Provable data possession at untrusted stores G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ... Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 3995 | 2007 |
Improved proxy re-encryption schemes with applications to secure distributed storage G Ateniese, K Fu, M Green, S Hohenberger ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006 | 2105 | 2006 |
Scalable and efficient provable data possession G Ateniese, R Di Pietro, LV Mancini, G Tsudik Proceedings of the 4th international conference on Security and privacy in …, 2008 | 1759 | 2008 |
Deep models under the GAN: information leakage from collaborative deep learning B Hitaj, G Ateniese, F Perez-Cruz Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 1514 | 2017 |
A practical and provably secure coalition-resistant group signature scheme G Ateniese, J Camenisch, M Joye, G Tsudik Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000 | 1294 | 2000 |
Identity-based proxy re-encryption M Green, G Ateniese Applied Cryptography and Network Security: 5th International Conference …, 2007 | 1020 | 2007 |
Visual cryptography for general access structures G Ateniese, C Blundo, A De Santis, DR Stinson Information and computation 129 (2), 86-106, 1996 | 938 | 1996 |
MR-PDP: Multiple-replica provable data possession R Curtmola, O Khan, R Burns, G Ateniese 2008 the 28th international conference on distributed computing systems, 411-420, 2008 | 757 | 2008 |
Extended capabilities for visual cryptography G Ateniese, C Blundo, A De Santis, DR Stinson Theoretical Computer Science 250 (1-2), 143-161, 2001 | 654 | 2001 |
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data Q Zheng, S Xu, G Ateniese IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014 | 556 | 2014 |
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici International Journal of Security and Networks 10 (3), 137-150, 2015 | 553 | 2015 |
Remote data checking using provable data possession G Ateniese, R Burns, R Curtmola, J Herring, O Khan, L Kissner, ... ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-34, 2011 | 540 | 2011 |
Proofs of storage from homomorphic identification protocols G Ateniese, S Kamara, J Katz Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 502 | 2009 |
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016 | 500 | 2016 |
New multiparty authentication services and key agreement protocols G Ateniese, M Steiner, G Tsudik IEEE journal on selected areas in communications 18 (4), 628-639, 2000 | 495 | 2000 |
Redactable blockchain–or–rewriting history in bitcoin and friends G Ateniese, B Magri, D Venturi, E Andrade 2017 IEEE European symposium on security and privacy (EuroS&P), 111-126, 2017 | 465 | 2017 |
Sanitizable signatures G Ateniese, DH Chou, B De Medeiros, G Tsudik Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 344 | 2005 |
Quasi-efficient revocation of group signatures G Ateniese, D Song, G Tsudik Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003 | 319 | 2003 |
Passgan: A deep learning approach for password guessing B Hitaj, P Gasti, G Ateniese, F Perez-Cruz Applied Cryptography and Network Security: 17th International Conference …, 2019 | 311 | 2019 |
Remote data checking for network coding-based distributed storage systems B Chen, R Curtmola, G Ateniese, R Burns Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 31-42, 2010 | 311 | 2010 |