Skip to contents

  1. Ostrovsky, Rafail [Editor]; DePrisco, Roberto [Other]; Visconti, Ivan [Other]; Prisco, Roberto de [Editor]; Visconti, Ivan [Editor] ; SCN 6 2008 Amalfi, Provinz Salerno

    Security and cryptography for networks : 6th international conference, SCN 2008, Amalfi, Italy, September 10-12, 2008 ; proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin; Heidelberg [u.a.]: Springer, 2008

    Published in: Lecture notes in computer science ; 5229

  2. Visconti, Luchino [Other]; Calamai, Clara [Other]; Girotti, Massimo [Other]; Landa, Juan de [Other]; Cain, James M. [Other]; Tonti, Aldo [Other]; Rosati, Giuseppe [Other]

    Besessenheit : eine verhängnisvolle Leidenschaft (1 Videokassette)

    Videos
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    [S.l.]: Kinowelt Home Entertainment, [ca. 2000]

    Published in: Arthaus

  3. Mori, Paolo [Editor]; Visconti, Ivan [Editor]; Bistarelli, Stefano [Editor] ; Distributed Ledger Technology Workshop 5. 2023 Bologna

    DLT 2023: Distributed Ledger Technology Workshop : proceedings of the Fifth Distributed Ledger Technology Workshop (DLT 2023), Bologna, Italy, May 25-26, 2023

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    [Aachen, Germany]: [RWTH Aachen], 2023-08-21

    Published in: CEUR workshop proceedings ; 3460

  4. Fischlin, Marc [Author]; Pinkas, Benny [Author]; Sadeghi, Ahmad-Reza [Author]; Schneider, Thomas [Author]; Visconti, Ivan [Author]; Kiayias, Aggelos [Author]

    Secure set intersection with untrusted hardware tokens

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    2011-01-01

    Published in: Topics in cryptology - CT-RSA 2011 : The cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011

  5. Armknecht, Frederik [Author]; Sadeghi, Ahmad-Reza [Author]; Visconti, Ivan [Author]; Wachsmann, Christian [Author]; Zhou, Jianying [Author]; Yung, Moti [Author]

    On RFID privacy with mutual authentication and tag corruption

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    2010-01-01

    Published in: Applied cryptography and network security : 8th international conference, ACNS 2010, Beijing, China, June 22 - 25, 2010

  6. Sadeghi, Ahmad-Reza [Author]; Visconti, Ivan [Author]; Wachsmann, Christian [Author]; Garay, Juan A. [Author]; Miyaji, Atsuko [Author]; Otsuka, Akira [Author]

    Anonymizer-enabled security and privacy for RFID

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    2009-01-01

    Published in: Cryptology and network security : 8th international conference, CANS 2009, Kanazawa, Japan, December 12 - 14, 2009 ; proceedings

  7. Sadeghi, Ahmad-Reza [Author]; Visconti, Ivan [Author]; Wachsmann, Christian [Author]; Bettini, Claudio [Author]; Jajodia, Sushil [Author]; Samarati, Pierangela [Author]; Wang, X. Sean [Author]

    Location privacy in RFID applications

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    2009-01-01

    Published in: Privacy in location-based applications : research issues and emerging trends

  8. Möller, Bodo [Author]; Rupp, Andy [Author]; Ostrovsky, Rafail [Author]; DePrisco, Roberto [Author]; Visconti, Ivan [Author]

    Faster multi-exponentiation through caching : accelerating (EC)DSA signature verification

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    2008-01-01

    Published in: Security and cryptography for networks : 6th international conference, SCN 2008, Amalfi, Italy September 10 - 12 2008 ; proceedings

  9. Blundo, Carlo [Author]; Persiano, Giuseppe [Author]; Sadeghi, Ahmad-Reza [Author]; Visconti, Ivan [Author]; Jajodia, Sushil [Author]; López, Javier [Author]

    Improved security notions and protocols for non-transferable identification

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    2008-01-01

    Published in: Computer security : proceedings / ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6 - 8, 2008. Sushil Jajodia ; Javier Lopez (ed.)

  10. Armknecht, Frederik [Author]; Sadeghi, Ahmad-Reza [Author]; Scafuro, Alessandra [Author]; Visconti, Ivan [Author]; Wachsmann, Christian [Author]; Tan, Chih Jeng Kenneth [Author]; Moreno, Edward D. [Author]; Gavrilova, Marina L. [Author]

    Impossibility results for RFID privacy notions

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    2010-01-01

    Published in: Transactions on Computational Science : special issue on security in computing

  11. Hutchison, David [Other]; Pandu Rangan, C. [Other]; Prisco, Roberto [Other]; Steffen, Bernhard [Other]; Sudan, Madhu [Other]; Terzopoulos, Demetri [Other]; Tygar, Doug [Other]; Vardi, Moshe Y. [Other]; Visconti, Ivan [Other]; Weikum, Gerhard [Other]; Kanade, Takeo [Other]; Kittler, Josef [Other]; Kleinberg, Jon [Other]; Mattern, Friedemann [Other]; Mitchell, John C. [Other]; Naor, Moni [Other]; Nierstrasz, Oscar [Other]; Ostrovsky, Rafail [Other]

    Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin, Heidelberg: Springer Berlin Heidelberg, 2008

    Published in: Lecture notes in computer science ; 5229