Filter by clicking on tags

Access Control
Cryptographic Access Control
Cloud Computing
Cloud Native
Cryptanalysis
Decentralization of Trust
E-Voting
Privacy Enhancing Cryptography
Risk Analysis
Secure Multi-Party Computation
Threat Modelling
Threshold Cryptography
Zero-Knowledge Proof

2024 (6)

  • Riccardo Longo, Chiara Spadafora
    Amun: Securing E-Voting Against Over-the-Shoulder Coercion
    In: 21th International Conference on Security and Cryptography (SECRYPT 2024) (DOI)
    Privacy Enhancing Cryptography Zero-Knowledge Proof
  • Riccardo Longo, Majid Mollaeefar, Umberto Morelli, Chiara Spadafora, Alessandro Tomasi, Silvio Ranise
    Modeling and Assessing Coercion Threats in Electronic Voting
    In: 19th International Conference on Risks and Security of Internet and Systems (CRISIS 2024) (complementary material)
    E-Voting Decentralization of Trust Threat Modelling Risk Analysis
  • Stefano Berlato, Silvio Cretti, Domenico Siracusa, Silvio Ranise
    Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM
    In: 27th Conference on Innovation in Clouds, Internet and Networks (ICIN 2024) (DOI)
    Cryptographic Access Control Cloud Computing Privacy Enhancing Cryptography
  • Andrea Flamini, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi, Silvio Ranise
    On cryptographic mechanisms for the selective disclosure of verifiable credentials
    In: Journal of Information Security and Applications (JISA), Volume 83 (DOI)
    Privacy Enhancing Cryptography Zero-Knowledge Proof
  • Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa
    Searchable encryption with randomized ciphertext and randomized keyword search
    In: Journal of Mathematical Cryptology (JMC), Volume 18, Issue 1 (DOI)
    Cryptographic Access Control Cloud Computing Privacy Enhancing Cryptography
  • Stefano Berlato, Matteo Rizzi, Matteo Franzil, Silvio Cretti, Pietro De Matteis, Roberto Carbone
    Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications
    In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (OSVS) (DOI)
    Access Control Cryptographic Access Control Cloud Native Decentralization of Trust

2023 (3)

  • Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi
    A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials
    In: 20th International Conference on Security and Cryptography (SECRYPT 2023) (DOI)
    Zero-Knowledge Proof Privacy Enhancing Cryptography
  • Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero
    Multi-stage Proof-of-Works: Properties and vulnerabilities
    In: Theoretical Computer Science (TCS), Volume 976 (DOI)
    Decentralization of Trust
  • Zahra Ebadi Ansaroudi, Rocco Zaccagnino, Paolo D'Arco
    On Pseudorandomness and Deep Learning: A Case Study
    In: Applied Sciences (Appl. Sci.), Volume 13, Issue 5 (DOI)
    Cryptanalysis

Past Publications

ALEPH was created in 2023; topic, project, and members' personal pages may include prior publications.