| Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface PK Agarwal, T Akutsu, A Amihood, A Apostolico, C Benham, G Benson, ... Lecture notes in computer science (including subseries lecture notes in …, 2005 | 524* | 2005 |
| Anonymous Identification in Ad Hoc Groups Y Dodis, A Kiayias, A Nicolosi, V Shoup International Conference on the Theory and Applications of Cryptographic …, 2004 | 394 | 2004 |
| Verifying and enforcing network paths with ICING J Naous, M Walfish, A Nicolosi, D Mazieres, M Miller, A Seehra Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011 | 198 | 2011 |
| Proactive Two-Party Signatures for User Authentication. A Nicolosi, MN Krohn, Y Dodis, D Mazieres NDSS, 2003 | 107 | 2003 |
| The nebula future internet architecture T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ... The Future Internet Assembly, 16-26, 2013 | 93 | 2013 |
| Non-interactive zero-knowledge from homomorphic encryption I Damgård, N Fazio, A Nicolosi Theory of Cryptography Conference, 41-59, 2006 | 89 | 2006 |
| Cryptographic accumulators: Definitions, constructions and applications N Fazio, A Nicolosi Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002 | 69 | 2002 |
| P2PCast: A peer-to-peer multicast scheme for streaming data A Nicolosi, S Annapureddy Proceedings of First IRIS Student Workshop August, 2003 | 56 | 2003 |
| Efficient Private Techniques for Verifying Social Proximity. MJ Freedman, A Nicolosi IPTPS 5, 1, 2007 | 44 | 2007 |
| A brief overview of the NEBULA future internet architecture T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ... ACM SIGCOMM Computer Communication Review 44 (3), 81-86, 2014 | 42 | 2014 |
| Efficient bounded distance decoders for Barnes-Wall lattices D Micciancio, A Nicolosi 2008 IEEE International Symposium on Information Theory, 2484-2488, 2008 | 38 | 2008 |
| A Policy Framework for the Future Internet. A Seehra, J Naous, M Walfish, D Mazieres, A Nicolosi, S Shenker Hotnets, 2009 | 35 | 2009 |
| Traitor tracing with optimal transmission rate N Fazio, A Nicolosi, DH Phan International Conference on Information Security, 71-88, 2007 | 33 | 2007 |
| Nebula-a future internet that supports trustworthy cloud computing T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ... White Paper, 1-31, 2010 | 29 | 2010 |
| Learning potential in mathematics through imagination and manipulation of building blocks C Pirrone, A Nicolosi, A Passanisi, S Di Nuovo Mediterranean Journal of Social Sciences 6 (4), 152-159, 2015 | 26 | 2015 |
| : An HB-like protocol secure against man-in-the-middle attacks C Bosley, K Haralambiev, A Nicolosi Cryptology ePrint Archive, 2011 | 26 | 2011 |
| Broadcast steganography N Fazio, AR Nicolosi, IM Perera Cryptographers’ Track at the RSA Conference, 64-84, 2014 | 23 | 2014 |
| Secure acknowledgment of multicast messages in open peer-to-peer networks A Nicolosi, D Mazieres International Workshop on Peer-to-Peer Systems, 259-268, 2004 | 22 | 2004 |
| Generalized learning problems and applications to non-commutative cryptography G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith III International Conference on Provable Security, 324-339, 2011 | 18 | 2011 |
| Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings D Catalano, N Fazio, R Gennaro, A Nicolosi Springer Science & Business Media, 2011 | 18 | 2011 |