Stop the war!
Остановите войну!
for scientists:
default search action
Roberto Tamassia
Person information
- affiliation: Brown University, Providence, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [i36]Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia:
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries. IACR Cryptol. ePrint Arch. 2024: 845 (2024) - 2023
- [j93]Evangelia Anna Markatou, Francesca Falzon, Zachary Espiritu, Roberto Tamassia:
Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions. Proc. Priv. Enhancing Technol. 2023(4): 204-223 (2023) - 2022
- [j92]Zachary Espiritu, Evangelia Anna Markatou, Roberto Tamassia:
Time- and Space-Efficient Aggregate Range Queries over Encrypted Databases. Proc. Priv. Enhancing Technol. 2022(4): 684-704 (2022) - [j91]Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia:
Range Search over Encrypted Multi-Attribute Data. Proc. VLDB Endow. 16(4): 587-600 (2022) - [c155]Evgenios M. Kornaropoulos, Silei Ren, Roberto Tamassia:
The Price of Tailoring the Index to Your Data: Poisoning Attacks on Learned Index Structures. SIGMOD Conference 2022: 1331-1344 - [i35]Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia:
Attacks on Encrypted Range Search Schemes in Multiple Dimensions. IACR Cryptol. ePrint Arch. 2022: 90 (2022) - [i34]Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia:
Range Search over Encrypted Multi-Attribute Data. IACR Cryptol. ePrint Arch. 2022: 1076 (2022) - 2021
- [c154]Esha Ghosh, Seny Kamara, Roberto Tamassia:
Efficient Graph Encryption Scheme for Shortest Path Queries. AsiaCCS 2021: 516-525 - [c153]Evangelia Anna Markatou, Francesca Falzon, Roberto Tamassia, William Schor:
Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions. CCS 2021: 2243-2261 - [c152]Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks. SP 2021: 1502-1519 - [i33]Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks. IACR Cryptol. ePrint Arch. 2021: 93 (2021) - 2020
- [c151]Francesca Falzon, Evangelia Anna Markatou, Akshima, David Cash, Adam Rivkin, Jesse Stern, Roberto Tamassia:
Full Database Reconstruction in Two Dimensions. CCS 2020: 443-460 - [c150]Goce Trajcevski, Booma Sowkarthiga Balasubramani, Isabel F. Cruz, Roberto Tamassia, Xu Teng:
Semantically Augmented Range Queries over Heterogeneous Geospatial Data. SIGSPATIAL/GIS 2020: 68-77 - [c149]Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution. SP 2020: 1223-1240 - [i32]Evgenios M. Kornaropoulos, Silei Ren, Roberto Tamassia:
The Price of Tailoring the Index to Your Data: Poisoning Attacks on Learned Index Structures. CoRR abs/2008.00297 (2020) - [i31]Evangelia Anna Markatou, Roberto Tamassia:
Database Reconstruction Attacks in Two Dimensions. IACR Cryptol. ePrint Arch. 2020: 284 (2020) - [i30]Francesca Falzon, Evangelia Anna Markatou, William Schor, Roberto Tamassia:
Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions. IACR Cryptol. ePrint Arch. 2020: 1531 (2020)
2010 – 2019
- 2019
- [j90]Ralf Hartmut Güting, Roberto Tamassia, Li Xiong, Farnoush Banaei Kashani, Erik G. Hoel:
The 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL 2018) Seattle, Washington, USA November 6-9, 2018: conference report. ACM SIGSPATIAL Special 11(1): 29-31 (2019) - [c148]Evangelia Anna Markatou, Roberto Tamassia:
Full Database Reconstruction with Access and Search Pattern Leakage. ISC 2019: 25-43 - [c147]Evangelia Anna Markatou, Roberto Tamassia:
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries. ISC 2019: 231-251 - [c146]Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage. IEEE Symposium on Security and Privacy 2019: 1033-1050 - [i29]Evangelia Anna Markatou, Roberto Tamassia:
Full Database Reconstruction with Access and Search Pattern Leakage. IACR Cryptol. ePrint Arch. 2019: 395 (2019) - [i28]Evangelia Anna Markatou, Roberto Tamassia:
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries. IACR Cryptol. ePrint Arch. 2019: 396 (2019) - [i27]Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution. IACR Cryptol. ePrint Arch. 2019: 441 (2019) - 2018
- [j89]Goce Trajcevski, Siva Ravada, Roberto Tamassia:
The 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL 2017) Redondo Beach, California, USA November 7-10, 2017: conference report. ACM SIGSPATIAL Special 10(1): 21-23 (2018) - [e8]Farnoush Banaei Kashani, Erik G. Hoel, Ralf Hartmut Güting, Roberto Tamassia, Li Xiong:
Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2018, Seattle, WA, USA, November 06-09, 2018. ACM 2018, ISBN 978-1-4503-5889-7 [contents] - [i26]Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage. IACR Cryptol. ePrint Arch. 2018: 719 (2018) - 2017
- [j88]Fan Zhou, Goce Trajcevski, Roberto Tamassia, Besim Avci, Ashfaq Khokhar, Peter Scheuermann:
Bypassing holes in sensor networks: Load-balance vs. latency. Ad Hoc Networks 61: 16-32 (2017) - [j87]Besim Avci, Goce Trajcevski, Roberto Tamassia, Peter Scheuermann, Fan Zhou:
Efficient detection of motion-trend predicates in wireless sensor networks. Comput. Commun. 101: 26-43 (2017) - [c145]Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia:
Accountable Storage. ACNS 2017: 623-644 - [c144]Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia:
Auditable Data Structures. EuroS&P 2017: 285-300 - [e7]Erik G. Hoel, Shawn D. Newsam, Siva Ravada, Roberto Tamassia, Goce Trajcevski:
Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2017, Redondo Beach, CA, USA, November 7-10, 2017. ACM 2017, ISBN 978-1-4503-5490-5 [contents] - 2016
- [j86]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Authenticated Hash Tables Based on Cryptographic Accumulators. Algorithmica 74(2): 664-712 (2016) - [j85]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge. Proc. Priv. Enhancing Technol. 2016(4): 373-388 (2016) - [c143]Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Algebra. ASIACRYPT (2) 2016: 67-100 - [c142]Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia:
More Practical and Secure History-Independent Hash Tables. ESORICS (2) 2016: 20-38 - [c141]Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees. SCN 2016: 216-236 - [i25]Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia:
More Practical and Secure History-Independent Hash Tables. IACR Cryptol. ePrint Arch. 2016: 134 (2016) - [i24]Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia:
Auditable Data Structures. IACR Cryptol. ePrint Arch. 2016: 755 (2016) - 2015
- [j84]Dimitrios Papadopoulos, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Practical Authenticated Pattern Matching with Optimal Proof Size. Proc. VLDB Endow. 8(7): 750-761 (2015) - [j83]C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic Provable Data Possession. ACM Trans. Inf. Syst. Secur. 17(4): 15:1-15:29 (2015) - [c140]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Zero-Knowledge Authenticated Order Queries and Order Statistics on a List. ACNS 2015: 149-171 - [c139]Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable). CCS 2015: 1032-1047 - [c138]Markus Mauder, Markus Reisinger, Tobias Emrich, Andreas Züfle, Matthias Renz, Goce Trajcevski, Roberto Tamassia:
Minimal Spatio-Temporal Database Repairs. SSTD 2015: 255-273 - [c137]Giuseppe Di Battista, Valentino Di Donato, Maurizio Patrignani, Maurizio Pizzonia, Vincenzo Roselli, Roberto Tamassia:
Bitconeview: visualization of flows in the bitcoin transaction graph. VizSEC 2015: 1-8 - [i23]Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data. IACR Cryptol. ePrint Arch. 2015: 283 (2015) - [i22]Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Operations. IACR Cryptol. ePrint Arch. 2015: 404 (2015) - [i21]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Authenticated Range \& Closest Point Queries in Zero-Knowledge. IACR Cryptol. ePrint Arch. 2015: 1183 (2015) - 2014
- [c136]Olga Ohrimenko, Michael T. Goodrich, Roberto Tamassia, Eli Upfal:
The Melbourne Shuffle: Improving Oblivious Storage in the Cloud. ICALP (2) 2014: 556-567 - [i20]Olga Ohrimenko, Michael T. Goodrich, Roberto Tamassia, Eli Upfal:
The Melbourne Shuffle: Improving Oblivious Storage in the Cloud. CoRR abs/1402.5524 (2014) - [i19]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Verifiable Member and Order Queries on a List in Zero-Knowledge. CoRR abs/1408.3843 (2014) - [i18]James Kelley, Roberto Tamassia:
Secure Compression: Theory \& Practice. IACR Cryptol. ePrint Arch. 2014: 113 (2014) - [i17]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Verifiable Member and Order Queries on a List in Zero-Knowledge. IACR Cryptol. ePrint Arch. 2014: 632 (2014) - [i16]Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia:
Accountable Storage. IACR Cryptol. ePrint Arch. 2014: 886 (2014) - [i15]Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Falcon Codes: Fast, Authenticated LT Codes. IACR Cryptol. ePrint Arch. 2014: 903 (2014) - 2013
- [c135]Charalampos Papamanthou, Elaine Shi, Roberto Tamassia, Ke Yi:
Streaming Authenticated Data Structures. EUROCRYPT 2013: 353-370 - [c134]Joshua W. S. Brown, Olga Ohrimenko, Roberto Tamassia:
Haze: privacy-preserving real-time traffic statistics. SIGSPATIAL/GIS 2013: 530-533 - [c133]Charalampos Papamanthou, Elaine Shi, Roberto Tamassia:
Signatures of Correct Computation. TCC 2013: 222-242 - [e6]Roberto Tamassia:
Handbook on Graph Drawing and Visualization. Chapman and Hall/CRC 2013, ISBN 978-1-5848-8412-5 [contents] - [i14]Joshua W. S. Brown, Olga Ohrimenko, Roberto Tamassia:
Haze: Privacy-Preserving Real-Time Traffic Statistics. CoRR abs/1309.3515 (2013) - 2012
- [j82]Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Cristina Videira Lopes:
Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers. Proc. VLDB Endow. 5(10): 920-931 (2012) - [j81]Fan Zhou, Goce Trajcevski, Oliviu Ghica, Roberto Tamassia, Peter Scheuermann, Ashfaq A. Khokhar:
Deflection-Aware Tracking-Principal Selection in Active Wireless Sensor Networks. IEEE Trans. Veh. Technol. 61(7): 3240-3254 (2012) - [c132]Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia:
Practical oblivious storage. CODASPY 2012: 13-24 - [c131]James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Hardening Access Control and Data Protection in GFS-like File Systems. ESORICS 2012: 19-36 - [c130]Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Graph Drawing in the Cloud: Privately Visualizing Relational Data Using Small Working Storage. GD 2012: 43-54 - [c129]Goce Trajcevski, Besim Avci, Fan Zhou, Roberto Tamassia, Peter Scheuermann, Lauren Miller, Adam Barber:
Motion Trends Detection in Wireless Sensor Networks. MDM 2012: 232-237 - [c128]Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia:
Privacy-preserving group data access via stateless oblivious RAM simulation. SODA 2012: 157-167 - [c127]Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia:
Authenticating Email Search Results. STM 2012: 225-240 - [i13]Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Cristina Videira Lopes:
Verifying Search Results Over Web Collections. CoRR abs/1204.5446 (2012) - [i12]Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Data-Oblivious Graph Drawing Model and Algorithms. CoRR abs/1209.0756 (2012) - 2011
- [j80]Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos:
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems. Algorithmica 60(3): 505-552 (2011) - [j79]Goce Trajcevski, Roberto Tamassia, Isabel F. Cruz, Peter Scheuermann, David Hartglass, Christopher Zamierowski:
Ranking continuous nearest neighbors for uncertain trajectories. VLDB J. 20(5): 767-791 (2011) - [c126]Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia:
Oblivious RAM simulation with efficient worst-case access overhead. CCSW 2011: 95-100 - [c125]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Optimal Verification of Operations on Dynamic Sets. CRYPTO 2011: 91-110 - [c124]Goce Trajcevski, Fan Zhou, Roberto Tamassia, Besim Avci, Peter Scheuermann, Ashfaq A. Khokhar:
Bypassing Holes in Sensor Networks: Load-Balance vs. Latency. GLOBECOM 2011: 1-5 - [i11]Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia:
Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation. CoRR abs/1105.4125 (2011) - [i10]Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia:
Oblivious RAM Simulation with Efficient Worst-Case Access Overhead. CoRR abs/1107.5093 (2011) - [i9]Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia:
Oblivious Storage with Low I/O Overhead. CoRR abs/1110.1851 (2011) - [i8]Charalampos Papamanthou, Roberto Tamassia:
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking. IACR Cryptol. ePrint Arch. 2011: 102 (2011) - [i7]Charalampos Papamanthou, Elaine Shi, Roberto Tamassia:
Publicly Verifiable Delegation of Computation. IACR Cryptol. ePrint Arch. 2011: 587 (2011) - 2010
- [j78]Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Authenticated error-correcting codes with applications to multicast authentication. ACM Trans. Inf. Syst. Secur. 13(2): 17:1-17:34 (2010) - [j77]Roberto Tamassia, Danfeng Yao, William H. Winsborough:
Independently Verifiable Decentralized Role-Based Delegation. IEEE Trans. Syst. Man Cybern. Part A 40(6): 1206-1219 (2010) - [c123]Roberto Tamassia, Nikos Triandopoulos:
Certification and Authentication of Data Structures. AMW 2010 - [c122]David Eppstein, Michael T. Goodrich, Roberto Tamassia:
Privacy-preserving data-oblivious geometric algorithms for geographic data. GIS 2010: 13-22 - [c121]Oliviu Ghica, Goce Trajcevski, Fan Zhou, Roberto Tamassia, Peter Scheuermann:
Selecting tracking principals with epoch awareness. GIS 2010: 222-231 - [c120]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Optimal Authenticated Data Structures with Multilinear Forms. Pairing 2010: 246-264 - [i6]David Eppstein, Michael T. Goodrich, Roberto Tamassia:
Privacy-Preserving Data-Oblivious Geometric Algorithms for Geographic Data. CoRR abs/1009.1904 (2010) - [i5]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Optimal Verification of Operations on Dynamic Sets. IACR Cryptol. ePrint Arch. 2010: 455 (2010)
2000 – 2009
- 2009
- [j76]Danfeng Yao, Roberto Tamassia:
Compact and Anonymous Role-Based Authorization Chain. ACM Trans. Inf. Syst. Secur. 12(3): 15:1-15:27 (2009) - [c119]C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic provable data possession. CCS 2009: 213-222 - [c118]Goce Trajcevski, Roberto Tamassia, Hui Ding, Peter Scheuermann, Isabel F. Cruz:
Continuous probabilistic nearest-neighbor queries for uncertain trajectories. EDBT 2009: 874-885 - [c117]Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos:
Reliable Resource Searching in P2P Networks. SecureComm 2009: 437-447 - [i4]Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic:
An Efficient Dynamic and Distributed RSA Accumulator. CoRR abs/0905.1307 (2009) - [i3]Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos:
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems. CoRR abs/0908.4116 (2009) - [i2]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Cryptographic Accumulators for Authenticated Hash Tables. IACR Cryptol. ePrint Arch. 2009: 625 (2009) - 2008
- [j75]Michael T. Goodrich, Roberto Tamassia, Danfeng (Daphne) Yao:
Notarized federated ID management and authentication. J. Comput. Secur. 16(4): 399-418 (2008) - [j74]Camil Demetrescu, Roberto Tamassia:
Papers from ALENEX 2005. ACM J. Exp. Algorithmics 12: 3.1:1 (2008) - [j73]Nancy M. Amato, Der-Tsai Lee, Andrea Pietracaprina, Roberto Tamassia:
Preface. Theor. Comput. Sci. 408(2-3): 97-98 (2008) - [j72]Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Private Information: To Reveal or not to Reveal. ACM Trans. Inf. Syst. Secur. 12(1): 6:1-6:27 (2008) - [c116]Charalampos Papamanthou, Franco P. Preparata, Roberto Tamassia:
Algorithms for Location Estimation Based on RSSI Sampling. ALGOSENSORS 2008: 72-86 - [c115]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Authenticated hash tables. CCS 2008: 437-448 - [c114]Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos:
Super-Efficient Verification of Dynamic Outsourced Databases. CT-RSA 2008: 407-424 - [c113]Goce Trajcevski, Oliviu Ghica, Peter Scheuermann, Roberto Tamassia, Isabel F. Cruz:
Alternating multiple tributaries + deltas. DMSN 2008: 28-34 - [c112]Roberto Tamassia, Bernardo Palazzi, Charalampos Papamanthou:
Graph Drawing for Security Visualization. GD 2008: 2-13 - [c111]Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Athos: Efficient Authentication of Outsourced File Systems. ISC 2008: 80-96 - [c110]Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia:
Efficient integrity checking of untrusted network storage. StorageSS 2008: 43-54 - [c109]Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia:
Effective Visualization of File System Access-Control. VizSEC 2008: 18-25 - [i1]C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic Provable Data Possession. IACR Cryptol. ePrint Arch. 2008: 432 (2008) - 2007
- [c108]Roberto Tamassia, Nikos Triandopoulos:
Efficient Content Authentication in Peer-to-Peer Networks. ACNS 2007: 354-372 - [c107]Isabel F. Cruz, Roberto Tamassia, Danfeng Yao:
Privacy-Preserving Schema Matching Using Mutual Information. DBSec 2007: 93-94 - [c106]Goce Trajcevski, Hui Ding, Peter Scheuermann, Roberto Tamassia, Dennis Vaccaro:
Dynamics-aware similarity of moving objects trajectories. GIS 2007: 11 - [c105]Charalampos Papamanthou, Roberto Tamassia:
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. ICICS 2007: 1-15 - [c104]Danfeng Yao, Roberto Tamassia, Seth Proctor:
Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust. IFIPTM 2007: 1-16 - [c103]Lorenzo Cirio, Isabel F. Cruz, Roberto Tamassia:
A Role and Attribute Based Access Control System Using Semantic Web Technologies. OTM Workshops (2) 2007: 1256-1266 - [c102]Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia:
Decentralized authorization and data security in web content delivery. SAC 2007: 1654-1661 - [c101]Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia:
On the Cost of Persistence and Authentication in Skip Lists. WEA 2007: 94-107 - 2006
- [c100]Michael T. Goodrich, Roberto Tamassia, Danfeng Yao:
Notarized Federated Identity Management for Web Services. DBSec 2006: 133-147 - [c99]Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Point-Based Trust: Define How Much Privacy Is Worth. ICICS 2006: 190-209 - 2005
- [c98]Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia:
Indexing Information for Data Forensics. ACNS 2005: 206-221 - [c97]