Barbara Masucci

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
Information Sciences
2020-02-06Paper
scientific article; zbMATH DE number 6741949 (Why is no real title available?)2017-07-11Paper
On the relations between security notions in hierarchical key assignment schemes for dynamic structures
Information Security and Privacy
2016-09-02Paper
On secret set schemes
Information Processing Letters
2016-06-16Paper
A note on time-bound hierarchical key assignment schemes
Information Processing Letters
2013-03-21Paper
Provably-secure time-bound hierarchical key assignment schemes
Journal of Cryptology
2012-07-03Paper
Efficient provably-secure hierarchical key assignment schemes
Theoretical Computer Science
2011-10-10Paper
An information-theoretic approach to the access control problem.
Lecture Notes in Computer Science
2010-02-23Paper
Variations on a theme by Akl and Taylor: security and tradeoffs
Theoretical Computer Science
2009-12-01Paper
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants
Mathematical Foundations of Computer Science 2009
2009-10-16Paper
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
2009-08-27Paper
Ideal contrast visual cryptography schemes with reversing
Information Processing Letters
2009-08-27Paper
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
2008-11-18Paper
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Mathematical Foundations of Computer Science 2007
2008-09-17Paper
An attack on a payment scheme
Information Sciences
2008-03-12Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Sharing multiple secrets: Models, schemes and analysis
Designs, Codes and Cryptography
2006-05-29Paper
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences
2006-05-16Paper
Unconditionally secure key assignment schemes
Discrete Applied Mathematics
2006-04-28Paper
A linear algebraic approach to metering schemes
Designs, Codes and Cryptography
2005-01-17Paper
Anonymous membership broadcast schemes
Designs, Codes and Cryptography
2004-08-16Paper
Bounds and constructions for metering schemes.
Communications in Information and Systems
2004-01-26Paper
A note on optimal metering schemes.
Information Processing Letters
2003-01-21Paper
Constructions and bounds for unconditionally secure non-interactive commitment schemes
Designs, Codes and Cryptography
2002-08-21Paper
Efficient metering schemes with pricing
IEEE Transactions on Information Theory
2002-08-04Paper
scientific article; zbMATH DE number 1696675 (Why is no real title available?)2002-01-28Paper
scientific article; zbMATH DE number 1689003 (Why is no real title available?)2002-01-09Paper
A lower bound on the encoding length in lossy transmission
Information Sciences
2000-01-05Paper
Multiple ramp schemes
IEEE Transactions on Information Theory
1999-11-21Paper


Research outcomes over time


This page was built for person: Barbara Masucci