Follow
Antonio Nicolosi
Antonio Nicolosi
Verified email at cs.stevens.edu
Title
Cited by
Cited by
Year
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
3562004
Verifying and enforcing network paths with ICING
J Naous, M Walfish, A Nicolosi, D Mazieres, M Miller, A Seehra
Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011
1822011
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
992006
Proactive Two-Party Signatures for User Authentication.
A Nicolosi, MN Krohn, Y Dodis, D Mazieres
NDSS, 2003
922003
The nebula future internet architecture
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013
892013
Non-interactive zero-knowledge from homomorphic encryption
I Damgård, N Fazio, A Nicolosi
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
782006
Cryptographic accumulators: Definitions, constructions and applications
N Fazio, A Nicolosi
Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002
582002
P2PCast: A peer-to-peer multicast scheme for streaming data
A Nicolosi, S Annapureddy
Proceedings of First IRIS Student Workshop August, 2003
552003
Efficient Private Techniques for Verifying Social Proximity.
MJ Freedman, A Nicolosi
IPTPS 5, 1, 2007
442007
A brief overview of the NEBULA future internet architecture
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
ACM SIGCOMM Computer Communication Review 44 (3), 81-86, 2014
382014
A Policy Framework for the Future Internet.
A Seehra, J Naous, M Walfish, D Mazieres, A Nicolosi, S Shenker
Hotnets, 2009
342009
Efficient bounded distance decoders for Barnes-Wall lattices
D Micciancio, A Nicolosi
2008 IEEE International Symposium on Information Theory, 2484-2488, 2008
312008
Traitor tracing with optimal transmission rate
N Fazio, A Nicolosi, DH Phan
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
302007
Nebula-a future internet that supports trustworthy cloud computing
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
White Paper, 1-31, 2010
282010
: An HB-like protocol secure against man-in-the-middle attacks
C Bosley, K Haralambiev, A Nicolosi
Cryptology ePrint Archive, 2011
252011
Broadcast steganography
N Fazio, AR Nicolosi, IM Perera
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
232014
Learning potential in mathematics through imagination and manipulation of building blocks
C Pirrone, A Nicolosi, A Passanisi, S Di Nuovo
Mediterranean Journal of Social Sciences 6 (4), 152, 2015
212015
Secure acknowledgment of multicast messages in open peer-to-peer networks
A Nicolosi, D Mazieres
Peer-to-Peer Systems III: Third International Workshop, IPTPS 2004, La Jolla …, 2005
212005
Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings
D Catalano, N Fazio, R Gennaro, A Nicolosi
Springer Science & Business Media, 2011
20*2011
A poroplastic model for hygro-chemo-mechanical damage of concrete
M Cuomo, A Nicolosi
Computational Modelling of Concrete Structures, 533-542, 2020
162020
The system can't perform the operation now. Try again later.
Articles 1–20