Name
Papers
Collaborators
GIUSEPPE ATENIESE
86
122
Citations 
PageRank 
Referers 
4380
254.66
5760
Referees 
References 
1825
1563
Search Limit
1001000
Title
Citations
PageRank
Year
Eluding Secure Aggregation in Federated Learning via Model Inconsistency00.342022
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings00.342022
Improving Password Guessing via Representation Learning20.392021
Immunization Against Complete Subversion Without Random Oracles00.342021
Unleashing the Tiger: Inference Attacks on Split Learning00.342021
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries00.342021
Subversion-resilient signatures: Definitions, constructions and applications.10.402020
Proof of Storage-Time: Efficiently Checking Continuous Data Availability20.362020
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains.00.342019
Match Me if You Can: Matchmaking Encryption and Its Applications10.352019
Public Immunization Against Complete Subversion Without Random Oracles.00.342019
Audita: A Blockchain-based Auditing Framework for Off-chain Storage00.342019
Secure Outsourcing of Cryptographic Circuits Manufacturing.00.342018
A Family of FDH Signature Schemes Based on the Quadratic Residuosity Assumption.00.342018
Accountable Storage.00.342017
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.962.882017
PassGAN: A Deep Learning Approach for Password Guessing.80.492017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage220.682017
Redactable Blockchain – or – Rewriting History in Bitcoin and Friends140.672017
Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks.60.432017
Secure Outsourcing of Circuit Manufacturing.10.352016
Entangled Cloud Storage.10.352016
Nearly Optimal Verifiable Data Streaming.60.472016
From Pretty Good To Great: Enhancing PGP using Bitcoin and the Blockchain80.532015
Nearly Optimal Verifiable Data Streaming (Full Version).00.342015
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage.30.412015
Entangled Encodings and Data Entanglement10.352015
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.261.132015
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.10.382015
Recent advances in security and privacy in big data10.352015
Subversion-Resilient Signature Schemes.240.812015
Certified Bitcoins.00.342014
Fault-tolerant oblivious assignment with m slots in synchronous systems.00.342014
To Share or Not to Share in Client-Side Encrypted Clouds.10.352014
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone160.782014
A note on time-bound hierarchical key assignment schemes40.412013
Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?80.552013
Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers.190.972013
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data932.292013
Proofs of Space: When Space Is of the Essence.261.602013
High-Entropy visual identification for touch screen devices20.352012
Oblivious assignment with m slots30.392012
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes431.422012
Efficient query integrity for outsourced dynamic databases100.552012
Remote data checking using provable data possession1383.882011
(If) size matters: size-hiding private set intersection300.912011
Remote data checking for network coding-based distributed storage systems572.142010
FastAD: an authenticated directory for billions of objects30.392010
Deniable cloud storage: sharing files via public-key deniability110.702010
Proofs of Storage from Homomorphic Identification Protocols1204.002009
  • 1
  • 2