216 - [c32]Stelvio Cimato, Ching-Nung Yang, Chih-Cheng Wu:
Visual Cryptography Based Watermarking: Definition and Meaning. IWDW 2012: 435-448 - [c31]Romaric Tchokpon, Stelvio Cimato, Nadia Bennani:
Ensuring XML Integrity Using Watermarking Techniques. SITIS 2012: 668-674 - [c30]Carlo Blundo, Stelvio Cimato:
Constrained Role Mining. STM 2012: 289-304 - [i2]Carlo Blundo, Stelvio Cimato:
Constrained Role Mining. CoRR abs/1203.3744 (2012) - 2011
- [j13]Florian Kerschbaum, Axel Schröpfer, Antonio Zilli, Richard Pibernik, Octavian Catrina, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato, Ernesto Damiani:
Secure Collaborative Supply-Chain Management. Computer 44(9): 38-43 (2011) - [r1]Fabio Scotti, Stelvio Cimato, Roberto Sassi:
Biometric Privacy. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 101-104 - 2010
- [j12]Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Managing key hierarchies for access control enforcement: Heuristic approaches. Comput. Secur. 29(5): 533-547 (2010) - [c29]Nadia Bennani, Ernesto Damiani, Stelvio Cimato:
Toward Cloud-Based Key Management for Outsourced Databases. COMPSAC Workshops 2010: 232-236 - [c28]Marco Anisetti, Ernesto Damiani, Fulvio Frati, Stelvio Cimato, Gabriele Gianini:
Using incentive schemes to alleviate supply chain risks. MEDES 2010: 221-228 - [c27]Fatiha Benali, Nadia Bennani, Gabriele Gianini, Stelvio Cimato:
A Distributed and Privacy-Preserving Method for Network Intrusion Detection. OTM Conferences (2) 2010: 861-875 - [c26]Carlo Blundo, Stelvio Cimato:
A simple role mining algorithm. SAC 2010: 1958-1962
2000 – 2009
- 2009
- [c25]Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. SEC 2009: 364-375 - [c24]Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Privacy Preserving Risk Assessment of Credit Securities. SITIS 2009: 506-513 - 2008
- [c23]Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti:
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System. ACSAC 2008: 130-139 - [c22]Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti:
A Multi-biometric Verification System for the Privacy Protection of Iris Templates. CISIS 2008: 227-234 - [c21]Stelvio Cimato:
A Lightweight Protocol for Dynamic RFID Identification. COMPSAC 2008: 673-678 - [e3]Sushil Jajodia, Pierangela Samarati, Stelvio Cimato:
Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy. IFIP 278, Springer 2008, ISBN 978-0-387-09698-8 [contents] - 2007
- [j11]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1-3): 261-276 (2007) - [c20]Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti:
A Biometric Verification System Addressing Privacy Concerns. CIS 2007: 594-598 - 2006
- [j10]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Probabilistic Visual Cryptography Schemes. Comput. J. 49(1): 97-107 (2006) - [j9]Stelvio Cimato, Antonella Cresti, Paolo D'Arco:
A unified model for unconditionally secure key distribution. J. Comput. Secur. 14(1): 45-64 (2006) - [j8]Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual cryptography schemes with optimal pixel expansion. Theor. Comput. Sci. 369(1-3): 169-182 (2006) - [c19]Vincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato:
A Web Service Based Micro-payment System. ISCC 2006: 328-333 - [i1]Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual Cryptography Schemes with Optimal Pixel Expansion. IACR Cryptol. ePrint Arch. 2006: 170 (2006) - 2005
- [j7]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Optimal Colored Threshold Visual Cryptography Schemes. Des. Codes Cryptogr. 35(3): 311-335 (2005) - [j6]Carlo Blundo, Stelvio Cimato, Annalisa De Bonis:
Secure E-Coupons. Electron. Commer. Res. 5(1): 117-139 (2005) - [j5]Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4): 199-206 (2005) - [j4]Stelvio Cimato, Alfredo De Santis, Umberto Ferraro Petrillo:
Overcoming the obfuscation of Java programs by identifier renaming. J. Syst. Softw. 78(1): 60-72 (2005) - [c18]Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco:
Design and Implementation of an Inline Certified E-mail Service. CANS 2005: 186-199 - [c17]Carlo Blundo, Stelvio Cimato, Roberto De Prisco:
A Lightweight Approach to Authenticated Web Caching. SAINT 2005: 157-163 - [e2]Carlo Blundo, Stelvio Cimato:
Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3352, Springer 2005, ISBN 3-540-24301-1 [contents] - 2004
- [j3]Carlo Blundo, Stelvio Cimato:
A Software Infrastructure for Authenticated Web Metering. Computer 37(4): 28-33 (2004) - [c16]Carlo Blundo, Stelvio Cimato:
A Framework for Authenticated Web Services. ECOWS 2004: 61-71 - [c15]Carlo Blundo, Stelvio Cimato:
A Platform for Secure E-Gambling. ITCC (2) 2004: 768-772 - [c14]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Colored Visual Cryptography Without Color Darkening. SCN 2004: 235-248 - 2003
- [c13]Stelvio Cimato, Paolo D'Arco, Ivan Visconti:
Anonymous Group Communication in Mobile Networks. ICTCS 2003: 316-328 - [c12]Carlo Blundo, Stelvio Cimato, Roberto De Prisco:
Certified Email: Design and Implementation of a New Optimistic Protocol.. ISCC 2003: 828-833 - [c11]Stelvio Cimato, Roberto De Prisco, Alfredo De Santis:
Contrast optimal colored visual cryptography schemes. ITW 2003: 139-142 - [c10]Carlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara:
Modeling A Certified Email Protocol using I/O Automata. MEFISTO 2003: 339-359 - [e1]Stelvio Cimato, Clemente Galdi, Giuseppe Persiano:
Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers. Lecture Notes in Computer Science 2576, Springer 2003, ISBN 3-540-00420-3 [contents] - 2002
- [j2]Carlo Blundo, Stelvio Cimato, Barbara Masucci:
A note on optimal metering schemes. Inf. Process. Lett. 84(6): 319-326 (2002) - [c9]Carlo Blundo, Stelvio Cimato:
SAWM: a tool for secure and authenticated web metering. SEKE 2002: 641-648 - [c8]Carlo Blundo, Stelvio Cimato, Annalisa De Bonis:
A lightweight protocol for the generation and distribution of secure e-coupons. WWW 2002: 542-552 - 2001
- [c7]Stelvio Cimato:
Design of an Authentication Protocol for Gsm Javacards. ICISC 2001: 355-368 - [c6]Stelvio Cimato, Annalisa De Bonis:
Online Advertising: Secure E-coupons. ICTCS 2001: 370-383
1990 – 1999
- 1999
- [c5]Stelvio Cimato, Paolo Ciancarini:
A Formal Approach to the Specification of Java Components. ECOOP Workshops 1999: 107-108 - [c4]Stelvio Cimato:
Specifying component-based Java applications (Short Paper). FMOODS 1999 - 1997
- [j1]Paolo Ciancarini, Stelvio Cimato, Cecilia Mascolo:
Engineering Formal Requirements: An Analysis and Testing Method for Z Documents. Ann. Softw. Eng. 3: 189-219 (1997) - 1996
- [c3]Stelvio Cimato, Cecilia Mascolo:
Analyzing and Animating Declarative Specifications. APPIA-GULP-PRODE 1996: 295-308 - [c2]Paolo Ciancarini, Stelvio Cimato:
Animating a Non-executable Formal Specification with a Distributed Symbolic Language. DISCO 1996: 200-201 - [c1]Paolo Ciancarini, Stelvio Cimato, Cecilia Mascolo:
Engineering Formal Requirements: Analysis and Testing. SEKE 1996: 385-392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint