Pubblications

Alfredo De Santis, editor, Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings. Springer, 1995. ISBN 3-540-60176-7.

 

 

Bruno Carpentieri, Alfredo De Santis, James A. Storer, and Ugo Vaccaro, editors, “Compression and Complexity of Sequences 1997”, IEEE Computer Society, 1998, ISBN 0-8186-8132-2.

 

 

Renato M. Capocelli, Alfredo De Santis, Ugo Vaccaro, editors, Sequences II : Methods in Communication, Security and Computer Science, 1993, ISBN 0387979409 (0-387-97940-9), Springer, Hardcover.

 

 

Alfredo De Santis, editor, Theoretical Computer Science: Proceedings of the 5th Italian Conference, 1995, ISBN 981-02-2673-X, World Scientific Publishing Company, Hardcover.

 

 

Co-editor (with Giuseppe Persiano) of the special issue of the journal European Transactions on Telecommunications (ETT), vol. 8, n. 5, Sept./Oct. 1997, Focus on Security in Information Networks, Wiley.

  1. Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis, and Gianluca Roscigno, A Novel Methodology to Acquire Live Big Data Evidence from the Cloud, IEEE Transactions on Big Data, DOI: 10.1109/TBDATA.2017.2683521, to appear.
  2. Arcangelo Castiglione, Paolo D’Arco, Alfredo De Santis, and Rosario Russo, Secure Group Communication Schemes for Dynamic Heterogeneous Distributed Computing, Future Generation Computer Systems, vol. 74, September 2017, pp. 313-324, http://dx.doi.org/10.1016/j.future.2015.11.026.
  3. Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Xinyi Huang, and Aniello Castiglione, Supporting Dynamic Updates in Storage Clouds with the Akl-Taylor Scheme, Information Sciences, vol. 387, May 2017, pp. 56-74, http://dx.doi.org/10.1016/j.ins.2016.08.093
  4. Arcangelo Castiglione, Raffaele Pizzolante, Christian Esposito, Alfredo De Santis, Francesco Palmieri, and Aniello Castiglione, A Collaborative Clinical Analysis Service Based on Theory of Evidence, Fuzzy Linguistic Sets and Prospect Theory and its Application to Craniofacial Disorders in Infants, Future Generation Computer Systems, vol. 67, February 2017, pp. 230-241, http://dx.doi.org/10.1016/j.future.2016.08.001
  5. Arcangelo Castiglione, Raffaele Pizzolante, Francesco Palmieri, Barbara Masucci, Bruno Carpentieri, Alfredo De Santis, and Aniello Castiglione, On-board Format-independent Security of Functional Magnetic Resonance Images, ACM Transactions on Embedded Computing Systems, vol. 6, n. 2, January 2017.
  6. Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, and Xinyi Huang, Cryptographic Hierarchical Access Control for Dynamic Structures, IEEE Transactions on Information Forensics & Security, vol. 11, n. 10, October 2016, pp. 2349-2364, http://dx.doi.org/10.1109/TIFS.2016.2581147
  7. Arcangelo Castiglione, Alfredo De Santis, and Barbara Masucci, Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes,
    • IEEE Transactions on Dependable and Secure Computing, vol. 13, n. 4, July-August 2016, pp. 451-460, http://doi.ieeecomputersociety.org/10.1109/TDSC.2015.2413415.
    • Available at the Cryptology ePrint Archive as Report 2014/752, http://eprint.iacr.org/2014/752 , 27 Sept 2014.
  8. Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Jin Li, and Xinyi Huang, Hierarchical and Shared Access Control, IEEE Transactions on Information Forensics & Security, vol. 11, n. 4, April 2016, pp. 850-865.
  9. Arcangelo Castiglione, Raffaele Pizzolante, Bruno Carpentieri, Alfredo De Santis, Aniello Castiglione, and Francesco Palmieri, Secure and Reliable Data Communication in Developing Regions and Rural Areas, Pervasive and Mobile Computing, Springer, vol. 24, December 2015, pp. 117–128.
  10. Arcangelo Castiglione, Francesco Palmieri, Ugo Fiore, Aniello Castiglione, and Alfredo De Santis, Modeling Energy-Efficient Secure Communications in Multi-Mode Wireless Mobile Devices, Journal of Computer and System Sciences, vol. 81, n. 8, December 2015, pp. 1464–1478.
  11. Giuliana Carullo, Aniello Castiglione, Alfredo De Santis, and Francesco Palmieri, A Triadic Closure and Homophily-based Recommendation System for Online Social Networks, Word Wide Web, vol. 18, n. 6, November 2015, pp 1579-1601.
  12. Paolo D’Arco and Alfredo De Santis, Anonymous Protocols: Notions and Equivalence, Theoretical Computer Science, vol. 581, 25 May 2015, pp. 9–25.
  13. Giancarlo De Maio, Alfredo De Santis, and Umberto Ferraro Petrillo, Using HTML5 to Prevent Detection of Drive-by-Download Web Malware,
    • Security and Communication Networks, 10 May 2015, vol. 8, n. 7, pp. 1237-1255.
    • Available at the arXiv.org e-Print archive as http://arxiv.org/abs/1507.03467, July 15, 2015.
  14. Arcangelo Castiglione, Raffaele Pizzolante, Alfredo De Santis, Bruno Carpentieri, Aniello Castiglione, and Francesco Palmieri, Cloud-based Adaptive Compression and Secure Management Services for 3D Healthcare Data, Future Generation Computer Systems, vol. 43–44, February 2015, pp. 120–134.
  15. Ugo Fiore, Francesco Palmieri, Aniello Castiglione, and Alfredo De Santis, A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems, International Journal of Parallel Programming, vol. 42, n. 5, October 2014, pp. 755-775.
  16. Paolo D'Arco, Roberto De Prisco, and Alfredo De Santis, Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes, Journal of Systems and Software, volume 95, pp. 89-99, September 2014.
  17. Roberto De Prisco and Alfredo De Santis, On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography,
    • IEEE Transactions on Information Forensics & Security, vol. 9, n. 4, April 2014, pp. 653-665.
    • Available at the Cryptology ePrint Archive as Report 2013/818, http://eprint.iacr.org/2013/818, 4 December 2013.
  18. Aniello Castiglione, Roberto De Prisco, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, A Botnet-based Command and Control Approach Relying on Swarm Intelligence, Journal of Networking and Computer Applications, vol. 38, February 2014, pp. 22-33.
  19. Ugo Fiore, Francesco Palmieri, Aniello Castiglione, and Alfredo De Santis, Network Anomaly Detection with the Restricted Boltzmann Machine, Neurocomputing, vol. 122, pp. 13-23, December 2013.
  20. Roberto De Prisco and Alfredo De Santis, Color Visual Cryptography Schemes for Black and White Secret Images, Theoretical Computer Science, vol. 510, 28 October 2013, pp. 63-86.
  21. Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Alfredo De Santis, Automated Production of Predetermined Digital Evidence, IEEE Access, vol. 1, 2013, pp. 216-231.
  22. Aniello Castiglione, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, An Intelligent Security Architecture for Distributed Firewalling Environments, Journal of Ambient Intelligence and Humanized Computing, Springer, vol. 4, n. 2, April 2013, pp. 223-234.
  23. Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, A Note on Time-Bound Hierarchical Key Assignment Schemes, Information Processing Letters, vol. 113, n. 5–6, 15 March 2013, pp. 151–155.
  24. Francesco Palmieri, Ugo Fiore, Aniello Castiglione, and Alfredo De Santis, On the Detection of Card-Sharing Traffic through Wavelet Analysis and Support Vector Machines, Applied Soft Computing Journal, vol. 13, n. 1, pp. 615-627, January 2013.
  25. Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci,
    • Provably-Secure Time-Bound Hierarchical Key Assignment Schemes, Journal of Cryptology, vol. 25, n. 2, pp. 243-270, 2012.
    • Preliminary version: Secure Time-Bound Hierarchical Key Assignment Schemes, 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, USA, Oct. 30 – Nov. 3, 2006, pp. 288-297.
    • Secure Time-Bound Hierarchical Key Assignment Schemes, Available at the Cryptology ePrint Archive as Report 2006/225, http://eprint.iacr.org/2006/225 , 3 July 2006.
  26. Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Alfredo De Santis, Pompeo Faruolo, Fabio Petagna, and Umberto Ferraro Petrillo, Engineering a Secure Mobile Messaging Framework, Computers & Security, vol. 31, n. 6, September 2012, pp. 771-781.
  27. Aniello Castiglione, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, An Asynchronous Covert Channel Using Spam, Computers & Mathematics with Applications, vol. 63, n. 2, pp. 437-447, January 2012.
  28. Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis, and Francesco Palmieri, Hiding Information into OOXML Documents: New Steganographic Perspectives, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 2, n. 4, pp. 59-83, December 2011.
  29. Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, Efficient Provably-Secure Hierarchical Key Assignment Schemes,
    • Theoretical Computer Science, vol. 412, n. 41, 23 September 2011, pp. 5684-5699.
    • Preliminary version: In 32nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2007, vol. 4708 of “Lecture Notes in Computer Science”, pp. 371-382. (Conference held in Ceský Krumlov, Czech Republic, August 26-31, 2007.
    • Available at the Cryptology ePrint Archive as Report 2006/479, http://eprint.iacr.org/2006/479, 21 December 2006.
  30. Paolo D’Arco and Alfredo De Santis,
    • Weaknesses in a Recent Ultralightweight RFID Authentication Protocol, IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 4, pp. 548-563, July/August 2011.
    • Preliminary version: In First International Conference on Cryptology in Africa (AfricaCrypt 2008), vol. 5023 of “Lecture Notes in Computer Science”, pp. 27-39. (Conference held in Casablanca, Morocco, June 11-14, 2008.
    • From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol, Available at the Cryptology ePrint Archive as Report 2008/470, http://eprint.iacr.org/2008/470 , November 5, 2008
  31. Aniello Castiglione, Alfredo De Santis, and Claudio Soriente, Security and Privacy Issues in the Portable Document Format, Journal of Systems and Software, vol. 83, n. 10, October 2010, pp. 1813-1822.
  32. Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, and Pierangela Samarati,
    • Managing Key Hierarchies for Access Control Enforcement: Heuristic Approaches, Computers & Security, vol. 29, n. 5, pp. 533-547, July 2010.
    • Preliminary version: An Efficient Key Management for Enforcing Access Control in Outsourced Scenarios, in 24th IFIP TC 11 International Information Security Conference (SEC 2009), pp. 364-375, Cyprus, May 18-20, 2009.
  33. Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci,
    • Variations on a Theme by Akl and Taylor: Security and Tradeoffs, Theoretical Computer Science, vol. 411, n. 1, 1 January 2010, pp. 213-227.
    • Preliminary version: Security and Tradeoffs of the Akl-Taylor Scheme and its Variants, in 34th International Symposium on Mathematical Foundations of Computer Science (MFCS 2009), vol. 5734 of “Lecture Notes in Computer Science”, pp. 247-257. (Conference held in Novy Smokovec, High Tatras, Slovakia, August 24-28, 2009.
  34. Roberto De Prisco and Alfredo De Santis,
    • Cheating Immune Threshold Visual Secret Sharing, The Computer Journal, vol. 53, n. 9, pp. 1485-1496, November 2010.
    • Preliminary version: Cheating Immune (2,n)-Threshold Visual Secret Sharing, Fifth Conference on Security in Communication Networks (SCN '06), vol. 4116 of “Lecture Notes in Computer Science”, pp. 216-228. (Conference held in Maiori, Italy, September 6-8, 2006).
  35. Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung, On Monotone Formula Composition of Perfect Zero Knowledge Languages, SIAM Journal on Computing, 2008, vol. 38, n. 4, pp. 1300-1329.
  36. Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
    • Theoretical Computer Science, vol. 407, n. 1-3, 6 November 2008, pp. 213-230.
    • Preliminary version in 12th ACM Symposium on Access Control Models and Technologies (SACMAT ’07, Sophia Antipolis, France, June 20-22, 2007.
    • Available at the Cryptology ePrint Archive as Report 2006/483, http://eprint.iacr.org/2006/483 , 22 December 2006.
  37. Giuseppe Cattaneo, Alfredo De Santis, and Umberto Ferraro Petrillo, Visualization of Cryptographic Protocols with GRACE. Journal of Visual Languages & Computing, vol. 19, n. 2, April 2008, pp. 258-290.
  38. Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, An Attack on a Payment Scheme, Information Sciences, vol. 178, n. 5, 1 March 2008, pp. 1418-1421.
  39. Carlo Blundo, Paolo D’Arco, Alfredo De Santis, and Douglas R. Stinson, On Unconditionally Secure Distributed Oblivious Transfer, Journal of Cryptology, vol. 20, n. 3, July 2007, pp. 323-373.
  40. Aniello Castiglione, Alfredo De Santis, and Claudio Soriente, Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata, Journal of Systems and Software, vol. 80, n. 5, pp. 750-764, May 2007.
  41. Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis, Colored Visual Cryptography without Color Darkening,
    • Theoretical Computer Science, vol. 374, n. 1-3, 20 April 2007, pp. 261-276.
    • Preliminary version in Fourth Conference on Security in Communication Networks (SCN '04), vol. 3352 of “Lecture Notes in Computer Science”, pp. 235-248. (Conference held in Amalfi, Italy, September 8-10, 2004).
  42. Alfredo De Santis and Barbara Masucci, New Results on Non-Perfect Sharing of Multiple Secrets. Journal of Systems and Software, vol. 80, n. 2, pp. 216-223, February 2007.
  43. Carlo Blundo, Paolo D’Arco, and Alfredo De Santis, On Self-Healing Key Distribution Schemes, IEEE Transaction on Information Theory, vol. 52, n. 12, pp. 5455-5467, December 2006.
  44. Carlo Blundo, Stelvio Cimato, and Alfredo De Santis, Visual Cryptography Schemes with Optimal Pixel Expansion,
    • Theoretical Computer Science, vol. 369, n. 1-3, 15 December 2006, pp. 169-182.
    • Available at the Cryptology e-Print archive as Report 2006/170, http://eprint.iacr.org/2006/170, May 16, 2006.
  45. Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, and Roberto Tagliaferri, Neural Network Techniques for Proactive Password Checking, IEEE Transactions on Dependable and Secure Computing, vol. 3, n. 4, pp. 327-339, October-December 2006.
  46. Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, Enforcing the Security of a Time-Bound Hierarchical Key Assignment Scheme, Information Sciences, vol. 176, n. 12, 22 June 2006, pp. 1684-1694.
  47. Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, Unconditional Secure Hierarchical Key Assignment Schemes,
    • Discrete Applied Mathemathics, vol. 154, n. 2, 1 February 2006, pp. 234-252.
    • Preliminary version in Proceedings of the International Workshop on Coding and Cryptography (WCC 2003), pp. 143-152, D. Augot, P. Charpin, G. Kabatiansky Eds., (Workshop held in Versailles, France, March 24-28, 2003).
  48. Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis, Probabilistic Visual Cryptography Schemes, The Computer Journal, vol. 49, n. 1, January 2006, pp. 97-107.
  49. Pina Bergamo, Paolo D'Arco, Alfredo De Santis, and L. Kocarev, Security of Public Key Cryptosystems based on Chebyshev Polynomials,
    • IEEE Transactions on Circuits and Systems I, vol. 52, n. 7, July 2005, pp. 1382-1393
    • Available at the arXiv.org e-Print archive as http://arxiv.org/abs/cs.CR/0411030, November 10, 2004.
  50. Stelvio Cimato, Alfredo De Santis, and Umberto Ferraro Petrillo, Overcoming the Obfuscation of Java Programs by Identifier Renaming, Journal of Systems and Software, vol. 78, n. 1, October 2005, pp. 60-72.
  51. Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis, Optimal Colored Threshold Visual Cryptography Schemes,
    • Design, Codes, and Cryptography, vol. 35, n. 3, June 2005, pp. 311-335
    • Preliminary version in Proceedings of the 2003 IEEE Information Theory Workshop (ITW 2003) , pp. 139-143, Paris, France, 31 March – 4 April 2003.
  52. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, Ideal Contrast Visual Cryptography Schemes with Reversing, Information Processing Letters, vol. 93, n. 4, February 28, 2005, pp. 199-206.
  53. Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, Cryptographic Key Assignment Schemes for any Access Control Policy, Information Processing Letters, vol. 92, n. 4, November 30, 2004, pp. 199-205.
  54. F. Y. L. Chin, Alfredo De Santis, Anna Lisa Ferrara, N. L. Ho, and S. K. Kim, A Simple Algorithm for the Constrained Sequence Problems, Information Processing Letters, vol. 90, n. 4, May 31, 2004, pp. 175-179.
  55. Alfredo De Santis and Claudio Soriente, A Blocker-proof Conditional Access System, IEEE Transactions on Consumer Electronics, vol. 50, n. 2, May 2004, pp. 591-596.
  56. Annalisa de Bonis and Alfredo De Santis, Randomness in Secret Sharing and Visual Cryptography Schemes, Theoretical Computer Science, vol. 314, n. 3, April 10, 2004, pp. 351-374
  57. Carlo Blundo, Paolo D’Arco, Alfredo De Santis, and Clemente Galdi, Hyppocrates: A New Proactive Password Checker,
    • Journal of Systems and Software, vol. 71, n. 1-2, April 2004, pp. 163-175.
    • Preliminary version in Proceedings of the 4th International Conference on Information Security (ISC 2001), Eds. G. I. Davida and Y. Frankel, vol. 2200 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 63-80. (Conference held in Malaga, Spain, October 1-3, 2001.)
  58. Carlo Blundo, Alfredo De Santis, Paolo D’Arco, and M. Listo, Design of Self-Healing Key Distribution Schemes,
    • Design, Codes, and Cryptography, vol. 32, n. 1, 2004, pp. 15-44
    • Preliminary version presented at the Third Pythagorean Conference, Rhodes, Greece, June 1-7, 2003.
  59. Alfredo De Santis and Barbara Masucci, Anonymous Membership Broadcast Schemes,
    • Design, Codes, and Cryptography, vol. 32, n. 1, 2004, pp. 135-151
    • Preliminary version presented at the Third Pythagorean Conference, Rhodes, Greece, June 1-7, 2003.
  60. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, and Douglas R. Stinson, Contrast Optimal Threshold Visual Cryptography Schemes, SIAM Journal on Discrete Mathematics, vol. 16, n. 2, pp. 224-261, 2003.
  61. Carlo Blundo, Annalisa de Bonis, and Alfredo De Santis, Improved Schemes for Visual Cryptography, Design, Codes and Cryptography, vol. 24, n. 3, December 2001, pp. 255-278.
  62. Alfredo De Santis, Antonio Giorgio Gaggia, and Ugo Vaccaro, Bounds on Entropy in a Guessing Game, IEEE Transaction on Information Theory, vol. 47, n. 1, Jan. 2001, pp. 468-473.
  63. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, Extended Schemes for Visual Cryptography, Theoretical Computer Science, vol. 250, n. 1-2, January 2001, pp. 143-161.
  64. Carlo Blundo, Paolo D’Arco, and Alfredo De Santis, A t-Private k-Database Private Information Retrieval Scheme, International Journal of Information Security, vol. 1, n. 1, 2001, pp. 64-68.
  65. Carlo Blundo, Alfredo De Santis, and Moni Naor, Visual Cryptography for Grey Levels Images, Information Processing Letters, vol. 75, n. 6, November 2000, pp. 255-259.
  66. Alfredo De Santis and Barbara Masucci, On Secret Set Schemes, Information Processing Letters, vol. 74, n. 5-6, June 2000, pp. 243-251.
  67. Carlo Blundo, Alfredo De Santis, K. Kurosawa, and W. Ogata, On a Fallacious Bound for Authentication Codes,
    • Journal of Cryptology, vol. 12, n. 3, 1999, pp. 155-159.
    • Also presented at Symposium on Cryptography and Information Security, (SCIC '98), January 28-31, 1998.
  68. Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, and Ugo Vaccaro, Randomness Complexity of Private Computation, Computational Complexity, vol. 8, n. 2, 1999, pp. 145-168.
  69. Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, On the Contrast of Visual Cryptography Schemes,
  70. Alfredo De Santis and Barbara Masucci, A Lower Bound on the Encoding Length for Lossy Transmission, Information Sciences, vol. 116, n. 2-4, June 1999, pp. 129-146.
  71. Alfredo De Santis and Barbara Masucci, Multiple Ramp Schemes, IEEE Transaction on Information Theory, vol. 45, n. 5, July 1999, pp. 1720-1728.
  72. Alfredo De Santis, Giovanni Di Crescenzo, Oded Goldreich, and Giuseppe Persiano, The Graph Clustering Problem has a Perfect Zero-Knowledge Proof,
  73. Carlo Blundo, Alfredo De Santis, and Antonio Giorgio Gaggia, Probability of Shares in Secret Sharing Schemes, Information Processing Letters, vol. 72, n. 5-6, 1999, pp. 169-175.
  74. Carlo Blundo and Alfredo De Santis, Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels, Journal for Computers & Graphics, Special Issue “Data Security in Image Comunications and Networking”, vol. 22, n. 4, pp. 449-455, 1998.
  75. Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, and Moti Yung, Perfectly-Secure Key Distribution for Dynamic Conferences,
    • Information and Computation, vol. 146, n. 1, October 1998, pp. 1-23.
    • Preliminary version in “Advances in Cryptology - CRYPTO 92”, Ed. E. Brickell, vol. 740 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 471-486.
  76. Roberto De Prisco and Alfredo De Santis, On Lower Bounds for the Redundancy of Optimal Codes, Design, Codes and Cryptography, vol. 15, n. 1, pp. 29-45, October 1998.
  77. Roberto De Prisco and Alfredo De Santis, On the Data Expansion of the Huffman Compression Algorithm, The Computer Journal, vol. 41, n. 3, 1998, pp. 137-144.
  78. Carlo Blundo, Alfredo De Santis, and Ugo Vaccaro, On Secret Sharing Schemes, Information Processing Letters, vol. 65, n. 1, pp. 25-32, 15 January 1998.
  79. Carlo Blundo, Alfredo De Santis, R. De Simone, and Ugo Vaccaro, Tight Bounds on the Information Rate of Secret Sharing Schemes,
    • Design, Codes, and Cryptography, vol. 11, 1997, pp. 107-122.
    • Also presented at the “Mediterranean Workshop on Coding and Information Integrity”, Palma, February 28-29, March 1, 1996.
  80. Roberto De Prisco and Alfredo De Santis, A New Bound for the Data Expansion of Huffman Codes, IEEE Transaction on Information Theory, vol. 43, n. 6, pp. 2028-2032, November 1997.
  81. Carlo Blundo and Alfredo De Santis, A Lower Bound for Robust Secret Sharing Schemes, Information Processing Letters, vol. 63, n. 6, pp. 317-321, September 1997.
  82. Roberto De Prisco and Alfredo De Santis, Catastrophic Faults in Reconfigurable Systolic Linear Arrays,
    • Discrete Applied Mathematics, vol. 75, n. 2, May 1997, pp. 105-123.
    • Technical Report CUCS-032093, Columbia University, USA, 1993.
  83. Carlo Blundo, Alfredo De Santis, and Ugo Vaccaro, Randomness in Distribution Protocols,
    • Information and Computation, vol. 131, n. 2, December 1996, pp. 111-139.
    • Preliminary version in “21st International Colloquium on Automata, Languages and Programming” (ICALP '94, Eds. Serge Abiteboul and Eli Shamir, vol. 820 of “Lecture Notes in Computer Science”, pp. 568-579.
    • Presented at the ICMS Workshop on Randomness and Computation, Edinburgh, July 1993.
  84. Carlo Blundo, Antonella Cresti, Alfredo De Santis, and Ugo Vaccaro, Fully Dynamic Secret Sharing Schemes,
    • Theoretical Computer Science, vol. 165, n. 2, pp. 407-440, October 1996.
    • Preliminary version in “Advances in Cryptology - CRYPTO 93”, Ed. D. R. Stinson, vol. 773 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 110-125.
    • Technical Report 94-114, Universität Bielefeld, Germany, 1994.
  85. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, Visual Cryptography for General Access Structures,
  86. Alfredo De Santis and Giuseppe Persiano, The Power of Preprocessing in Zero-Knowledge Proofs of Knowledge, Journal of Cryptology, vol. 9, n. 3, 1996, pp. 129-148.
  87. Carlo Blundo, Alfredo De Santis, Luisa Gargano, and Ugo Vaccaro, On the Information Rate of Secret Sharing Schemes,
    • Theoretical Computer Science, vol. 154, 1996, n. 2, pp. 283-306.
    • Preliminary version in “Advances in Cryptology - CRYPTO 92”, Ed. E. Brickell, vol. 740 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 148-167.
    • Technical Report 94-115, Universität Bielefeld, Germany, 1994.
  88. Roberto De Prisco and Alfredo De Santis, New Lower Bounds on the Cost of Binary Search Trees,
    • Theoretical Computer Science, vol. 156, n. 1-2, March 1996, pp. 315-325.
    • Technical Report CUCS-031-93, Columbia University, USA, 1993. (Preliminary version.)
  89. Roberto De Prisco and Alfredo De Santis, On the Redundancy Achieved by Huffman Codes,
    • Information Sciences, vol. 88, n. 1-4, pp. 131-148, Jan 1996.
    • MIT Laboratory for Computer Science Technical Memorandum MIT/LCS/TM-536, October 1995.
  90. Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia, and Ugo Vaccaro, New Bounds on the Information Rate of Secret Sharing Schemes, IEEE Transaction on Information Theory, vol. 41, n. 2, March 1995, pp. 549-554.
  91. Carlo Blundo, Alfredo De Santis, Douglas R. Stinson, and Ugo Vaccaro, Graph Decompositions and Secret Sharing Schemes,
    • Journal of Cryptology, vol. 8, n. 1, 1995, pp. 39-64.
    • Preliminary version in “Advances in Cryptology - EUROCRYPT 92”, Ed. R. A. Rueppel, vol. 658 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 1-24.
  92. Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Zero-Knowledge Arguments and Public-Key Cryptography, Information and Computation, vol. 121, n. 1, 1995, pp. 23-40.
  93. Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, The Knowledge Complexity of Quadratic Residuosity Languages, Theoretical Computer Science, vol. 132, 1994, pp. 291-317.
  94. Renato M. Capocelli, Alfredo De Santis, and Giuseppe Persiano, Binary Prefix Codes Ending in a '1', IEEE Transaction on Information Theory, vol. 40, n. 4, July 1994, pp. 1296-1302.
  95. Alfredo De Santis and Giuseppe Persiano, Tight Upper and Lower Bounds on the Path Length of Binary Trees,
    • SIAM Journal on Computing, vol. 23, n. 1, February 1994, pp. 12-23.
    • Technical Report 07-91, Aiken Computation Laboratory - Harvard University.
  96. Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, and Ugo Vaccaro, On the Size of Shares for Secret Sharing Schemes,
    • Journal of Cryptology, vol. 6, n. 3, pp. 157-169, 1993.
    • Preliminary version in “Advances in Cryptology - CRYPTO 91”, Ed. J. Feigenbaum, vol. 576 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 101-113.
    • see also Proceedings of the Symposium on Computer Security, Rome, November 1990, pp. 51-59.
  97. Roberto De Prisco and Alfredo De Santis, On Optimal Binary Search Trees, Information Processing Letters, vol. 45, April 1993, pp. 249-253.
  98. Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, and Ugo Vaccaro, On the Construction of Statistically Synchronizable Codes,
    • IEEE Transaction on Information Theory, vol. 38, n. 2, Mar. 1992, pp. 407-414.
    • 1990 IEEE International Symposium on Information Theory, San Diego, California, January 1990.
  99. Renato M. Capocelli and Alfredo De Santis, On the Redundancy of Optimal Codes with Limited Word Length,
    • IEEE Transaction on Information Theory, vol. 38, n. 2, Mar. 1992, pp. 439-445.
    • Proceedings of the 1989 Conference on Information Sciences and Systems, Baltimore, Maryland, March 1989.
    • IBM Research Report RC-14152.
  100. Manuel Blum, Alfredo De Santis, Silvio Micali, and Giuseppe Persiano, Non-Interactive Zero Knowledge,
    • SIAM Journal on Computing, vol. 19, n. 6, December 1991, pp. 1084-1118.
    • MIT Research Report MIT/LCS/TM-430, May 1990.
  101. Renato M. Capocelli and Alfredo De Santis, New Bounds on the Redundancy of Huffman Codes, IEEE Transaction on Information Theory, vol. 37, n. 4, pp. 1095-1104, July 1991.
  102. Renato M. Capocelli and Alfredo De Santis, A Note on D-ary Huffman Codes,
    • IEEE Transaction on Information Theory, vol. 37, n. 1, pp. 174-179, January 1991.
    • IBM Research Report RC-14082.
  103. Renato M. Capocelli and Alfredo De Santis, Tight Upper Bounds on the Redundancy of Huffman Codes, IEEE Transaction on Information Theory, vol. 35, n. 5, pp. 1084-1091, September 1989.
  104. Renato M. Capocelli, Alfredo De Santis, and Indeer Jeet Taneja, Bounds on the Entropy Series,
    • IEEE Transaction on Information Theory, IT-34, n. 1, pp. 134-138, January 1988.
    • IEEE 1986 International Symposium on Information Theory, Ann Arbor, Michigan, October 1986.
    • IBM Research Report RC-14081.
  105. Renato M. Capocelli and Alfredo De Santis, Regular Universal Codeword Sets, IEEE Transaction on Information Theory, vol. IT-32, n. 1, pp. 129-133, January 1986.
  1. Roberto De Prisco, Alfredo De Santis, and Marco Mannetta, Reducing costs in HSM-based Data Centers, Proceedings of the 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 3-14, vol. 10232 of “Lecture Notes in Computer Science“, Springer, (Conference held in Cetara, Italy, May 11-14,  2017)
  2. Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, and Aniello Castiglione, On the Relations between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures, Proceedings of the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), vol. 9723 of “Lecture Notes in Computer Science“, Springer, (Conference held in Melbourne, Australia, 4-6 July 2016, pp. 37-56.
  3. Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, and Aniello Castiglione, Reversible Copyright Protection for DNA Microarray Images, 10-th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2015), November 4-6, 2015, Krakow, Poland.
  4. Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Francesco Palmieri, and Aniello Castiglione, Format-Independent Protection of DNA Microarray Images, 10-th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2015), November 4-6, 2015, Krakow, Poland.
  5. Aniello Castiglione, Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, and Raffaele Pizzolante, Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST 2015), pp. 29-39, October 12-16, 2015, Denver, Colorado, US.
  6. Luigi Di Biasi, Roberto Fino, Rosaura Parisi, Lucia Sessa, Giuseppe Cattaneo, Alfredo De Santis, Pio Iannelli, and Stefano Piotto, Novel Algorithm for Efficient Distribution of Molecular Docking Calculations, Proceedings of WIVACE 2015, Bari, Italy, September 22-25, 2015, Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, vol. 587 of the series Communications in Computer and Information Science, Springer, pp. 65-74.
  7. Lucia Sessa, Luigi Di Biasi, Simona Concilio, Giuseppe Cattaneo, Alfredo De Santis, Pio Iannelli, and Stefano Piotto, A New Flexible Protocol for Docking Studies, Proceedings of WIVACE 2015, Bari, Italy, September 22-25, 2015, Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, vol. 587 of the series Communications in Computer and Information Science, Springer, pp. 117-126.
  8. Arcangelo Castiglione, Alfredo De Santis, Raffaele Pizzolante, Aniello Castiglione, Vincenzo Loia, and Francesco Palmieri, On the Protection of fMRI Images in Multi-domain Environments, Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015), pp. 476-481, Gwangju, Korea, 25-27 March 2015.
  9. Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, and Alfredo De Santis, Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images, Proceedings of the 17th International Conference on Network-Based Information Systems (NBiS-2014), IEEE, pp. 91-98, September 10-12, 2014, Salerno, Italy.
  10. Arcangelo Castiglione, Alfredo De Santis, and Barbara Masucci, Hierarchical and Shared Key Assignment, Proceedings of the 17th International Conference on Network-Based Information Systems (NBiS-2014), IEEE, pp. 23-27, September 10-12, 2014, Salerno, Italy
  11. Ugo Fiore, Aniello Castiglione, Alfredo De Santis, and Francesco Palmieri, Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome, Proceedings of the 17th International Conference on Network-Based Information Systems (NBiS-2014), IEEE, pp. 355-360, September 10-12, 2014, Salerno, Italy
  12. Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, and Aniello Castiglione, Protection of Microscopy Images through Digital Watermarking Techniques, Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCos 2014), pp. 65-72, September 10-12, 2014, Salerno, Italy
  13. Giuliana Carullo, Aniello Castiglione, and Alfredo De Santis, Friendship Recommendations in Online Social Networks, Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCos 2014), pp. 42-48, September 10-12, 2014, Salerno, Italy
  14. Arcangelo Castiglione, Raffaele Pizzolante, Alfredo De Santis, and Ciriaco D’Ambrosio, A Collaborative Decision-Support System for Secure Analysis of Cranial Disorders, Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCos 2014), pp. 189-196, September 10-12, 2014, Salerno, Italy
  15. Antonio Colella, Aniello Castiglione, and Alfredo De Santis, The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach, Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCos 2014), pp. 350-355, September 10-12, 2014, Salerno, Italy
  16. Arcangelo Castiglione, Aniello Castiglione, Alfredo De Santis, and Francesco Palmieri, An Efficient and Transparent One-Time Authentication Protocol with Non-Interactive Key Scheduling and Update, Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), pp. 351-358, Victoria, Canada, May 13-16, 2014.
  17. Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Vincenzo Loia, and Alfredo De Santis, Multimedia-Based Battery Drain Attacks for Android Devices, Proceedings of the Fifth IEEE Consumer Communications and Networking Conference (CCNC International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2014), Las Vegas, USA, January 10-13, 2014.
  18. Paolo D'Arco, Roberto De Prisco, and Alfredo De Santis, Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes, 7th International Conference on Information Theoretic Security (ICITS 2013, “Lecture Notes in Computer Science”, Singapore, November, 28-30, 2013.
  19. Aniello Castiglione, Arcangelo Castiglione, Alfredo De Santis, Francesco Palmieri, and Ugo Fiore, An Energy-Aware Framework for Reliable and Secure End-To-End Ubiquitous Data Communications, Proceedings of the Fifth International Conference on Intelligent Networking and Collaborative Systems (INCoS-2013), pp. 157-165, IEEE, Xi’an, China, September, 9-11, 2013.
  20. Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, and Alfredo De Santis, Analyzing the Internet Stability in Presence of Disasters, CD-ARES Workshops 2013, vol. 8127 of “Lecture Notes in Computer Science”, pp. 253-268, Springer, Regensburg, Germany, September 2-6, 2013.
  21. Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, and Francesco Palmieri, Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness, CD-ARES Workshops 2013, vol. 8127 of “Lecture Notes in Computer Science”, pp. 414-429, Springer, Regensburg, Germany, September 2-6, 2013.
  22. Paolo D’Arco and Alfredo De Santis, Key Privacy and Anonymous Protocols, Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust (PST 2013), IEEE, pp. 11-18, Tarragona, Spain, July 10-12, 2013.
  23. Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Aniello Castiglione, and Francesco Palmieri, On Secure Data Management in Health-Care Environment, Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2013), IEEE, pp. 666-671, Taichung, Taiwan, July 3-5, 2013.
  24. Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Alfredo De Santis, Forensically-Sound Methods to Collect Live Network Digital Evidence, Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25-28, 2013.
  25. Giuliana Carullo, Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment, Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25-28, 2013.
  26. Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, and Kangbin Yim, How to Forge a Digital Alibi on MAC OS X, Proceedings of the Second IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2012), “Lecture Notes in Computer Science”, pp. 359-373, Springer, Prague, Czech Republic, August 20-24, 2012.
  27. Giancarlo De Maio, Aniello Castiglione, Giuseppe Cattaneo, Gerardo Costabile, Alfredo De Santis, and Mattia Epifani, The Forensic Analysis of a False Digital Alibi, Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), IEEE 2012, Palermo, Italy, July 4-6, 2012.
  28. Aniello Castiglione, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, Device Tracking in Private Networks via NAPT Log Analysis, Proceedings of the Second International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS 2012), IEEE 2012, Palermo, Italy, July 4-6, 2012.
  29. Pietro Albano, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Alfredo De Santis, On the Construction of a False Digital Alibi on the Android OS, Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems (INCoS-2011), pp. 685-690, IEEE 2011, Fukuoka Institute of Technology, Fukuoka, Japan, November 30 - December 2, 2011.
  30. Aniello Castiglione, Giuseppe Cattaneo, and Alfredo De Santis, A Forensic Analysis of Images on Online Social Networks, Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems (INCoS-2011), pp. 679-684, IEEE 2011, Fukuoka Institute of Technology, Fukuoka, Japan, November 30 - December 2, 2011.
  31. Aniello Castiglione, Alfredo De Santis, and Francesco Palmieri, Characterizing and Classifying Card-sharing Traffic Through Wavelet Analysis, Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems (INCoS-2011), pp. 691-697, IEEE 2011, Fukuoka Institute of Technology, Fukuoka, Japan, November 30 - December 2, 2011.
  32. Maurizio Cembalo, Alfredo De Santis, and Umberto Ferraro Petrillo, SAVI: A New System for Advanced SQL Visualization, Proceedings of the 12th ACM Information Technology Education (SIGITE 2011), West Point, New York, October 20-22, 2011.
  33. Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Alfredo De Santis, Automatic, Selective and Secure Deletion of Digital Evidence, Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), pp. 392-398, IEEE 2011, Barcelona, Spain, October 26-28, 2011.
  34. Pietro Albano, Aniello Castiglione, Giuseppe Cattaneo, and Alfredo De Santis, A Novel Anti-Forensics Technique for the Android OS, Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), pp. 380-385, IEEE 2011, Barcelona, Spain, October 26-28, 2011.
  35. Aniello Castiglione, Bonaventura D'Alessio, and Alfredo De Santis, Steganography and Secure Communication on Online Social Networks and Online Photo Sharing, Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), pp. 363-368, IEEE 2011, Barcelona, Spain, October 26-28, 2011.
  36. Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis, and Francesco Palmieri, New Steganographic Techniques for the OOXML File Format, Proceedings of the Sixth International Conference on Availability, Reliability and Security (AReS 2011), vol. 6908 of “Lecture Notes in Computer Science”, pp. 344-358, Springer, (Conference held in Vienna, Austria, August 22 – 26, 2011).
  37. Alfredo De Santis, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Mario Ianulardo, Automated Construction of a False Digital Alibi, Proceedings of the Sixth International Conference on Availability, Reliability and Security (AReS 2011), vol. 6908 of “Lecture Notes in Computer Science”, pp. 359-373, Springer, (Conference held in Vienna, Austria, August 22 – 26, 2011).
  38. Aniello Castiglione, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, E-mail-based Covert Channels for Asynchronous Message Steganography, Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2011), pp. 503-508, IEEE 2011, (Conference held in Korean Bible University, Seoul, Korea, June 30 – July 2, 2011).
  39. Roberto De Prisco and Alfredo De Santis, Using Colors to Improve Visual Cryptography for Black and White Images, Proceedings of the Fifth International Conference on Information Theoretic Security (ICITS 2011), vol. 6673 of “Lecture Notes in Computer Science”, pp. 182-201, Springer, (Conference held in Amsterdam, The Nederlands, May 21 – 24, 2011.
  40. Aniello Castiglione, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri, An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats, Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2010, pp. 475-481, IEEE 2010, Fukuoka Institute of Technology, Fukuoka, Japan, November 4-6, 2010.
  41. Aniello Castiglione, M. Cepparulo, Alfredo De Santis, and F.rancesco Palmieri, Towards a Lawfully Secure and Privacy Preserving Video Surveillance System, Proceedings of the 11th International Conference on Electronic Commerce and Web Technologies (EC-Web 2010, vol. 61 of “Lecture Notes in Business Information Processing” (LNBIP), pp. 73-84, Springer, (Conference held at Universidad de Deusto, Bilbao, Spain, September 1-3, 2010.
  42. Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Alfredo De Santis, Francesco Petagna, and Umberto Ferraro Petrillo, An Extensible Framework for Efficient Secure SMS, Proceedings of the Fourth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2010), pp. 843-850, IEEE Computer Society 2010, (Conference held in Krakow, Poland, 15-18 February 2010.
  43. Giuseppe Cattaneo, Alfredo De Santis, and Umberto Ferraro Petrillo, DISCERN: A Collaborative Visualization System for Learning Cryptographic Protocols, Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009, pp. 1-8, IEEE 2009 (Conference held in Washington D.C., US, November 11-14, 2009.
  44. Aniello Castiglione, Roberto De Prisco, and Alfredo De Santis, Do you trust your phone? Proceedings of the 10th International Conference on Electronic Commerce and Web Technologies (EC-Web 2009), vol. 5692 of “Lecture Notes in Computer Science”, pp. 50-61, Springer, (Conference held at Johannes Kepler University of Linz, Linz, Austria, 31 August - 4 September 2009).
  45. Luigi Catuogno and Alfredo De Santis, An Internet Role-game for the Laboratory of a Network Security Course, Proceedings of the 13th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE 2008, pp. 240-244, ACM 2008, (Conference held in Madrid, Spain, June 30 – July 2, 2008.
  46. Alfredo De Santis and Claudio Soriente, Modified Original Smart Cards and Smart Card Clones Countermeasures, Proceedings of the International Conference on Computational Intelligence and Security (CIS 2007, pp. 878-882, IEEE Computer Society 2007, (Conference held in Harbin, China, December 15-19, 2007.
  47. Paolo D’Arco and Alfredo De Santis, Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation, Proceedings of the Second International Conference on Information Theoretic Security (ICITS 2007, vol. 4883 of “Lecture Notes in Computer Science”, pp. 46-64, (Conference held in Madrid, Spain, May 25-29, 2007.
  48. Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis, Fabio Petagna, and Umberto Ferraro Petrillo, SPEECH: Secure Personal End-to-End Communication with Handheld, Proceedings of the Conference on Information Security Solutions Europe (ISSE 2006), Securing Electronic Business Processes, pp. 287-297, (Conference held in Roma, Italy, 10-12 October 2006).
  49. Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy, Proceedings of the International Workshop on Coding and Cryptography (WCC 2005, vol. 3969 of “Lecture Notes in Computer Science”, pp. 202-217, (Conference held in Bergen, Norway, March 14-18, 2005.
  50. Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, On NC1 Boolean Circuit Composition of Non-Interactive Perfect Zero Knowledge, Proceedings of the 29th International Symposium on Mathematical Foundations of Computer Science (MFCS '04, vol. 3153 of “Lecture Notes in Computer Science”, pp. 356-367. (Conference held in Prague, Czech Republic, August 22 - 27, 2004.
  51. Carlo Blundo, Paolo D’Arco, and Alfredo De Santis, Definitions and Bounds for Self-Healing Key Distribution Schemes, in 31th International Colloquium on Automata, Languages and Programming (ICALP '04, Eds. J. Diaz et al., vol. 3142 of “Lecture Notes in Computer Science”, pp. 234-245. (Conference held in Turku, Finland, July 12-16, 2004.)
  52. Carlo Blundo, Paolo D’Arco, Alfredo De Santis, and Clemente Galdi, A Novel Approach to Proactive Password Checking, Proceedings of InfraSec 2002, Eds. G. Davida, Y. Frankel, and O. Rees, vol. 2437 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 30-39. (International conference held in Bristol, UK, October 1-3, 2002.)
  53. Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Randomness-Optimal Characterization of Two NP Proof Systems, Proceedings of the 6th International Workshop on Randomization and Approximation Techniques (RANDOM 2002, Eds. J.D.P. Rolim and S. Vadhan, vol. 2483 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 179-193. (Workshop held in Cambridge, MA, USA, September 13-15, 2002.
  54. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, and Douglas Stinson, New Results on Unconditionally Secure Distributed Oblivious Transfer, Proceedings of Selected Areas in Cryptography (SAC 2002, vol. 2595 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 291-309. (International conference held in St. John’s, Canada, August 15-16, 2002.).
  55. Alfredo De Santis and Barbara Masucci, On Information Dispersal Algorithms, Proceedings of the 2002 IEEE International Symposium on Information Theory, pag. 410, June 30 - July 5, 2002, Lausanne, Switzerland.
  56. Annalia de Bonis and Alfredo De Santis, Secret Sharing and Visual Cryptography Schemes, Proceedings of the IFIP TC11 16th International Conference on Information Security (IFIP/Sec’01, June 11-13, 2001, Paris, France, M. Dupuy and P. Paradinas Eds, Kluwer Academic Publishers, pp. 123-137.
  57. Alfredo De Santis, Giovanni Di Crescenzo, R. Ostrovsky, Giuseppe Persiano, and A. Sahai, Non-Interactive Zero Knowledge in the Multi-Party Setting, in “Advances in Cryptology - CRYPTO 2001”, Ed. J. Kilian, vol. 2139 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 566-598.
  58. Annalisa de Bonis and Alfredo De Santis, New Results on the Randomness of Visual Cryptography Schemes, Progress in Computer Science and Applied Logic, vol. 20, pp. 187-202, Birkhäuser Verlag, March 2001. (Proceedings of the Workshop on Cryptography ad Computational Number Theory (CCNT ’99, held in Singapore Nov. 22-26, 1999, Eds. Kwok-Yan Lam, Igor Shparlinski, Huaxiong Wang, and Chaoping Xing)
  59. Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Necessary and Sufficient Assumptions for Non-Interactive Zero-Knowledge proofs of Knowledge for all NP relations, in “27th International Colloquium on Automata, Languages and Programming” (ICALP 2000, Eds. U. Montanari, J. D.R. Rolim, and E. Welzl, vol. 1853 of “Lecture Notes in Computer Science”, pp. 451-462. (Conference held in Geneve, Switzerland, July 9-15, 2000.)
  60. Annalisa de Bonis and Alfredo De Santis, Randomness in Visual Cryptography, in “STACS 2000” (17th Annual Symposium on Theoretical Aspects of Computer Science), Lille, France, February 2000, Eds. Horst Reichel and Sophie Tison, vol. 1770 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 627-638.
  61. Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung, Non-Interactive Zero-Knowledge: A Low-Randomness Characterization of NP, in “26th International Colloquium on Automata, Languages and Programming” (ICALP '99, Eds. J. Wiedermann, P. van Emde Boas, and M. Nielsen, vol. 1644 of “Lecture Notes in Computer Science”, pp. 271-280.
  62. Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Communication-Efficient Anonymous Group Identification, Proceedings of 5th ACM Conference on Computer and Communications Security (CCS 98, pp. 73-82, San Francisco, California, November 2-5, 1998.
  63. Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung, Image Density is Complete for Non-Interactive-SZK, in “25th International Colloquium on Automata, Languages and Programming” (ICALP '98, Eds. Kim G. Larsen, Sven Skyum, and Glynn Winskel, vol. 1443 of “Lecture Notes in Computer Science”, pp. 784-795. (Conference held in Aalborg, Denmark, July 13-17, 1998.)
  64. Roberto De Prisco and Alfredo De Santis, On the Redundancy and Data Expansion of Huffman Codes, Proceedings of the 1998 IEEE International Symposium on Information Theory, MIT, Cambridge, USA, August 16-21, 1998.
  65. Alfredo De Santis, On Visual Cryptography Schemes, Proceedings of the IEEE Information Theory Workshop, pp. 154-155, Killarney, Ireland, June 22-26, 1998. Invited lecture.
  66. Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Randomness-efficient Non-Interactive Zero-knowledge, in “24th International Colloquium on Automata, Languages and Programming” (ICALP '97, Eds. P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, vol. 1256 of “Lecture Notes in Computer Science”, Springer Verlag, pp. 716-726. (Conference held in Bologna, Italy, July 7-11, 1997.)
  67. Carlo Blundo, Alfredo De Santis, R. De Simone, and Ugo Vaccaro, New Bounds on the Share's Size in Secret Sharing Schemes, Proceedings of the 1st International Conference on the Theory and Applications of Cryptology, PRAGOCRYPT '96, pp. 349-358, Ed. J. Pribyl, CTU Publishing House, Prague, Czech Republic, 1996. (Conference held in Prague, Czech Republic, September 30 - October 2, 1996.)
  68. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas Stinson, Constructions and Bounds for Visual Cryptography, in “23rd International Colloquium on Automata, Languages and Programming” (ICALP '96, Ed. F. Meyer auf der Heide, vol. 1099 of “Lecture Notes in Computer Science”, Springer Verlag, pp. 416-428. (Conference held in Paderborn, Germany, July 8-12, 1996.)
  69. Carlo Blundo, Alfredo De Santis, Giuseppe Persiano, and Ugo Vaccaro, On the Number of Random Bits Needed in Totally Private Computation, in “22nd International Colloquium on Automata, Languages and Programming” (ICALP '95, Eds. Z. Fülöp and F. Gècseg, vol. 944 of “Lecture Notes in Computer Science”, pp. 171-182.
  70. Alfredo De Santis, T. Okamoto, and Giuseppe Persiano, Zero-Knowledge Proofs of Computational Power in the Shared String Model, in “Advances in Cryptology - ASIACRYPT '94”, Ed. J. Pieprczyk, vol. 917 of “Lecture Notes in Computer Science”, Springer Verlag, 1994.
  71. Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung, On Monotone Formula Closure of SZK, Proceedings of 35th IEEE Symposium on Foundations of Computer Science (FOCS '94, Santa Fe, New Mexico, USA, November 20-22, 1994, pp. 454-465.
  72. Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, and Ugo Vaccaro, Multi-Secret Sharing Schemes, in “Advances in Cryptology - CRYPTO 94”, Ed. Y. Desmedt, vol. 839 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 150-163.
  73. Alfredo De Santis, Yvo Desmedt, Y. Frankel, and Moti Yung, How to Share a Function Securely, Proceedings of 26th ACM Symposium on Theory of Computing (STOC '94, Montrèal, Quèbec, Canada, May 23-25, 1994, pp. 522-533.
  74. Carlo Blundo, Alfredo De Santis, Antonio Giorgio Gaggia, and Ugo Vaccaro, Lower Bounds in Secret Sharing Schemes, Proceedings of the 1994 IEEE International Symposium on Information Theory, Trondheim, Norway, June 1994.
  75. Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano, Secret Sharing and Perfect Zero Knowledge, in “Advances in Cryptology - CRYPTO 93”, Ed. D. R. Stinson, vol. 773 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 73-84.
  76. Marco Carpentieri, Alfredo De Santis, and Ugo Vaccaro, Size of Shares and Probability of Cheating in Threshold Schemes, in “Advances in Cryptology - EUROCRYPT 93”, Ed. Tom Helleset, vol. 765 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 118-125.
  77. Carlo Blundo, Alfredo De Santis, and Ugo Vaccaro, Efficient Sharing of Many Secrets, in “STACS 93” (10th Annual Symposium on Theoretical Aspects of Computer Science), Eds. P. Enjalbert, A. Finkel, and K. W. Wagner, vol. 665 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 692-703, 1993. (Conference held in Würzburg, Germany, 25-27 February 1993.)
  78. Carlo Blundo, Alfredo De Santis, Luisa Gargano, and Ugo Vaccaro, Secret Sharing Schemes with Veto Capabilities, in “Algebraic Coding”, Eds. G. Cohen, S. Litsyn, A. Lobstein, and G. Zèmor, vol. 781 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 82-89. (“First French-Israeli Workshop in Algebraic Coding”, ENST, Paris, July 19-21, 1993.)
  79. Alfredo De Santis and Giuseppe Persiano, Zero-knowledge Proofs of Knowledge Without Interaction, Proceedings of 33rd IEEE Symposium on Foundations of Computer Science (FOCS '92, Pittsburgh, Pennsylvania, October 1992, pp. 427-437.
  80. Alfredo De Santis, Giuseppe Persiano, and Moti Yung, One-Message Zero-Knowledge Proofs and Space-Bounded Verifier, in “19th International Colloquium on Automata, Languages and Programming” (ICALP '92, Ed. W. Kuich, vol. 623 of “Lecture Notes in Computer Science”, Springer Verlag, pp. 28-40. (Conference held in Wien, Austria, July 12-17, 1992.)
  81. Alfredo De Santis and Giuseppe Persiano, Communication Efficient Zero-Knowledge Proofs of Knowledge (With Applications to Electronic Cash), in “STACS 92” (9th Annual Symposium on Theoretical Aspects of Computer Science), Eds. A. Finkel and M. Jantzen, vol. 577 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 449-460.
  82. Alfredo De Santis and Giuseppe Persiano, Tight Bounds on the Path Length of Binary Trees, in “STACS 91” (8th Annual Symposium on Theoretical Aspects of Computer Science), Eds. C. Choffrut and M. Jantzen, vol. 480 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 478-487.
  83. Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, and Ugo Vaccaro, A Note on Secret Sharing Schemes, in “Advanced International Workshop on Sequences”, Positano, Italy, June 1991, Eds. R. M. Capocelli, A. De Santis, and U. Vaccaro, Springer-Verlag, pp. 335-344.
  84. Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, and Ugo Vaccaro, An Information-Theoretic Treatment of Secret Sharing Schemes, Proceedings of the 1991 IEEE International Symposium on Information Theory, Budapest, Hungary, June 1991.
  85. Alfredo De Santis and Giuseppe Persiano, Non-interactive Zero-knowledge Proofs of Knowledge, Workshop on Cryptography, Luminy, France, Sept. 1991.
  86. Alfredo De Santis and Giuseppe Persiano, An Optimal Algorithm for the Construction of Optimal Prefix Codes with given Fringe, in Proceedings of the 1991 Data Compression Conference (DCC '91, Snowbird, Utah, April 1991, Eds. J. A. Storer and J. H. Reif, pp. 297-306.
  87. Renato M. Capocelli and Alfredo De Santis, Minimum Codeword Length and Redundancy of Huffman Codes, in Proceedings of “EUROCODE '90”, Eds. G. Cohen and P. Charpin, vol. 514 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 309-317. (Conference held in Paris, November 1990.)
  88. Alfredo De Santis and Moti Yung, Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems, in “Advances in Cryptology - CRYPTO 90”, Eds. A. J. Menezes and S. A. Vanstone, vol. 537 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 366-377.
  89. Alfredo De Santis and Moti Yung, On the Design of Provably-Secure Cryptographic Hash Functions, in “Advances in Cryptology - EUROCRYPT 90”, Ed. I. B. Damgård, vol. 473 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 412-431. (Conference held in Aarhus, Denmark, May 1990.)
  90. Alfredo De Santis and Giuseppe Persiano, Public-Randomness in Public-Key Cryptosystems, in “Advances in Cryptology - EUROCRYPT 90”, Ed. I. B. Damgård, vol. 473 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 46-62. (Conference held in Aarhus, Denmark, May 1990.)
  91. Renato M. Capocelli and Alfredo De Santis, '1'-ended Binary Prefix Codes,
    • 1990 IEEE International Symposium on Information Theory, San Diego, California, January 1990.
    • IBM Research Report RC-14150.
  92. Renato M. Capocelli and Alfredo De Santis, Tight Upper Bounds on the Entropy Series,
    • 1990 IEEE International Symposium on Information Theory, San Diego, California, January 1990.
    • IBM Research Report RC-14084.
  93. Renato M. Capocelli and Alfredo De Santis, Improved Bounds on the Redundancy of Huffman Codes,
    • Fourth Joint Swedish-USSR International Workshop on Information Theory, Gotland, Sweden, August 1989.
    • IBM Research Report RC-14151.
  94. Renato M. Capocelli and Alfredo De Santis, Tight Bounds on the Redundancy of Huffman Codes,
    • IEEE 1988 International Symposium on Information Theory, Kobe, Japan, June 1988.
    • IBM Research Report RC-14154.
  95. Alfredo De Santis, Silvio Micali, and Giuseppe Persiano, Removing Interaction from Zero-Knowledge Proofs,
    • in Proceedings of “Advanced International Workshop on Sequences”, Positano, Italy, June 1988, Ed. R. M. Capocelli, Springer-Verlag, pp. 377-393.
    • IBM Research Report RC-14153.
  96. Alfredo De Santis, George Markovsky, and Mark N. Wegman, Learning Probabilistic Prediction Functions,
    • Proceedings of 29th IEEE Symposium on Foundations of Computer Science (FOCS '98, White Plains, New York, October 1988, pp. 110-119.
    • Proceedings of the first Workshop on Computational Learning Theory, MIT, Cambridge, Massachusetts, August 1988, pp. 312-328.
  97. Alfredo De Santis, Silvio Micali, and Giuseppe Persiano, Non-Interactive Zero-Knowledge Proof Systems with Preprocessing,
    • in “Advances in Cryptology - CRYPTO 88”, Ed. S. Goldwasser, vol. 403 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 269-282.
    • IBM Research Report RC-14083.
  98. Alfredo De Santis, Silvio Micali, and Giuseppe Persiano, Non-Interactive Zero-Knowledge Proof Systems, in “Advances in Cryptology - CRYPTO 87”, Ed. C. Pomerance, vol. 293 of “Lecture Notes in Computer Science”, Springer-Verlag, pp. 52-72.
  99. Renato M. Capocelli and Alfredo De Santis, Unbounded Fibonacci Search and Related Encodings, IEEE 1986 International Symposium on Information Theory, Ann Arbor, Michigan, October 1986.
  1. Carlo Blundo, Annalisa Caso, Giuseppe Cattaneo, A. D’Agostino, Alfredo De Santis, Gerardo Maiorano, e Giuseppe Persiano, Un‘architettura scalabile per servizi di time-stamp, in “ICT Globalizzazione e localismi”, Atti di AICA 2002, XL Congresso Annuale, Conversano (Bari), Italy, September 25-27, 2002, pp. 295-311.
  2. Carlo Blundo, Giuseppe Cattaneo, A. D’Agostino, Alfredo De Santis, Stefania Del Vacchio, Gerardo Maiorano, Isidoro Orabona, e Giuseppe Persiano, Un Sistema a Garanzia dell’Anonimato su Internet, in “Tecnologie, Innovazione e Società”, Atti di AICA 2001, XXXIX Congresso Annuale, Cernobbio (Como), Italy, September 19-22, 2001, pp. 151-167.
  1. Aniello Castiglione, Alfredo De Santis, and Francesco Palmieri, Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems, in “Privacy Protection Measures and Technologies in Business Organizations”, pp. 245-267, IGI Global, 2012, ISBN 9781613505014
  2. Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis, Visual Cryptography for Color Images, in “Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision), Ed. Stelvio Cimato, Ching-Nung Yang, pp. 31-46, CRC Press, 2012, ISBN 143983721X
  3. Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis, Probabilistic Visual Cryptography Schemes, in “Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision), Ed. Stelvio Cimato, Ching-Nung Yang, pp. 127-151, CRC Press, 2012, ISBN 143983721X
  4. Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, Visual Cryptography Schemes with Reversing, in “Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision), Ed. Stelvio Cimato, Ching-Nung Yang, pp. 255-278, CRC Press, 2012, ISBN 143983721X
  5. Renato M. Capocelli and Alfredo De Santis, Variations on a Theme by Gallager, in “Image and Text Compression”, Ed. James A. Storer, pp. 181-213, Kluwer Academic Publishers, Dordrecht, 1992, ISBN 0-7923-9243-4
  6. Carlo Blundo and Alfredo De Santis, On the Construction of Secret Sharing Schemes, in “Structure: from Physics to General Systems,” Festschrift volume in honour of Eduardo R. Caianiello on his seventieth birthday, Amalfi, October 22-23, 1991, vol. 2, pp. 245-261, World Scientific.