κ-anonymity V Ciriani, SDC di Vimercati, S Foresti, P Samarati Secure Data Management in Decentralized Systems, 323-353, 2007 | 360* | 2007 |
Combining fragmentation and encryption to protect privacy in data storage V Ciriani, SDCD Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-33, 2010 | 268 | 2010 |
Keep a few: Outsourcing data while maintaining confidentiality V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ... Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 133 | 2009 |
Fragmentation and encryption to enforce privacy in data storage V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ... Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007 | 128 | 2007 |
k-Anonymous Data Mining: A Survey V Ciriani, SDC Di Vimercati, S Foresti, P Samarati Privacy-Preserving Data Mining: Models and Algorithms, 105-136, 2008 | 105 | 2008 |
Fragmentation design for efficient query execution over sensitive distributed databases V Ciriani, SDC di Vimercati, S Foresti, S Jajodia, S Paraboschi, ... 2009 29th IEEE International Conference on Distributed Computing Systems, 32-39, 2009 | 68 | 2009 |
Synthesis of SPP three-level logic networks using affine spaces V Ciriani IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2003 | 48 | 2003 |
Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ... Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009 | 40 | 2009 |
Selective data outsourcing for enforcing privacy V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ... Journal of Computer Security 19 (3), 531-566, 2011 | 39 | 2011 |
On decomposing Boolean functions via extended cofactoring A Bernasconi, V Ciriani, G Trucco, T Villa 2009 Design, Automation & Test in Europe Conference & Exhibition, 1464-1469, 2009 | 38 | 2009 |
Three-level logic minimization based on function regularities A Bernasconi, V Ciriani, F Luccio, L Pagli IEEE Transactions on computer-aided design of integrated circuits and …, 2003 | 36 | 2003 |
Logic minimization and testability of 2-SPP networks A Bernasconi, V Ciriani, R Drechsler, T Villa IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2008 | 33 | 2008 |
Logic minimization using exclusive OR gates V Ciriani Proceedings of the 38th annual Design Automation Conference, 115-120, 2001 | 26 | 2001 |
Theory of privacy and anonymity V Ciriani, SDC Di Vimercati, S Foresti, P Samarati Algorithms and theory of computation handbook, 2009 | 25 | 2009 |
Room allocation: a polynomial subcase of the quadratic assignment problem V Ciriani, N Pisanti, A Bernasconi Discrete Applied Mathematics 144 (3), 263-269, 2004 | 21 | 2004 |
Logic synthesis and testing techniques for switching nano-crossbar arrays D Alexandrescu, M Altun, L Anghel, A Bernasconi, V Ciriani, L Frontini, ... Microprocessors and Microsystems 54, 14-25, 2017 | 20 | 2017 |
Synthesis on switching lattices of dimension-reducible boolean functions A Bernasconi, V Ciriani, L Frontini, G Trucco 2016 IFIP/IEEE International Conference on Very Large Scale Integration …, 2016 | 20 | 2016 |
Logic synthesis for switching lattices by decomposition with p-circuits A Bernasconi, V Ciriani, L Frontini, V Liberali, G Trucco, T Villa 2016 Euromicro Conference on Digital System Design (DSD), 423-430, 2016 | 20 | 2016 |
An OBDD approach to enforce confidentiality and visibility constraints in data publishing V Ciriani, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati Journal of Computer Security 20 (5), 463-508, 2012 | 20 | 2012 |
Secure Data Management in Decentralized System V Ciriani, SSF De Capitani di Vimercati, P Samarati, T Yu, S Jajodia Springer, 2007 | 20 | 2007 |