His primary areas of investigation include Cryptography, Computer security, Theoretical computer science, Encryption and Random oracle. His study in Cryptography is interdisciplinary in nature, drawing from both Group Domain of Interpretation, Metadata, Data security, Database and Protocol. His research investigates the link between Protocol and topics such as Overhead that cross with problems in Storage security.
Giuseppe Ateniese regularly links together related areas like Proxy in his Computer security studies. His Theoretical computer science research includes themes of Signature and Image. His research in Encryption tackles topics such as File server which are related to areas like Replication, Server and Computer data storage.
The scientist’s investigation covers issues in Computer security, Theoretical computer science, Cryptography, Encryption and Key. His research integrates issues of Cloud computing and Digital signature in his study of Computer security. The Theoretical computer science study combines topics in areas such as Random oracle, Mathematical proof, Signature and Algorithm.
Giuseppe Ateniese usually deals with Cryptography and limits it to topics linked to Group signature and Group. He has included themes like Communication source and Access control in his Encryption study. His Ciphertext study which covers Plaintext that intersects with Proxy and File system.
His primary areas of study are Computer security, Cryptography, Artificial intelligence, Deep learning and Cryptographic primitive. In his works, Giuseppe Ateniese performs multidisciplinary study on Computer security and Process. His Cryptography research is multidisciplinary, relying on both Signature, Digital signature, Privilege escalation, Identity and Stateful firewall.
The various areas that he examines in his Artificial intelligence study include Password and Password strength. His Cryptographic primitive research is multidisciplinary, incorporating elements of Adversary, Public-key cryptography, Computer security model and Asset. His Theoretical computer science study incorporates themes from Communication source, Attribute-based encryption and Encryption.
Giuseppe Ateniese mainly investigates Computer security, Cryptography, Deep learning, Artificial intelligence and Order. His Computer security research is mostly focused on the topic Symmetric-key algorithm. His Cryptography study combines topics in areas such as Key, Public-key cryptography, Computer security model and Asset.
Giuseppe Ateniese combines subjects such as Password, Password cracking, Representation, Unstructured data and Probabilistic logic with his study of Deep learning. His research combines Theoretical computer science and Artificial intelligence. His work carried out in the field of Cryptographic primitive brings together such families of science as Adversary and Blockchain.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Provable Data Possession at Untrusted Stores.
Giuseppe Ateniese;Randal C. Burns;Reza Curtmola;Joseph Herring.
IACR Cryptology ePrint Archive (2007)
Provable Data Possession at Untrusted Stores.
Giuseppe Ateniese;Randal C. Burns;Reza Curtmola;Joseph Herring.
IACR Cryptology ePrint Archive (2007)
Scalable and Efficient Provable Data Possession.
Giuseppe Ateniese;Roberto Di Pietro;Luigi V. Mancini;Gene Tsudik.
IACR Cryptology ePrint Archive (2008)
Scalable and Efficient Provable Data Possession.
Giuseppe Ateniese;Roberto Di Pietro;Luigi V. Mancini;Gene Tsudik.
IACR Cryptology ePrint Archive (2008)
Improved proxy re-encryption schemes with applications to secure distributed storage
Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
ACM Transactions on Information and System Security (2006)
Improved proxy re-encryption schemes with applications to secure distributed storage
Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
ACM Transactions on Information and System Security (2006)
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
Giuseppe Ateniese;Jan Camenisch;Marc Joye;Gene Tsudik.
international cryptology conference (2000)
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
Giuseppe Ateniese;Jan Camenisch;Marc Joye;Gene Tsudik.
international cryptology conference (2000)
Visual Cryptography for General Access Structures
Giuseppe Ateniese;Carlo Blundo;Alfredo De Santis;Douglas R. Stinson.
Electronic Colloquium on Computational Complexity (1996)
Visual Cryptography for General Access Structures
Giuseppe Ateniese;Carlo Blundo;Alfredo De Santis;Douglas R. Stinson.
Electronic Colloquium on Computational Complexity (1996)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of California, Irvine
Johns Hopkins University
Johns Hopkins University
University of Salerno
Johns Hopkins University
University of California, Berkeley
ETH Zurich
Sapienza University of Rome
Zama
DFINITY
University of Michigan–Ann Arbor
Peraton Labs
Universidade Federal de Minas Gerais
Pacific Northwest National Laboratory
Hiroshima City University
Purdue University West Lafayette
New York University
University of Zagreb
University of Rennes
University of Nottingham
UCSF Benioff Children's Hospital
King's College London
Nanoregmed Ltd.
Harvard University
Bielefeld University
University of Wisconsin–Madison