D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 48 Citations 20,304 134 World Ranking 3927 National Ranking 1998

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Cryptography
  • Computer network

His primary areas of investigation include Cryptography, Computer security, Theoretical computer science, Encryption and Random oracle. His study in Cryptography is interdisciplinary in nature, drawing from both Group Domain of Interpretation, Metadata, Data security, Database and Protocol. His research investigates the link between Protocol and topics such as Overhead that cross with problems in Storage security.

Giuseppe Ateniese regularly links together related areas like Proxy in his Computer security studies. His Theoretical computer science research includes themes of Signature and Image. His research in Encryption tackles topics such as File server which are related to areas like Replication, Server and Computer data storage.

His most cited work include:

  • Provable data possession at untrusted stores (1848 citations)
  • Improved proxy re-encryption schemes with applications to secure distributed storage (1087 citations)
  • Scalable and efficient provable data possession (852 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Theoretical computer science, Cryptography, Encryption and Key. His research integrates issues of Cloud computing and Digital signature in his study of Computer security. The Theoretical computer science study combines topics in areas such as Random oracle, Mathematical proof, Signature and Algorithm.

Giuseppe Ateniese usually deals with Cryptography and limits it to topics linked to Group signature and Group. He has included themes like Communication source and Access control in his Encryption study. His Ciphertext study which covers Plaintext that intersects with Proxy and File system.

He most often published in these fields:

  • Computer security (46.31%)
  • Theoretical computer science (27.52%)
  • Cryptography (26.17%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (46.31%)
  • Cryptography (26.17%)
  • Artificial intelligence (9.40%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer security, Cryptography, Artificial intelligence, Deep learning and Cryptographic primitive. In his works, Giuseppe Ateniese performs multidisciplinary study on Computer security and Process. His Cryptography research is multidisciplinary, relying on both Signature, Digital signature, Privilege escalation, Identity and Stateful firewall.

The various areas that he examines in his Artificial intelligence study include Password and Password strength. His Cryptographic primitive research is multidisciplinary, incorporating elements of Adversary, Public-key cryptography, Computer security model and Asset. His Theoretical computer science study incorporates themes from Communication source, Attribute-based encryption and Encryption.

Between 2018 and 2021, his most popular works were:

  • Improving Password Guessing via Representation Learning (6 citations)
  • Public Immunization Against Complete Subversion Without Random Oracles. (5 citations)
  • Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains (2 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Cryptography
  • Computer network

Giuseppe Ateniese mainly investigates Computer security, Cryptography, Deep learning, Artificial intelligence and Order. His Computer security research is mostly focused on the topic Symmetric-key algorithm. His Cryptography study combines topics in areas such as Key, Public-key cryptography, Computer security model and Asset.

Giuseppe Ateniese combines subjects such as Password, Password cracking, Representation, Unstructured data and Probabilistic logic with his study of Deep learning. His research combines Theoretical computer science and Artificial intelligence. His work carried out in the field of Cryptographic primitive brings together such families of science as Adversary and Blockchain.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Provable Data Possession at Untrusted Stores.

Giuseppe Ateniese;Randal C. Burns;Reza Curtmola;Joseph Herring.
IACR Cryptology ePrint Archive (2007)

3535 Citations

Provable Data Possession at Untrusted Stores.

Giuseppe Ateniese;Randal C. Burns;Reza Curtmola;Joseph Herring.
IACR Cryptology ePrint Archive (2007)

3535 Citations

Scalable and Efficient Provable Data Possession.

Giuseppe Ateniese;Roberto Di Pietro;Luigi V. Mancini;Gene Tsudik.
IACR Cryptology ePrint Archive (2008)

1606 Citations

Scalable and Efficient Provable Data Possession.

Giuseppe Ateniese;Roberto Di Pietro;Luigi V. Mancini;Gene Tsudik.
IACR Cryptology ePrint Archive (2008)

1606 Citations

Improved proxy re-encryption schemes with applications to secure distributed storage

Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
ACM Transactions on Information and System Security (2006)

1545 Citations

Improved proxy re-encryption schemes with applications to secure distributed storage

Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
ACM Transactions on Information and System Security (2006)

1545 Citations

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme

Giuseppe Ateniese;Jan Camenisch;Marc Joye;Gene Tsudik.
international cryptology conference (2000)

1285 Citations

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme

Giuseppe Ateniese;Jan Camenisch;Marc Joye;Gene Tsudik.
international cryptology conference (2000)

1285 Citations

Visual Cryptography for General Access Structures

Giuseppe Ateniese;Carlo Blundo;Alfredo De Santis;Douglas R. Stinson.
Electronic Colloquium on Computational Complexity (1996)

939 Citations

Visual Cryptography for General Access Structures

Giuseppe Ateniese;Carlo Blundo;Alfredo De Santis;Douglas R. Stinson.
Electronic Colloquium on Computational Complexity (1996)

939 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Giuseppe Ateniese

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 114

Yi Mu

Yi Mu

Fujian Normal University

Publications: 71

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 59

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 52

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 49

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 43

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 42

Jianying Zhou

Jianying Zhou

Singapore University of Technology and Design

Publications: 41

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 39

Moti Yung

Moti Yung

Columbia University

Publications: 38

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 37

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 36

Alfredo De Santis

Alfredo De Santis

University of Salerno

Publications: 36

Fangguo Zhang

Fangguo Zhang

Sun Yat-sen University

Publications: 35

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 34

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 34

Trending Scientists

Michael P. Wellman

Michael P. Wellman

University of Michigan–Ann Arbor

Fred Douglis

Fred Douglis

Peraton Labs

Alberto H. F. Laender

Alberto H. F. Laender

Universidade Federal de Minas Gerais

Andrew Lumsdaine

Andrew Lumsdaine

Pacific Northwest National Laboratory

Yoshitaka Masutani

Yoshitaka Masutani

Hiroshima City University

Changyou Wang

Changyou Wang

Purdue University West Lafayette

Suse Broyde

Suse Broyde

New York University

Gordan Lauc

Gordan Lauc

University of Zagreb

Claude Prigent

Claude Prigent

University of Rennes

Pamela D. Kempton

Pamela D. Kempton

University of Nottingham

Dan M. Granoff

Dan M. Granoff

UCSF Benioff Children's Hospital

John Weinman

John Weinman

King's College London

Alexander M. Seifalian

Alexander M. Seifalian

Nanoregmed Ltd.

Cristina R. Ferrone

Cristina R. Ferrone

Harvard University

Oliver Razum

Oliver Razum

Bielefeld University

Larry L. Bumpass

Larry L. Bumpass

University of Wisconsin–Madison

Something went wrong. Please try again later.