Vincenzo Iovino
Vincenzo Iovino
Verifierad e-postadress på unisa.it
TitelCiteras avÅr
jPBC: Java pairing based cryptography
A De Caro, V Iovino
2011 IEEE symposium on computers and communications (ISCC), 850-855, 2011
3302011
Hidden-vector encryption with groups of prime order
V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 75-88, 2008
1012008
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Annual Cryptology Conference, 519-535, 2013
822013
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
A De Caro, V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 347-366, 2010
692010
Selene: Voting with transparent verifiability and coercion-mitigation
PYA Ryan, PB Rønne, V Iovino
International Conference on Financial Cryptography and Data Security, 176-192, 2016
472016
Private-key hidden vector encryption with key confidentiality
C Blundo, V Iovino, G Persiano
International Conference on Cryptology and Network Security, 259-277, 2009
372009
Java pairing-based cryptography library
AD Caro, V Iovino
262013
Fully secure hidden vector encryption
A De Caro, V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 102-121, 2012
23*2012
Predicate encryption with partial public keys
C Blundo, V Iovino, G Persiano
International Conference on Cryptology and Network Security, 298-313, 2010
212010
Pairing-Based Cryptography–Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings
S Galbraith, K Paterson
Springer, 2008
152008
On the Power of Rewinding Simulators in Functional Encryption
A De Caro, V Iovino
Design, Codes and Cryptography, 2016
142016
Simulation-Based Secure Functional Encryption in the Random Oracle Model
V Iovino, K Zebrowski
LATINCRYPT 2015 9320 (LNCS), 21-39, 2015
102015
Secure and policy-private resource sharing in an online social network
S Braghin, V Iovino, G Persiano, A Trombetta
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
102011
Power of public-key function-private functional encryption
V Iovino, Q Tang, K Żebrowski
IET Information Security 12 (4), 248-256, 2017
9*2017
Controlled homomorphic encryption: definition and construction
Y Desmedt, V Iovino, G Persiano, I Visconti
International Conference on Financial Cryptography and Data Security, 107-129, 2017
62017
On the relation between SIM and IND-RoR security models for PAKEs
JM Lopez Becerra, V Iovino, D Ostrev, M Skrobot
Proceedings of the International Conference on Security and Cryptography, 12, 2017
62017
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae.
A De Caro, V Iovino, G Persiano
IACR Cryptology ePrint Archive 2010, 492, 2010
6*2010
Regression of left ventricular hypertrophy and systolic function in hypertensive patients during long-term treatment with ketanserin
V Coto, M Cocozza, U Oliviero, A Lucariello, T Picano, B Castaldo, ...
Cardiovascular drugs and therapy 4 (1), 77-80, 1990
61990
Deniable Functional Encryption
V Iovino, A O'Neill
Public-key Cryptography-PKC 2016, 19th IACR International Conference on …, 2016
5*2016
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
R Giustolisi, V Iovino, P Rønne
VOTING 2016 9604 (Financial Cryptography and Data Security), 193-208, 2015
52015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20