Name
Affiliation
Papers
IVAN VISCONTI
Dipartimento di Informatica ed Applicazioni, Università di Salerno, Baronissi, SA, Italy
74
Collaborators
Citations 
PageRank 
67
612
40.30
Referers 
Referees 
References 
629
1335
1465
Search Limit
1001000
Title
Citations
PageRank
Year
Efficient Proofs of Knowledge for Threshold Relations.00.342022
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges.00.342022
Shielded Computations in Smart Contracts Overcoming Forks00.342021
Black-Box Constructions of Bounded-Concurrent Secure Computation.00.342020
Publicly Verifiable Proofs from Blockchains.00.342019
Non-interactive Zero Knowledge Proofs in the Random Oracle Model.00.342019
Non-interactive Secure Computation from One-Way Functions.00.342018
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions.20.352018
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds.30.392017
Resettably-Sound Resettable Zero Knowledge in Constant Rounds.10.352017
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model.00.342017
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations.40.382017
Controlled Homomorphic Encryption: Definition and Construction.10.352017
On Round-Efficient Non-Malleable Protocols.20.352016
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs.00.342016
On Selective-Opening Attacks against Encryption Schemes.30.412014
The design and implementation of a secure CAPTCHA against man-in-the-middle attacks10.352014
Impossibility Results for Leakage-Resilient Zero Knowledge and Multi-Party Computation.00.342014
Concurrent zero knowledge in the bounded player model50.392013
SmartK: Smart cards in operating systems at kernel level50.472013
Simultaneous Resettability from One-Way Functions100.482013
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model30.372013
Reliable accounting in grids00.342013
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions.240.872012
Constructing Non-malleable Commitments: A Black-Box Approach360.872012
Simultaneously resettable arguments of knowledge160.592012
Nearly simultaneously resettable black-box zero knowledge10.362012
On round-optimal zero knowledge in the bare public-key model120.512012
Resettable statistical zero knowledge50.472012
Impossibility Results for Static Input Secure Computation.110.472012
Simultaneous Resettability from Collision Resistance.140.572012
Revisiting lower and upper bounds for selective decommitments100.502011
On constant-round concurrent non-malleable proof systems50.442011
On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware.20.352010
Efficiency preserving transformations for concurrent non-malleable zero knowledge150.562010
Constant-Round concurrent non-malleable statistically binding commitments and decommitments50.402010
Impossibility results for RFID privacy notions90.552010
On RFID privacy with mutual authentication and tag corruption120.612010
Increasing privacy threats in the cyberspace: the case of Italian e-passports20.472010
Proxy Smart Card Systems10.342010
Anonymizer-Enabled Security and Privacy for RFID190.782009
Location Privacy in RFID Applications80.512009
Co-sound Zero-Knowledge with Public Keys50.402009
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks70.592009
Simulation-Based Concurrent Non-malleable Commitments and Decommitments100.502009
Improved Security Notions and Protocols for Non-transferable Identification90.562008
Collusion-Free Multiparty Computation in the Mediated Model140.652008
User Privacy in Transport Systems Based on RFID E-Tickets251.182008
Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings251.602008
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model210.642008
  • 1
  • 2