Publications

 
 



Proceedings and Special Issue Edited

Papers in Journals

Papers in International Conferences

Papers in Italian Conferences

Papers in Books





List of publications from DBLP

Publications on Google Scholar

Profile on Google Scholar

Profile and statistics on Arnetminer

Publications and Committees from IACR

List of publications from Cryptographers World

Publications.edited.htmlPublications.edited.htmlPublications.htmlPublications.italian.htmlPublications.books.htmlhttp://www.informatik.uni-trier.de/~ley/db/indices/a-tree/s/Santis:Alfredo_De.htmlhttp://scholar.google.it/scholar?hl=it&q=alfredo+de+santis&btnG=Cerca&lr=&as_ylo=&as_vis=0http://scholar.google.com/citations?user=Wt7Y3-oAAAAJhttp://arnetminer.org/viewperson.do?naid=656537&name=Alfredo%20De%20Santishttp://arnetminer.org/viewperson.do?naid=656537&name=Alfredo%20De%20Santishttp://www.google.com/url?sa=t&source=web&cd=1&ved=0CBoQFjAA&url=http%3A%2F%2Fwww.iacr.org%2Fcryptodb%2Fdata%2Fauthor.php%3Fauthorkey%3D567&rct=j&q=alfredo%20de%20santis%20site%3Awww.iacr.org&ei=SN1cTtLmFIvItAbvis3KDw&usg=AFQjCNEzxVjaDAlR3YDf589F1__PMc80Ow&cad=rjahttp://www.google.com/url?sa=t&source=web&cd=1&ved=0CBoQFjAA&url=http%3A%2F%2Fwww.iacr.org%2Fcryptodb%2Fdata%2Fauthor.php%3Fauthorkey%3D567&rct=j&q=alfredo%20de%20santis%20site%3Awww.iacr.org&ei=SN1cTtLmFIvItAbvis3KDw&usg=AFQjCNEzxVjaDAlR3YDf589F1__PMc80Ow&cad=rjahttp://www.cryptographersworld.com/a.php?a=42http://www.cryptographersworld.com/a.php?a=42http://www.cryptographersworld.com/a.php?a=42shapeimage_2_link_0shapeimage_2_link_1shapeimage_2_link_2shapeimage_2_link_3shapeimage_2_link_4shapeimage_2_link_5shapeimage_2_link_6shapeimage_2_link_7shapeimage_2_link_8shapeimage_2_link_9shapeimage_2_link_10shapeimage_2_link_11shapeimage_2_link_12shapeimage_2_link_13
 


1)Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, and Aniello Castiglione, On the Relations between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures, Proceedings of the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), vol. 9723 of “Lecture Notes in Computer Science“, Springer, (Conference held in Melbourne, Australia, 4-6 July 2016), pp. 37-56,  DOI: 10.1007/978-3-319-40367-0_3


2)Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, and Aniello Castiglione, Reversible Copyright Protection for DNA Microarray Images, 10-th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2015), November 4-6, 2015, Krakow, Poland.


3)Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Francesco Palmieri, and Aniello Castiglione, Format-Independent Protection of DNA Microarray Images, 10-th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2015), November 4-6, 2015, Krakow, Poland.


4) Aniello Castiglione, Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, and Raffaele Pizzolante, Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST 2015), pp. 29-39, October 12-16, 2015, Denver, Colorado, US.


5)Luigi Di Biasi, Roberto Fino, Rosaura Parisi, Lucia Sessa, Giuseppe Cattaneo, Alfredo De Santis, Pio Iannelli, and Stefano Piotto, Novel Algorithm for Efficient Distribution of Molecular Docking Calculations, Proceedings of WIVACE 2015, Bari, Italy, September 22-25, 2015, Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, vol. 587 of the series Communications in Computer and Information Science, Springer, pp. 65-74.


6)Lucia Sessa, Luigi Di Biasi, Simona Concilio, Giuseppe Cattaneo, Alfredo De Santis, Pio Iannelli, and Stefano Piotto, A New Flexible Protocol for Docking Studies, Proceedings of WIVACE 2015, Bari, Italy, September 22-25, 2015, Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, vol. 587 of the series Communications in Computer and Information Science, Springer, pp. 117-126.


7)Arcangelo Castiglione, Alfredo De Santis, Raffaele Pizzolante, Aniello Castiglione, Vincenzo Loia, and Francesco Palmieri, On the Protection of fMRI Images in Multi-domain Environments, Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015), pp. 476-481, Gwangju, Korea, 25-27 March 2015.


8)Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, and Alfredo De Santis, Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images, Proceedings of the 17th International Conference on Network-Based Information Systems (NBiS-2014), IEEE, pp. 91-98, September 10-12, 2014, Salerno, Italy.


9)Arcangelo Castiglione, Alfredo De Santis, and Barbara Masucci, Hierarchical and Shared Key Assignment, Proceedings of the 17th International Conference on Network-Based Information Systems (NBiS-2014), IEEE, pp. 23-27, September 10-12, 2014, Salerno, Italy


10)Ugo Fiore, Aniello Castiglione, Alfredo De Santis, and Francesco Palmieri, Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome, Proceedings of the 17th International Conference on Network-Based Information Systems (NBiS-2014), IEEE, pp. 355-360, September 10-12, 2014, Salerno, Italy


11)Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, and Aniello Castiglione, Protection of Microscopy Images through Digital Watermarking Techniques, Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCos 2014), pp. 65-72, September 10-12, 2014, Salerno, Italy


12)Giuliana Carullo, Aniello Castiglione, and Alfredo De Santis, Friendship Recommendations in Online Social Networks, Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCos 2014), pp. 42-48, September 10-12, 2014, Salerno, Italy


13)Arcangelo Castiglione, Raffaele Pizzolante, Alfredo De Santis, and Ciriaco D’Ambrosio, A Collaborative Decision-Support System for Secure Analysis of Cranial Disorders, Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCos 2014), pp. 189-196, September 10-12, 2014, Salerno, Italy


14)Antonio Colella, Aniello Castiglione, and Alfredo De Santis, The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach, Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCos 2014), pp. 350-355, September 10-12, 2014, Salerno, Italy


15)Arcangelo Castiglione, Aniello Castiglione, Alfredo De Santis, and Francesco Palmieri, An Efficient and Transparent One-Time Authentication Protocol with Non-Interactive Key Scheduling and Update, Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), pp. 351-358, Victoria, Canada, May 13-16, 2014.


16) Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Vincenzo Loia, and Alfredo De Santis, Multimedia-Based Battery Drain Attacks for Android Devices, Proceedings of the Fifth IEEE Consumer Communications and Networking Conference (CCNC 2014) International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2014), Las Vegas, USA, January 10-13, 2014.


17)Paolo D'Arco, Roberto De Prisco, and Alfredo De Santis, Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes, 7th International Conference on Information Theoretic Security (ICITS 2013), “Lecture Notes in Computer Science”, Singapore, November, 28-30, 2013.


18) Aniello Castiglione, Arcangelo Castiglione, Alfredo De Santis, Francesco Palmieri, and Ugo Fiore, An Energy-Aware Framework for Reliable and Secure End-To-End Ubiquitous Data Communications, Proceedings of the Fifth International Conference on Intelligent Networking and Collaborative Systems (INCoS-2013), pp. 157-165, IEEE, Xi’an, China, September, 9-11, 2013.


19) Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, and Alfredo De Santis, Analyzing the Internet Stability in Presence of Disasters, CD-ARES Workshops 2013, vol. 8127 of “Lecture Notes in Computer Science”, pp. 253-268, Springer, Regensburg, Germany, September 2-6, 2013.


20) Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, and Francesco Palmieri, Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness, CD-ARES Workshops 2013, vol. 8127 of “Lecture Notes in Computer Science”, pp. 414-429, Springer, Regensburg, Germany, September 2-6, 2013.


21) Paolo D’Arco and Alfredo De Santis, Key Privacy and Anonymous Protocols, Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust (PST 2013), IEEE, pp. 11-18, Tarragona, Spain, July 10-12, 2013.


22) Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Aniello Castiglione, and Francesco Palmieri, On Secure Data Management in Health-Care Environment, Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2013), IEEE, pp. 666-671, Taichung, Taiwan, July 3-5, 2013.


23) Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Alfredo De Santis, Forensically-Sound Methods to Collect Live Network Digital Evidence, Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25-28, 2013.


24) Giuliana Carullo, Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment, Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25-28, 2013.


25) Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, and Kangbin Yim, How to Forge a Digital Alibi on MAC OS X, Proceedings of the Second IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2012), “Lecture Notes in Computer Science”, pp. 359-373, Springer, Prague, Czech Republic, August 20-24, 2012.


26) Giancarlo De Maio, Aniello Castiglione, Giuseppe Cattaneo, Gerardo Costabile, Alfredo De Santis, and Mattia Epifani, The Forensic Analysis of a False Digital Alibi, Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), IEEE 2012, Palermo, Italy, July 4-6, 2012.


27) Aniello Castiglione, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, Device Tracking in Private Networks via NAPT Log Analysis, Proceedings of the Second International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS 2012), IEEE 2012, Palermo, Italy, July 4-6, 2012.


28) Pietro Albano, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Alfredo De Santis, On the Construction of a False Digital Alibi on the Android OS,  Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems (INCoS-2011), pp. 685-690, IEEE 2011, Fukuoka Institute of Technology, Fukuoka, Japan, November 30 - December 2, 2011.


29) Aniello Castiglione, Giuseppe Cattaneo, and Alfredo De Santis, A Forensic Analysis of Images on Online Social Networks,  Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems (INCoS-2011), pp. 679-684,  IEEE 2011, Fukuoka Institute of Technology, Fukuoka, Japan, November 30 - December 2, 2011.


30) Aniello Castiglione, Alfredo De Santis, and Francesco Palmieri, Characterizing and Classifying Card-sharing Traffic Through Wavelet Analysis, Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems (INCoS-2011), pp. 691-697, IEEE 2011, Fukuoka Institute of Technology, Fukuoka, Japan, November 30 - December 2, 2011.


31) Maurizio Cembalo, Alfredo De Santis, and Umberto Ferraro Petrillo, SAVI: A New System for Advanced SQL Visualization, Proceedings of the 12th ACM Information Technology Education (SIGITE 2011), West Point, New York, October 20-22, 2011.


32)Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Alfredo De Santis, Automatic, Selective and Secure Deletion of Digital Evidence, Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), pp. 392-398, IEEE 2011, Barcelona, Spain, October 26-28, 2011.


33)Pietro Albano, Aniello Castiglione, Giuseppe Cattaneo, and Alfredo De Santis, A Novel Anti-Forensics Technique for the Android OS, Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), pp. 380-385, IEEE 2011, Barcelona, Spain, October 26-28, 2011.


34)Aniello Castiglione, Bonaventura D'Alessio, and Alfredo De Santis, Steganography and Secure Communication on Online Social Networks and Online Photo Sharing, Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), pp. 363-368, IEEE 2011, Barcelona, Spain, October 26-28, 2011.


35)Aniello Castiglione,  Bonaventura D'Alessio, Alfredo De Santis, and Francesco Palmieri, New Steganographic Techniques for the OOXML File Format, Proceedings of the Sixth International Conference on Availability, Reliability and Security (AReS 2011), vol. 6908 of “Lecture Notes in Computer Science”, pp. 344-358, Springer, (Conference held in Vienna, Austria, August 22 – 26, 2011).


36)Alfredo De Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Mario Ianulardo, Automated Construction of a False Digital Alibi, Proceedings of the Sixth International Conference on Availability, Reliability and Security (AReS 2011), vol. 6908 of “Lecture Notes in Computer Science”, pp. 359-373, Springer, (Conference held in Vienna, Austria, August 22 – 26, 2011).


37)Aniello Castiglione, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, E-mail-based Covert Channels for Asynchronous Message Steganography, Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2011), pp. 503-508, IEEE 2011, (Conference held in Korean Bible University, Seoul, Korea, June 30 – July 2, 2011).


38)Roberto De Prisco and Alfredo De Santis, Using Colors to Improve Visual Cryptography for Black and White Images, Proceedings of the Fifth International Conference on Information Theoretic Security (ICITS 2011), vol. 6673 of “Lecture Notes in Computer Science”, pp. 182-201, Springer, (Conference held in Amsterdam, The Nederlands, May 21 – 24, 2011).


39)Aniello Castiglione, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats, Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2010), pp. 475-481, IEEE 2010, Fukuoka Institute of Technology, Fukuoka, Japan, November 4-6, 2010.


40)Aniello Castiglione, M. Cepparulo, Alfredo De Santis, and F.rancesco Palmieri, Towards a Lawfully Secure and Privacy Preserving Video Surveillance System, Proceedings of the 11th International Conference on Electronic Commerce and Web Technologies (EC-Web 2010), vol. 61 of “Lecture Notes in Business Information Processing” (LNBIP), pp. 73-84, Springer, (Conference held at Universidad de Deusto, Bilbao, Spain, September 1-3, 2010).


41)Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Alfredo De Santis, Francesco Petagna, and Umberto Ferraro Petrillo, An Extensible Framework for Efficient Secure SMS, Proceedings of the Fourth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2010), pp. 843-850, IEEE Computer Society 2010, (Conference held in Krakow, Poland, 15-18 February 2010).


42)Giuseppe Cattaneo, Alfredo De Santis, and Umberto Ferraro Petrillo, DISCERN: A Collaborative Visualization System  for Learning Cryptographic Protocols, Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009), pp. 1-8, IEEE 2009 (Conference held in Washington D.C., US, November 11-14, 2009).


43)Aniello Castiglione, Roberto De Prisco, and Alfredo De Santis, Do you trust your phone? Proceedings of the 10th International Conference on Electronic Commerce and Web Technologies (EC-Web 09), vol. 5692 of “Lecture Notes in Computer Science”, pp. 50-61, Springer, (Conference held at Johannes Kepler University of Linz, Linz, Austria, 31 August - 4 September 2009).


44)Luigi Catuogno and Alfredo De Santis, An Internet Role-game for the Laboratory of a Network Security Course, Proceedings of the 13th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE 2008), pp. 240-244, ACM 2008, (Conference held in  Madrid, Spain, June 30 – July 2, 2008).


45)Alfredo De Santis and Claudio Soriente, Modified Original Smart Cards and Smart Card Clones Countermeasures, Proceedings of the International Conference on Computational Intelligence and Security (CIS 2007), pp. 878-882, IEEE Computer Society 2007, (Conference held in Harbin, China, December 15-19, 2007).


46)Paolo D’Arco and Alfredo De Santis,  Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation, Proceedings of the Second International Conference on Information Theoretic Security (ICITS 2007), vol. 4883 of “Lecture Notes in Computer Science”, pp. 46-64, (Conference held in Madrid, Spain, May 25-29, 2007).


47)Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis, Fabio Petagna, and Umberto Ferraro Petrillo, SPEECH: Secure Personal End-to-End Communication with Handheld, Proceedings of the Conference on Information Security Solutions Europe (ISSE 2006), Securing Electronic Business Processes, pp. 287-297, (Conference held in Roma, Italy, 10-12 October 2006).


48)Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy, Proceedings of the International Workshop on Coding and Cryptography (WCC 2005), vol. 3969 of “Lecture Notes in Computer Science”, pp. 202-217, (Conference held in Bergen, Norway, March 14-18, 2005).


49)Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, On NC1 Boolean Circuit Composition of Non-Interactive Perfect Zero Knowledge, Proceedings of the 29th International Symposium on Mathematical Foundations of Computer Science (MFCS '04), vol. 3153 of “Lecture Notes in Computer Science”, pp. 356-367. (Conference held  in Prague, Czech Republic, August 22 - 27, 2004).


50)Carlo Blundo, Paolo D’Arco, and Alfredo De Santis, Definitions and Bounds for Self-Healing Key Distribution Schemes, in 31th International Colloquium on Automata, Languages and Programming  (ICALP '04), Eds. J. Diaz et al., vol. 3142 of “Lecture Notes in Computer Science”, pp. 234-245. (Conference held in Turku, Finland, July 12-16, 2004.)


51)Carlo Blundo, Paolo D’Arco, Alfredo De Santis, and Clemente Galdi, A Novel Approach to Proactive Password Checking, Proceedings of InfraSec 2002,  Eds. G. Davida, Y. Frankel, and O. Rees, vol.  2437 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 30-39. (International conference held in Bristol, UK, October 1-3, 2002.)


52)Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Randomness-Optimal Characterization of Two NP Proof Systems, Proceedings of the 6th International Workshop on Randomization and Approximation Techniques (RANDOM 2002), Eds. J.D.P. Rolim and S. Vadhan, vol. 2483 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 179-193. (Workshop held in Cambridge, MA, USA, September 13-15, 2002).


53)Carlo Blundo, Paolo D'Arco, Alfredo De Santis, and Douglas Stinson, New Results on Unconditionally Secure Distributed Oblivious Transfer, Proceedings of Selected Areas in Cryptography (SAC 2002), vol. 2595 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 291-309.  (International conference held in St. John’s, Canada, August 15-16, 2002.).


54)Alfredo De Santis and Barbara Masucci, On Information Dispersal Algorithms, Proceedings of the 2002 IEEE International Symposium on Information Theory, pag. 410, June 30 - July 5, 2002, Lausanne, Switzerland.


55)Annalia de Bonis and Alfredo De Santis, Secret Sharing and Visual Cryptography Schemes, Proceedings of the IFIP TC11 16th International Conference on Information Security (IFIP/Sec’01), June 11-13, 2001, Paris, France, M. Dupuy and P. Paradinas Eds, Kluwer Academic Publishers, pp. 123-137.


56)Alfredo De Santis, Giovanni Di Crescenzo, R. Ostrovsky, Giuseppe Persiano, and A. Sahai, Non-Interactive Zero Knowledge in the Multi-Party Setting, in “Advances in Cryptology - CRYPTO 2001”, Ed. J. Kilian, vol. 2139 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 566-598.


57)Annalisa de Bonis and Alfredo De Santis, New Results on the Randomness of Visual Cryptography Schemes, Progress in Computer Science and Applied Logic, vol. 20, pp. 187-202, Birkhäuser Verlag, March 2001. (Proceedings of the Workshop on Cryptography ad Computational Number Theory (CCNT’99), held in Singapore Nov. 22-26, 1999, Eds. Kwok-Yan Lam, Igor Shparlinski, Huaxiong Wang, and Chaoping Xing)


58)Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Necessary and Sufficient Assumptions for Non-Interactive Zero-Knowledge proofs of Knowledge for all NP relations, in “27th International Colloquium on Automata, Languages and Programming” (ICALP 2000), Eds. U. Montanari, J. D.R. Rolim, and E. Welzl, vol. 1853 of “Lecture Notes in Computer Science”, pp. 451-462. (Conference held in Geneve, Switzerland, July 9-15, 2000.)


59)Annalisa de Bonis and Alfredo De Santis, Randomness in Visual Cryptography, in “STACS 2000” (17th Annual Symposium on Theoretical Aspects of Computer Science), Lille, France, February 2000, Eds. Horst Reichel  and Sophie Tison, vol. 1770 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 627-638.


60)Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung, Non-Interactive Zero-Knowledge: A Low-Randomness Characterization of NP, in “26th International Colloquium on Automata, Languages and Programming” (ICALP '99), Eds. J. Wiedermann, P. van Emde Boas, and M. Nielsen, vol. 1644 of “Lecture Notes in Computer Science”, pp. 271-280.


61)Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Communication-Efficient Anonymous Group Identification, Proceedings of 5th ACM Conference on Computer and Communications Security (CCS98), pp. 73-82, San Francisco, California, November 2-5, 1998.


62)Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung, Image Density is Complete for Non-Interactive-SZK, in “25th International Colloquium on Automata, Languages and Programming” (ICALP '98), Eds. Kim G. Larsen, Sven Skyum, and Glynn Winskel, vol. 1443 of “Lecture Notes in Computer Science”, pp. 784-795. (Conference held in Aalborg, Denmark, July 13-17, 1998.)


63)Roberto De Prisco and Alfredo De Santis, On the Redundancy and Data Expansion of Huffman Codes, Proceedings of the 1998 IEEE International Symposium on Information Theory, MIT, Cambridge, USA, August 16-21, 1998.


64)Alfredo De Santis, On Visual Cryptography Schemes, Proceedings of the IEEE Information Theory Workshop, pp. 154-155, Killarney, Ireland, June 22-26, 1998. Invited lecture.


65)Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Randomness-efficient Non-Interactive Zero-knowledge, in “24th International Colloquium on Automata, Languages and Programming” (ICALP '97), Eds. P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, vol. 1256 of “Lecture Notes in Computer Science”, Springer Verlag, pp. 716-726. (Conference held in Bologna, Italy, July 7-11, 1997.)


66)Carlo Blundo, Alfredo De Santis, R. De Simone, and Ugo Vaccaro, New Bounds on the Share's Size in Secret Sharing Schemes, Proceedings of the 1st International Conference on the Theory and Applications of Cryptology, PRAGOCRYPT '96, pp. 349-358, Ed. J. Pribyl, CTU Publishing House, Prague, Czech Republic, 1996. (Conference held in Prague, Czech Republic, September 30 - October 2, 1996.)


67)Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas Stinson, Constructions and Bounds for Visual Cryptography, in “23rd International Colloquium on Automata, Languages and Programming” (ICALP '96), Ed. F. Meyer auf der Heide, vol. 1099 of “Lecture Notes in Computer Science”, Springer Verlag, pp. 416-428.  (Conference held in Paderborn, Germany, July 8-12, 1996.)


68)Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, and Ugo Vaccaro, On the Number of Random Bits Needed in Totally Private Computation, in “22nd International Colloquium on Automata, Languages and Programming” (ICALP '95), Eds. Z. Fülöp and F. Gècseg, vol. 944 of “Lecture Notes in Computer Science”, pp. 171-182.


69)Alfredo De Santis, T. Okamoto, and Giuseppe Persiano, Zero-Knowledge Proofs of Computational Power in the Shared String Model, in “Advances in Cryptology - ASIACRYPT '94”, Ed. J. Pieprczyk, vol. 917 of “Lecture Notes in Computer Science”, Springer Verlag, 1994.


70)Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung, On Monotone Formula Closure of SZK, Proceedings of 35th IEEE Symposium on Foundations of Computer Science (FOCS '94), Santa Fe, New Mexico, USA, November 20-22, 1994, pp. 454-465.


71)Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, and Ugo Vaccaro, Multi-Secret Sharing Schemes, in “Advances in Cryptology - CRYPTO 94”, Ed. Y. Desmedt, vol. 839 of “Lecture Notes in Computer Science”, Springer-Verlag,  pp. 150-163.


72)Alfredo De Santis, Yvo Desmedt, Y. Frankel, and Moti Yung, How to Share a Function Securely, Proceedings of 26th ACM Symposium on Theory of Computing (STOC '94), Montrèal, Quèbec, Canada, May 23-25, 1994, pp. 522-533.


73)Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia, and Ugo Vaccaro, Lower Bounds in Secret Sharing Schemes, Proceedings of the 1994 IEEE International Symposium on Information Theory, Trondheim, Norway, June 1994.


74)Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Secret Sharing and Perfect Zero Knowledge, in “Advances in Cryptology - CRYPTO 93”, Ed. D. R. Stinson, vol. 773 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 73-84.


75)Marco Carpentieri, Alfredo De Santis, and Ugo Vaccaro, Size of Shares and Probability of Cheating in Threshold Schemes, in “Advances in Cryptology - EUROCRYPT 93”, Ed. Tom Helleset, vol. 765 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 118-125.


76)Carlo Blundo, Alfredo De Santis, and Ugo Vaccaro, Efficient Sharing of Many Secrets, in “STACS 93” (10th Annual Symposium on Theoretical Aspects of Computer Science), Eds. P. Enjalbert, A. Finkel, and K. W. Wagner, vol. 665 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 692-703, 1993. (Conference held in  Würzburg, Germany, 25-27 February 1993.)


77)Carlo Blundo, Alfredo De Santis, Luisa Gargano, and Ugo Vaccaro, Secret Sharing Schemes with Veto Capabilities, in “Algebraic Coding”, Eds. G. Cohen, S. Litsyn, A. Lobstein, and G. Zèmor, vol. 781 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 82-89. (“First French-Israeli Workshop in Algebraic Coding”, ENST, Paris, July 19-21, 1993.)


78)Alfredo De Santis and Giuseppe Persiano, Zero-knowledge Proofs of Knowledge Without Interaction, Proceedings of 33rd IEEE Symposium on Foundations of Computer Science (FOCS '92), Pittsburgh, Pennsylvania, October 1992, pp. 427-437.


79)Alfredo De Santis, Giuseppe Persiano, and Moti Yung, One-Message Zero-Knowledge Proofs and Space-Bounded Verifier, in “19th International Colloquium on Automata, Languages and Programming” (ICALP '92), Ed. W. Kuich, vol. 623 of “Lecture Notes in Computer Science”, Springer Verlag, pp. 28-40. (Conference held in Wien, Austria, July 12-17, 1992.)


80)Alfredo De Santis and Giuseppe Persiano, Communication Efficient Zero-Knowledge Proofs of Knowledge (With  Applications to Electronic Cash), in “STACS 92” (9th Annual Symposium on Theoretical Aspects of Computer Science), Eds. A. Finkel and M. Jantzen, vol. 577 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 449-460.


81)Alfredo De Santis and Giuseppe Persiano, Tight Bounds on the Path Length of Binary Trees, in “STACS 91” (8th Annual Symposium on Theoretical Aspects of  Computer Science), Eds. C. Choffrut and M. Jantzen, vol. 480 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 478-487.


82)Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, and Ugo Vaccaro, A Note on Secret Sharing Schemes, in “Advanced International Workshop on Sequences”, Positano, Italy, June 1991, Eds. R. M. Capocelli, A. De Santis, and U. Vaccaro, Springer-Verlag, pp. 335-344.


83)Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, and Ugo Vaccaro, An Information-Theoretic Treatment of Secret Sharing Schemes, Proceedings of the 1991 IEEE International Symposium on Information Theory, Budapest, Hungary, June 1991.


84)Alfredo De Santis and Giuseppe Persiano, Non-interactive Zero-knowledge Proofs of Knowledge, Workshop on Cryptography, Luminy, France, Sept. 1991.


85)Alfredo De Santis and Giuseppe Persiano, An Optimal Algorithm for the Construction of Optimal Prefix Codes with given Fringe, in Proceedings of the 1991 Data Compression Conference (DCC '91), Snowbird, Utah, April 1991, Eds. J. A. Storer and J. H. Reif, pp. 297-306.


86)Renato M. Capocelli and Alfredo De Santis, Minimum Codeword Length and Redundancy of Huffman Codes, in Proceedings of “EUROCODE '90”, Eds. G. Cohen and P. Charpin, vol. 514 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 309-317. (Conference held in Paris, November 1990.)


87)Alfredo De Santis and Moti Yung, Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems, in “Advances in Cryptology - CRYPTO 90”, Eds. A. J. Menezes and S. A. Vanstone, vol. 537 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 366-377.


88)Alfredo De Santis and Moti Yung, On the Design of Provably-Secure Cryptographic Hash Functions, in “Advances in Cryptology - EUROCRYPT 90”, Ed. I. B. Damgård, vol. 473 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 412-431. (Conference held in Aarhus, Denmark, May 1990.)


89)Alfredo De Santis and Giuseppe Persiano, Public-Randomness in Public-Key Cryptosystems, in “Advances in Cryptology - EUROCRYPT 90”, Ed. I. B. Damgård, vol. 473 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 46-62. (Conference held in Aarhus, Denmark, May 1990.)


90)Renato M. Capocelli and Alfredo De Santis, '1'-ended Binary Prefix Codes,

1990 IEEE International Symposium on Information Theory, San Diego, California, January 1990.

•IBM Research Report RC-14150.


91)Renato M. Capocelli and Alfredo De Santis, Tight Upper Bounds on the Entropy Series,

•1990 IEEE International Symposium on Information Theory, San Diego, California, January 1990.

•IBM Research Report RC-14084.


92)Renato M. Capocelli and Alfredo De Santis, Improved Bounds on the Redundancy of Huffman Codes,

Fourth Joint Swedish-USSR International Workshop on Information Theory, Gotland, Sweden, August 1989.

•IBM Research Report RC-14151.


93)Renato M. Capocelli and Alfredo De Santis, Tight Bounds on the Redundancy of Huffman Codes,

•IEEE 1988 International Symposium on Information Theory, Kobe, Japan, June 1988.

•IBM Research Report RC-14154.


94)Alfredo De Santis, Silvio Micali, and Giuseppe Persiano, Removing Interaction from Zero-Knowledge Proofs,

•in Proceedings of “Advanced International Workshop on Sequences”, Positano, Italy, June 1988, Ed. R. M. Capocelli, Springer-Verlag, pp. 377-393.

•IBM Research Report RC-14153.


95)Alfredo De Santis, George Markovsky, and Mark N. Wegman, Learning Probabilistic Prediction Functions,

•Proceedings of 29th IEEE Symposium on Foundations of Computer Science (FOCS '88), White Plains, New York, October 1988, pp. 110-119.

•Proceedings of the first Workshop on Computational Learning Theory, MIT, Cambridge, Massachusetts, August 1988, pp. 312-328.


96)Alfredo De Santis, Silvio Micali, and Giuseppe Persiano, Non-Interactive Zero-Knowledge Proof Systems with Preprocessing,

•in “Advances in Cryptology - CRYPTO 88”, Ed. S. Goldwasser, vol. 403 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 269-282.

•IBM Research Report RC-14083.


97)Alfredo De Santis, Silvio Micali, and Giuseppe Persiano, Non-Interactive Zero-Knowledge Proof Systems, in “Advances in Cryptology - CRYPTO 87”, Ed. C. Pomerance, vol. 293 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 52-72.


98)Renato M. Capocelli and Alfredo De Santis, Unbounded Fibonacci Search and Related Encodings, IEEE 1986 International Symposium on Information Theory, Ann Arbor, Michigan, October 1986.


Alfredo De Santis

 

Papers in International Conferences