generated by bibbase.org
  2024 (7)
De-anonymisation of real-world location traces: two attacks based on the hidden Markov model. Eshun, S. N.; and Palmieri, P. J. Locat. Based Serv., 18(3): 272–301. 2024.
De-anonymisation of real-world location traces: two attacks based on the hidden Markov model [link]Paper   doi   link   bibtex  
A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi Localization. Eshun, S. N.; and Palmieri, P. IEEE Trans. Inf. Forensics Secur., 19: 4086–4099. 2024.
A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi Localization [link]Paper   doi   link   bibtex  
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems. Idrissi, H.; and Palmieri, P. J. Supercomput., 80(5): 6622–6660. 2024.
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems [link]Paper   doi   link   bibtex  
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms. Moghaddam, A. E.; Ganesh, B.; and Palmieri, P. In Andreoni, M., editor(s), Applied Cryptography and Network Security Workshops - ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II, volume 14587, of Lecture Notes in Computer Science, pages 84–100, 2024. Springer
Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention Mechanisms [link]Paper   doi   link   bibtex  
Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs. Vangujar, A. K.; Umrani, A.; and Palmieri, P. In Andreoni, M., editor(s), Applied Cryptography and Network Security Workshops - ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II, volume 14587, of Lecture Notes in Computer Science, pages 162–179, 2024. Springer
Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs [link]Paper   doi   link   bibtex  
SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space. Regazzoni, F.; Ács, G.; Aszalos, A. Z.; Avgerinos, C.; Bakalos, N.; Berral, J. L.; Bos, J. W.; Brohet, M.; Sanz, A. G. C.; Davies, G. T.; Florescu, S.; Flory, P.; Gutierrez-Torre, A.; Haleplidis, E.; Héliou, A.; Ioannidis, S.; El-Kady, A. I.; Kapusta, K.; Karagianni, K.; Kruizinga, P.; Maat, K.; Mann, Z. Á.; Mastoraki, K.; Moon, S.; Nisevic, M.; Pejó, B.; Papagiannopoulos, K.; Paliouras, V.; Palmieri, P.; Palumbo, F.; Baun, J. C. P.; Pollner, P.; Porta-Pardo, E.; Pulina, L.; Siddiqi, M. A.; Spajic, D.; Strydis, C.; Tasopoulos, G.; Thouvenot, V.; Tselios, C.; and Fournaris, A. P. In Design, Automation & Test in Europe Conference & Exhibition, DATE 2024, Valencia, Spain, March 25-27, 2024, pages 1–4, 2024. IEEE
SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space [link]Paper   doi   link   bibtex  
Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication. Umrani, A.; Vangujar, A. K.; and Palmieri, P. In Lenzini, G.; Mori, P.; and Furnell, S., editor(s), Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024, pages 733–744, 2024. SCITEPRESS
Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication [link]Paper   doi   link   bibtex  
  2023 (7)
Treating a different kind of patient: curing security weaknesses in digital health systems of the future. Regazzoni, F.; Palmieri, P.; and Fournaris, A. P. In 9th International Workshop on Advances in Sensors and Interfaces, IWASI 2023, Monopoli, Bari, Italy, June 8-9, 2023, pages 99–102, 2023. IEEE
Treating a different kind of patient: curing security weaknesses in digital health systems of the future [link]Paper   doi   link   bibtex  
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon. Ebrahimi, A.; Gérault, D.; and Palmieri, P. In Carlet, C.; Mandal, K.; and Rijmen, V., editor(s), Selected Areas in Cryptography - SAC 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers, volume 14201, of Lecture Notes in Computer Science, pages 429–450, 2023. Springer
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon [link]Paper   doi   link   bibtex  
A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption. Vangujar, A. K.; Ganesh, B.; and Palmieri, P. IACR Cryptol. ePrint Arch.,336. 2023.
A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption [link]Paper   link   bibtex  
Homomorphic Trapdoors for Identity-based and Group Signatures. Ganesh, B.; Vangujar, A. K.; Umrani, A.; and Palmieri, P. IACR Cryptol. ePrint Arch.,482. 2023.
Homomorphic Trapdoors for Identity-based and Group Signatures [link]Paper   link   bibtex  
A Multireceiver Certificateless Signcryption (MCLS) Scheme. Umrani, A.; and Palmieri, P. IACR Cryptol. ePrint Arch.,558. 2023.
A Multireceiver Certificateless Signcryption (MCLS) Scheme [link]Paper   link   bibtex  
An Anonymous Multi-receiver Certificateless Hybrid Signcryption (AMCLHS) using mKEM-DEM for Broadcast Communication. Umrani, A.; Vangujar, A. K.; and Palmieri, P. IACR Cryptol. ePrint Arch.,780. 2023.
An Anonymous Multi-receiver Certificateless Hybrid Signcryption (AMCLHS) using mKEM-DEM for Broadcast Communication [link]Paper   link   bibtex  
ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs. Vangujar, A. K.; Umrani, A.; and Palmieri, P. IACR Cryptol. ePrint Arch.,1835. 2023.
ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs [link]Paper   link   bibtex  
  2022 (4)
Bloom filter variants for multiple sets: a comparative assessment. Calderoni, L.; Maio, D.; and Palmieri, P. J. Univers. Comput. Sci., 28(2): 120–140. 2022.
Bloom filter variants for multiple sets: a comparative assessment [link]Paper   doi   link   bibtex  
Two de-anonymization attacks on real-world location data based on a hidden Markov model. Eshun, S. N.; and Palmieri, P. In IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022, pages 1–9, 2022. IEEE
Two de-anonymization attacks on real-world location data based on a hidden Markov model [link]Paper   doi   link   bibtex  
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher. Ebrahimi, A.; Regazzoni, F.; and Palmieri, P. In Jourdan, G.; Mounier, L.; Adams, C. M.; Sèdes, F.; and García-Alfaro, J., editor(s), Foundations and Practice of Security - 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers, volume 13877, of Lecture Notes in Computer Science, pages 123–141, 2022. Springer
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher [link]Paper   doi   link   bibtex  
Secure Search on Multi-key Homomorphically Encrypted Data with Finite Fields. Ganesh, B.; and Palmieri, P. IACR Cryptol. ePrint Arch.,738. 2022.
Secure Search on Multi-key Homomorphically Encrypted Data with Finite Fields [link]Paper   link   bibtex  
  2021 (3)
Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning. Regazzoni, F.; Palmieri, P.; Smailbegovic, F.; Cammarota, R.; and Polian, I. CAAI Trans. Intell. Technol., 6(2): 180–191. 2021.
Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning [link]Paper   doi   link   bibtex  
Introduction to the special issue on privacy and security for location-based services and devices. Calderoni, L.; Palmieri, P.; and Patsakis, C. J. Inf. Secur. Appl., 59: 102800. 2021.
Introduction to the special issue on privacy and security for location-based services and devices [link]Paper   doi   link   bibtex  
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher. Ebrahimi, A.; Regazzoni, F.; and Palmieri, P. IACR Cryptol. ePrint Arch.,1479. 2021.
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher [link]Paper   link   bibtex  
  2020 (2)
A secure, distributed and scalable infrastructure for remote generation and use of cryptographic keys. Bareato, C.; Palmieri, P.; Regazzoni, F.; and Venier, O. In 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, BRAINS 2020, Paris, France, September 28-30, 2020, pages 102–106, 2020. IEEE
A secure, distributed and scalable infrastructure for remote generation and use of cryptographic keys [link]Paper   doi   link   bibtex  
A Survey of Advanced Encryption for Database Security: Primitives, Schemes, and Attacks. Ganesh, B.; and Palmieri, P. In Nicolescu, G.; Tria, A.; Fernandez, J. M.; Marion, J.; and García-Alfaro, J., editor(s), Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers, volume 12637, of Lecture Notes in Computer Science, pages 100–120, 2020. Springer
A Survey of Advanced Encryption for Database Security: Primitives, Schemes, and Attacks [link]Paper   doi   link   bibtex  
  2019 (2)
A privacy-preserving protocol for indoor wi-fi localization. Eshun, S. N.; and Palmieri, P. In Palumbo, F.; Becchi, M.; Schulz, M.; and Sato, K., editor(s), Proceedings of the 16th ACM International Conference on Computing Frontiers, CF 2019, Alghero, Italy, April 30 - May 2, 2019, pages 380–385, 2019. ACM
A privacy-preserving protocol for indoor wi-fi localization [link]Paper   doi   link   bibtex  
Bloom filter variants for multiple sets: a comparative assessment. Calderoni, L.; Maio, D.; and Palmieri, P. CoRR, abs/1908.10644. 2019.
Bloom filter variants for multiple sets: a comparative assessment [link]Paper   link   bibtex  
  2018 (3)
Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols. Calderoni, L.; Palmieri, P.; and Maio, D. IEEE Trans. Inf. Forensics Secur., 13(7): 1710–1721. 2018.
Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols [link]Paper   doi   link   bibtex  
Hash-based signatures for the internet of things: position paper. Palmieri, P. In Kaeli, D. R.; and Pericàs, M., editor(s), Proceedings of the 15th ACM International Conference on Computing Frontiers, CF 2018, Ischia, Italy, May 08-10, 2018, pages 332–335, 2018. ACM
Hash-based signatures for the internet of things: position paper [link]Paper   doi   link   bibtex  
Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid. Magnani, A.; Calderoni, L.; and Palmieri, P. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, CRYBLOCK@MobiSys 2018, Munich, Germany, June 15, 2018, pages 99–104, 2018. ACM
Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid [link]Paper   doi   link   bibtex  
  2017 (2)
An Anonymous Inter-Network RoutingProtocol for the Internet of Things. Palmieri, P.; Calderoni, L.; and Maio, D. J. Cyber Secur. Mobil., 6(2): 127–146. 2017.
An Anonymous Inter-Network RoutingProtocol for the Internet of Things [link]Paper   doi   link   bibtex  
Private inter-network routing for Wireless Sensor Networks and the Internet of Things. Palmieri, P.; Calderoni, L.; and Maio, D. In Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy, May 15-17, 2017, pages 396–401, 2017. ACM
Private inter-network routing for Wireless Sensor Networks and the Internet of Things [link]Paper   doi   link   bibtex  
  2016 (2)
Security analysis and exploitation of arduino devices in the internet of things. Alberca, C.; Pastrana, S.; Suarez-Tangil, G.; and Palmieri, P. In Palermo, G.; and Feo, J., editor(s), Proceedings of the ACM International Conference on Computing Frontiers, CF'16, Como, Italy, May 16-19, 2016, pages 437–442, 2016. ACM
Security analysis and exploitation of arduino devices in the internet of things [link]Paper   doi   link   bibtex  
Anonymity networks and access to information during conflicts: Towards a distributed network organisation. Palmieri, P. In Pissanidis, N.; Roigas, H.; and Veenendaal, M., editor(s), 8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016, pages 263–275, 2016. IEEE
Anonymity networks and access to information during conflicts: Towards a distributed network organisation [link]Paper   doi   link   bibtex  
  2015 (3)
Location privacy without mutual trust: The spatial Bloom filter. Calderoni, L.; Palmieri, P.; and Maio, D. Comput. Commun., 68: 4–16. 2015.
Location privacy without mutual trust: The spatial Bloom filter [link]Paper   doi   link   bibtex  
Paying the Guard: An Entry-Guard-Based Payment System for Tor. Palmieri, P.; and Pouwelse, J. A. In Böhme, R.; and Okamoto, T., editor(s), Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers, volume 8975, of Lecture Notes in Computer Science, pages 437–444, 2015. Springer
Paying the Guard: An Entry-Guard-Based Payment System for Tor [link]Paper   doi   link   bibtex  
Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks. Palmieri, P. In Qing, S.; Okamoto, E.; Kim, K.; and Liu, D., editor(s), Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers, volume 9543, of Lecture Notes in Computer Science, pages 436–444, 2015. Springer
Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks [link]Paper   doi   link   bibtex  
  2014 (4)
Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?. Avoine, G.; Calderoni, L.; Delvaux, J.; Maio, D.; and Palmieri, P. Int. J. Inf. Manag., 34(5): 682–688. 2014.
Passengers information in public transport and privacy: Can anonymous tickets prevent tracking? [link]Paper   doi   link   bibtex  
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications. Palmieri, P.; Calderoni, L.; and Maio, D. In Lin, D.; Yung, M.; and Zhou, J., editor(s), Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers, volume 8957, of Lecture Notes in Computer Science, pages 16–36, 2014. Springer
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications [link]Paper   doi   link   bibtex  
Key Management for Onion Routing in a True Peer to Peer Setting. Palmieri, P.; and Pouwelse, J. A. In Yoshida, M.; and Mouri, K., editor(s), Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings, volume 8639, of Lecture Notes in Computer Science, pages 62–71, 2014. Springer
Key Management for Onion Routing in a True Peer to Peer Setting [link]Paper   doi   link   bibtex  
Spatial Bloom Filters: Enabling Privacy in Location-aware Applications. Palmieri, P.; Calderoni, L.; and Maio, D. IACR Cryptol. ePrint Arch.,531. 2014.
Spatial Bloom Filters: Enabling Privacy in Location-aware Applications [link]Paper   link   bibtex  
  2013 (3)
Unconditional secure cooperation on real-world networks : the case of oblivious transfer. Palmieri, P. Ph.D. Thesis, Catholic University of Louvain, Louvain-la-Neuve, Belgium, 2013.
Unconditional secure cooperation on real-world networks : the case of oblivious transfer [link]Paper   link   bibtex  
Unconditionally Secure Oblivious Transfer from Real Network Behavior. Palmieri, P.; and Pereira, O. In Sakiyama, K.; and Terada, M., editor(s), Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings, volume 8231, of Lecture Notes in Computer Science, pages 168–182, 2013. Springer
Unconditionally Secure Oblivious Transfer from Real Network Behavior [link]Paper   doi   link   bibtex  
Building a privacy-preserving semantic overlay for Peer-to-Peer networks. Zeilemaker, N.; Erkin, Z.; Palmieri, P.; and Pouwelse, J. A. In 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, Guangzhou, China, November 18-21, 2013, pages 79–84, 2013. IEEE
Building a privacy-preserving semantic overlay for Peer-to-Peer networks [link]Paper   doi   link   bibtex  
  2012 (1)
Location-aware Mobile Services for a Smart City: Design, Implementation and Deployment. Calderoni, L.; Maio, D.; and Palmieri, P. J. Theor. Appl. Electron. Commer. Res., 7(3): 74–87. 2012.
Location-aware Mobile Services for a Smart City: Design, Implementation and Deployment [link]Paper   doi   link   bibtex  
  2011 (2)
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering. Palmieri, P.; and Pereira, O. In Kim, H., editor(s), Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers, volume 7259, of Lecture Notes in Computer Science, pages 332–345, 2011. Springer
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering [link]Paper   doi   link   bibtex  
Secure Two-Party Computation over a Z-Channel. Palmieri, P.; and Pereira, O. In Boyen, X.; and Chen, X., editor(s), Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, volume 6980, of Lecture Notes in Computer Science, pages 3–15, 2011. Springer
Secure Two-Party Computation over a Z-Channel [link]Paper   doi   link   bibtex  
  2010 (1)
Building Oblivious Transfer on Channel Delays. Palmieri, P.; and Pereira, O. In Lai, X.; Yung, M.; and Lin, D., editor(s), Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, volume 6584, of Lecture Notes in Computer Science, pages 125–138, 2010. Springer
Building Oblivious Transfer on Channel Delays [link]Paper   doi   link   bibtex