[go: up one dir, main page]

Follow
Antonio Nicolosi
Antonio Nicolosi
Verified email at cs.stevens.edu
Title
Cited by
Cited by
Year
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
PK Agarwal, T Akutsu, A Amihood, A Apostolico, C Benham, G Benson, ...
Lecture notes in computer science (including subseries lecture notes in …, 2005
524*2005
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
International Conference on the Theory and Applications of Cryptographic …, 2004
3942004
Verifying and enforcing network paths with ICING
J Naous, M Walfish, A Nicolosi, D Mazieres, M Miller, A Seehra
Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011
1982011
Proactive Two-Party Signatures for User Authentication.
A Nicolosi, MN Krohn, Y Dodis, D Mazieres
NDSS, 2003
1072003
The nebula future internet architecture
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
The Future Internet Assembly, 16-26, 2013
932013
Non-interactive zero-knowledge from homomorphic encryption
I Damgård, N Fazio, A Nicolosi
Theory of Cryptography Conference, 41-59, 2006
892006
Cryptographic accumulators: Definitions, constructions and applications
N Fazio, A Nicolosi
Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002
692002
P2PCast: A peer-to-peer multicast scheme for streaming data
A Nicolosi, S Annapureddy
Proceedings of First IRIS Student Workshop August, 2003
562003
Efficient Private Techniques for Verifying Social Proximity.
MJ Freedman, A Nicolosi
IPTPS 5, 1, 2007
442007
A brief overview of the NEBULA future internet architecture
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
ACM SIGCOMM Computer Communication Review 44 (3), 81-86, 2014
422014
Efficient bounded distance decoders for Barnes-Wall lattices
D Micciancio, A Nicolosi
2008 IEEE International Symposium on Information Theory, 2484-2488, 2008
382008
A Policy Framework for the Future Internet.
A Seehra, J Naous, M Walfish, D Mazieres, A Nicolosi, S Shenker
Hotnets, 2009
352009
Traitor tracing with optimal transmission rate
N Fazio, A Nicolosi, DH Phan
International Conference on Information Security, 71-88, 2007
332007
Nebula-a future internet that supports trustworthy cloud computing
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
White Paper, 1-31, 2010
292010
Learning potential in mathematics through imagination and manipulation of building blocks
C Pirrone, A Nicolosi, A Passanisi, S Di Nuovo
Mediterranean Journal of Social Sciences 6 (4), 152-159, 2015
262015
: An HB-like protocol secure against man-in-the-middle attacks
C Bosley, K Haralambiev, A Nicolosi
Cryptology ePrint Archive, 2011
262011
Broadcast steganography
N Fazio, AR Nicolosi, IM Perera
Cryptographers’ Track at the RSA Conference, 64-84, 2014
232014
Secure acknowledgment of multicast messages in open peer-to-peer networks
A Nicolosi, D Mazieres
International Workshop on Peer-to-Peer Systems, 259-268, 2004
222004
Generalized learning problems and applications to non-commutative cryptography
G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith III
International Conference on Provable Security, 324-339, 2011
182011
Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings
D Catalano, N Fazio, R Gennaro, A Nicolosi
Springer Science & Business Media, 2011
182011
The system can't perform the operation now. Try again later.
Articles 1–20