Anonymous Identification in Ad Hoc Groups Y Dodis, A Kiayias, A Nicolosi, V Shoup Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 359 | 2004 |
Verifying and enforcing network paths with ICING J Naous, M Walfish, A Nicolosi, D Mazieres, M Miller, A Seehra Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011 | 181 | 2011 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 122 | 2006 |
Proactive Two-Party Signatures for User Authentication. A Nicolosi, MN Krohn, Y Dodis, D Mazieres NDSS, 2003 | 94 | 2003 |
The nebula future internet architecture T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ... The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013 | 88 | 2013 |
Non-interactive zero-knowledge from homomorphic encryption I Damgård, N Fazio, A Nicolosi Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006 | 79 | 2006 |
Cryptographic accumulators: Definitions, constructions and applications N Fazio, A Nicolosi Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002 | 62 | 2002 |
P2PCast: A peer-to-peer multicast scheme for streaming data A Nicolosi, S Annapureddy Proceedings of First IRIS Student Workshop August, 2003 | 55 | 2003 |
Efficient Private Techniques for Verifying Social Proximity. MJ Freedman, A Nicolosi IPTPS 5, 1, 2007 | 43 | 2007 |
A brief overview of the NEBULA future internet architecture T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ... ACM SIGCOMM Computer Communication Review 44 (3), 81-86, 2014 | 37 | 2014 |
A Policy Framework for the Future Internet. A Seehra, J Naous, M Walfish, D Mazieres, A Nicolosi, S Shenker Hotnets, 2009 | 35 | 2009 |
Traitor tracing with optimal transmission rate N Fazio, A Nicolosi, DH Phan Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007 | 30 | 2007 |
Efficient bounded distance decoders for Barnes-Wall lattices D Micciancio, A Nicolosi 2008 IEEE International Symposium on Information Theory, 2484-2488, 2008 | 29 | 2008 |
Nebula-a future internet that supports trustworthy cloud computing T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ... White Paper, 1-31, 2010 | 28 | 2010 |
: An HB-like protocol secure against man-in-the-middle attacks C Bosley, K Haralambiev, A Nicolosi Cryptology ePrint Archive, 2011 | 26 | 2011 |
Broadcast steganography N Fazio, AR Nicolosi, IM Perera Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014 | 23 | 2014 |
Secure acknowledgment of multicast messages in open peer-to-peer networks A Nicolosi, D Mazieres Peer-to-Peer Systems III: Third International Workshop, IPTPS 2004, La Jolla …, 2005 | 21 | 2005 |
Learning potential in mathematics through imagination and manipulation of building blocks C Pirrone, A Nicolosi, A Passanisi, S Di Nuovo Mediterranean Journal of Social Sciences 6 (4), 152-159, 2015 | 20 | 2015 |
A poroplastic model for hygro-chemo-mechanical damage of concrete M Cuomo, A Nicolosi Computational Modelling of Concrete Structures, 533-542, 2020 | 16 | 2020 |
Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings D Catalano, N Fazio, R Gennaro, A Nicolosi Springer Science & Business Media, 2011 | 16* | 2011 |