Name
Papers
Collaborators
ALFREDO DE SANTIS
207
144
Citations 
PageRank 
Referers 
4049
501.27
4827
Referees 
References 
2135
2237
Search Limit
1001000
Title
Citations
PageRank
Year
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments00.342022
An Accelerometer-based Privacy Attack on Smartphones.00.342021
Compression-based steganography.00.342020
Design Of An Outdoor Position Certification Authority00.342020
One-pass lossless data hiding and compression of remote sensing data.20.362019
Probabilistic Secret Sharing.00.342018
Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?301.072018
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.140.582017
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence.00.342017
Hierarchical and Shared Access Control230.702016
Secure and reliable data communication in developing regions and rural areas10.372015
A New Flexible Protocol for Docking Studies.20.442015
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update00.342014
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome40.422014
An Efficient Protocol for Reliable Data Communication on Dataless Devices10.352014
Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images00.342014
A Collaborative Decision-Support System for Secure Analysis of Cranial Disorders10.402014
A botnet-based command and control approach relying on swarm intelligence100.592014
Protection of Microscopy Images through Digital Watermarking Techniques80.502014
Network anomaly detection with the restricted Boltzmann machine882.652013
Analyzing the Internet Stability in Presence of Disasters.10.372013
A note on time-bound hierarchical key assignment schemes40.412013
Color visual cryptography schemes for black and white secret images50.402013
Automated Production of Predetermined Digital Evidence20.362013
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.00.342013
An intelligent security architecture for distributed firewalling environments.100.692013
Key privacy and anonymous protocols00.342013
An asynchronous covert channel using spam240.912012
Device Tracking in Private Networks via NAPT Log Analysis50.562012
On Ultralightweight RFID Authentication Protocols130.672011
On the Construction of a False Digital Alibi on the Android OS150.842011
Steganography and Secure Communication on Online Social Networks and Online Photo Sharing160.602011
SAVI: a new system for advanced SQL visualization60.562011
New steganographic techniques for the OOXML file format90.552011
An Extensible Framework for Efficient Secure SMS221.262010
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats30.442010
Variations on a theme by Akl and Taylor: Security and tradeoffs140.662010
DISCERN: A collaborative visualization system for learning cryptographic protocols00.342009
An attack on a payment scheme80.532008
Weaknesses in a recent ultra-lightweight RFID authentication protocol50.902008
Visualization of cryptographic protocols with GRACE161.382008
A unified fuzzy logic approach to trajectory planning and inverse kinematics for a fire fighting robot operating in tunnels10.352008
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol.50.542008
On Monotone Formula Composition of Perfect Zero-Knowledge Languages10.352008
New results on non-perfect sharing of multiple secrets30.422007
Colored visual cryptography without color darkening401.622007
On Unconditionally Secure Distributed Oblivious Transfer100.652007
Enforcing the security of a time-bound hierarchical key assignment scheme241.612006
SPEECH: Secure Personal End-to-End Communication with Handheld221.072006
A new key assignment scheme for access control in a complete tree hierarchy10.402005
  • 1
  • 2