Search

Your search keyword '"Di Pietro, Roberto"' showing total 37 results

Search Constraints

Start Over You searched for: Author "Di Pietro, Roberto" Remove constraint Author: "Di Pietro, Roberto" Publication Year Range This year Remove constraint Publication Year Range: This year
37 results on '"Di Pietro, Roberto"'

Search Results

1. Hallucination Detection: A Probabilistic Framework Using Embeddings Distance Analysis

2. Cellular Privacy

4. Mix Networks

5. Anonymity

6. Recipient Anonymity

7. Unlinkability

8. Pseudonyms

10. Open Web Proxies

12. Contributors to Volume II

13. Scalable and Lightweight State-Channel Audits

14. PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin

15. Mithril: Stake-Based Threshold Multisignatures

16. Efficient Secure Multi-party Computation for Multi-dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification

17. LARMix: Latency-Aware Routing in Mix Networks with Free Routes Topology

19. Acceleration of Core Post-quantum Cryptography Primitive on Open-Source Silicon Platform Through Hardware/Software Co-design

20. MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing Without Pre-processing

21. On the Anonymity of Linkable Ring Signatures

22. Compact Adaptor Signature from Isogenies with Enhanced Security

23. Compact Post-quantum Bounded-Collusion Identity-Based Encryption

24. Cryptographic Cryptid Protocols : How to Play Cryptid with Cheaters

25. 1-Out-of-N Oblivious Transfer from MLWE

26. Truncated Differential Cryptanalysis of the SPRING Block Cipher

27. Collision Attacks on Hashing Modes of Areion

28. A Novel Method for Finding Differential-Linear Distinguishers: Application to

29. Towards Post-quantum Secure PAKE - A Tight Security Proof for OCAKE in the BPR Model

30. Multi-query Verifiable PIR and Its Application

31. How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption

32. Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript

33. Fault Tolerant and Malicious Secure Federated Learning

34. On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks

35. Updatable Encryption Secure Against Randomness Compromise

36. SplitOut: Out-of-the-Box Training-Hijacking Detection in Split Learning via Outlier Detection

37. MarcoPolo: A Zero-Permission Attack for Location Type Inference from the Magnetic Field Using Mobile Devices

Catalog

Books, media, physical & digital resources