Barbara Masucci

From MaRDI portal
Person:294773


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
Information Sciences
2020-02-06Paper
scientific article; zbMATH DE number 6741949 (Why is no real title available?)
 
2017-07-11Paper
On the relations between security notions in hierarchical key assignment schemes for dynamic structures
Information Security and Privacy
2016-09-02Paper
On secret set schemes
Information Processing Letters
2016-06-16Paper
A note on time-bound hierarchical key assignment schemes
Information Processing Letters
2013-03-21Paper
Provably-secure time-bound hierarchical key assignment schemes
Journal of Cryptology
2012-07-03Paper
Efficient provably-secure hierarchical key assignment schemes
Theoretical Computer Science
2011-10-10Paper
An information-theoretic approach to the access control problem.
Lecture Notes in Computer Science
2010-02-23Paper
Variations on a theme by Akl and Taylor: security and tradeoffs
Theoretical Computer Science
2009-12-01Paper
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants
Mathematical Foundations of Computer Science 2009
2009-10-16Paper
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
2009-08-27Paper
Ideal contrast visual cryptography schemes with reversing
Information Processing Letters
2009-08-27Paper
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
2008-11-18Paper
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Mathematical Foundations of Computer Science 2007
2008-09-17Paper
An attack on a payment scheme
Information Sciences
2008-03-12Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Sharing multiple secrets: Models, schemes and analysis
Designs, Codes and Cryptography
2006-05-29Paper
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences
2006-05-16Paper
Unconditionally secure key assignment schemes
Discrete Applied Mathematics
2006-04-28Paper
A linear algebraic approach to metering schemes
Designs, Codes and Cryptography
2005-01-17Paper
Anonymous membership broadcast schemes
Designs, Codes and Cryptography
2004-08-16Paper
Bounds and constructions for metering schemes.
Communications in Information and Systems
2004-01-26Paper
A note on optimal metering schemes.
Information Processing Letters
2003-01-21Paper
Constructions and bounds for unconditionally secure non-interactive commitment schemes
Designs, Codes and Cryptography
2002-08-21Paper
Efficient metering schemes with pricing
IEEE Transactions on Information Theory
2002-08-04Paper
scientific article; zbMATH DE number 1696675 (Why is no real title available?)
 
2002-01-28Paper
scientific article; zbMATH DE number 1689003 (Why is no real title available?)
 
2002-01-09Paper
A lower bound on the encoding length in lossy transmission
Information Sciences
2000-01-05Paper
Multiple ramp schemes
IEEE Transactions on Information Theory
1999-11-21Paper


Research outcomes over time


This page was built for person: Barbara Masucci