Filter by clicking on tags

Access Control
Cryptographic Access Control
Cloud Computing
Cloud Native
Cryptanalysis
Decentralization of Trust
E-Voting
Hardware-based Security
Privacy Enhancing Cryptography
Risk Analysis
Secure Multi-Party Computation
Threat Modelling
Threshold Cryptography
Zero-Knowledge Proof

2025 (5)

  • Simone Brunello, Laura Cristiano, Riccardo Longo, Chiara Spadafora
    E-Voting with Confidence: Usability Challenges in Manual Integrity Checks
    In: 27th International Conference on Human-Computer Interaction (HCII) (HCII)
    E-Voting
  • Michele Battagliola, Giuseppe D'Alconzo, Andrea Gangemi, Chiara Spadafora
    Enhancing E-Voting with Multiparty Class Group Encryption
    In: Workshops of the 23rd International Conference on Applied Cryptography and Network Security (ACNS 2025) (PrivCrypt)
    E-Voting
  • Zahra Ebadi Ansaroudi, Giada Sciarretta, Andrea De Maria, Silvio Ranise
    Navigating secure storage requirements for EUDI Wallets: a review paper
    In: EURASIP Journal on Information Security (EURASIP J. on Info. Security), Volume 2025, Issue 1 (DOI)
    Threat Modelling
  • Simone Brunello, Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise
    Relying on Trust to Balance Protection and Performance in Cryptographic Access Control
    In: 2025 ACM Symposium on Access Control Models and Technologies (SACMAT) (SACMAT)
    Access Control Cryptographic Access Control Cloud Computing
  • Ion Andy Ditu, Stefano Berlato, Matteo Busi, Roberto Carbone, Silvio Ranise
    Work-in-Progress: Optimizing Performance of User Revocation in Cryptographic Access Control with Trusted Execution Environments
    In: 2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (OSVS)
    Access Control Cryptographic Access Control Cloud Computing Cloud Native Hardware-based Security

2024 (9)

  • Riccardo Longo, Chiara Spadafora
    Amun: Securing E-Voting Against Over-the-Shoulder Coercion
    In: 21st International Conference on Security and Cryptography (SECRYPT 2024) (DOI)
    Privacy Enhancing Cryptography Zero-Knowledge Proof
  • Riccardo Germenia, Salvatore Manfredi, Matteo Rizzi, Giada Sciarretta, Alessandro Tomasi, Silvio Ranise
    Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints
    In: 21st International Conference on Security and Cryptography (SECRYPT 2024) (DOI)
    Cloud Computing
  • Laura Cristiano, Riccardo Longo, Chiara Spadafora
    Click and Cast - Assessing the Usability of Vote App
    In: Ninth International Joint Conference on Electronic Voting (E-Vote-ID 2024) (DOI)
    E-Voting
  • Riccardo Longo, Majid Mollaeefar, Umberto Morelli, Chiara Spadafora, Alessandro Tomasi, Silvio Ranise
    Modeling and Assessing Coercion Threats in Electronic Voting
    In: 19th International Conference on Risks and Security of Internet and Systems (CRISIS 2024) (DOI, complementary material)
    E-Voting Decentralization of Trust Threat Modelling Risk Analysis
  • Stefano Berlato, Silvio Cretti, Domenico Siracusa, Silvio Ranise
    Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM
    In: 27th Conference on Innovation in Clouds, Internet and Networks (ICIN 2024) (DOI)
    Cryptographic Access Control Cloud Computing Privacy Enhancing Cryptography
  • Andrea Flamini, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi, Silvio Ranise
    On cryptographic mechanisms for the selective disclosure of verifiable credentials
    In: Journal of Information Security and Applications (JISA), Volume 83 (DOI)
    Privacy Enhancing Cryptography Zero-Knowledge Proof
  • Amir Sharif, Zahra Ebadi Ansaroudi, Giada Sciarretta, Majid Mollaeefar, Silvio Ranise
    Protecting Digital Identity Wallet: A Threat Model in the Age of eIDAS 2.0
    In: 19th International Conference on Risks and Security of Internet and Systems (CRISIS 2024) (DOI)
    Threat Modelling
  • Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa
    Searchable encryption with randomized ciphertext and randomized keyword search
    In: Journal of Mathematical Cryptology (JMC), Volume 18, Issue 1 (DOI)
    Cryptographic Access Control Cloud Computing Privacy Enhancing Cryptography
  • Stefano Berlato, Matteo Rizzi, Matteo Franzil, Silvio Cretti, Pietro De Matteis, Roberto Carbone
    Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications
    In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (OSVS) (DOI)
    Access Control Cryptographic Access Control Cloud Native Decentralization of Trust

2023 (4)

  • Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi
    A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials
    In: 20th International Conference on Security and Cryptography (SECRYPT 2023) (DOI)
    Zero-Knowledge Proof Privacy Enhancing Cryptography
  • Matteo Bitussi, Riccardo Longo, Francesco Antonio Marino, Umberto Morelli, Amir Sharif, Chiara Spadafora, Alessandro Tomasi
    Coercion-resistant i-voting with short PIN and OAuth 2.0
    In: Eighth International Joint Conference on Electronic Voting (E-Vote-ID 2023) (DOI)
    Threshold Cryptography Zero-Knowledge Proof Secure Multi-Party Computation Privacy Enhancing Cryptography Decentralization of Trust E-Voting
  • Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero
    Multi-stage Proof-of-Works: Properties and vulnerabilities
    In: Theoretical Computer Science (TCS), Volume 976 (DOI)
    Decentralization of Trust
  • Zahra Ebadi Ansaroudi, Rocco Zaccagnino, Paolo D'Arco
    On Pseudorandomness and Deep Learning: A Case Study
    In: Applied Sciences (Appl. Sci.), Volume 13, Issue 5 (DOI)
    Cryptanalysis

Past Publications

ALEPH was created in 2023; topic, project, and members' personal pages may include prior publications.