Provably-secure time-bound hierarchical key assignment schemes G Ateniese, A De Santis, AL Ferrara, B Masucci Journal of cryptology 25 (2), 243-270, 2012 | 196 | 2012 |
Ideal contrast visual cryptography schemes with reversing S Cimato, A De Santis, AL Ferrara, B Masucci Information Processing Letters 93 (4), 199-206, 2005 | 130 | 2005 |
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliovį, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 94 | 2006 |
Hierarchical and shared access control A Castiglione, A De Santis, B Masucci, F Palmieri, A Castiglione, J Li, ... IEEE Transactions on Information Forensics and Security 11 (4), 850-865, 2015 | 77 | 2015 |
Multiple ramp schemes A De Santis, B Masucci IEEE Transactions on Information Theory 45 (5), 1720-1728, 1999 | 66 | 1999 |
Efficient provably-secure hierarchical key assignment schemes AD Santis, AL Ferrara, B Masucci International Symposium on Mathematical Foundations of Computer Science, 371-382, 2007 | 62* | 2007 |
Cryptographic hierarchical access control for dynamic structures A Castiglione, A De Santis, B Masucci, F Palmieri, A Castiglione, X Huang IEEE Transactions on Information Forensics and Security 11 (10), 2349-2364, 2016 | 61 | 2016 |
Cryptographic key assignment schemes for any access control policy A De Santis, AL Ferrara, B Masucci Information Processing Letters 92 (4), 199-205, 2004 | 59 | 2004 |
New constructions for provably-secure time-bound hierarchical key assignment schemes A De Santis, AL Ferrara, B Masucci Theoretical Computer Science 407 (1-3), 213-230, 2008 | 50 | 2008 |
Constructions and bounds for unconditionally secure non-interactive commitment schemes C Blundo, B Masucci, DR Stinson, R Wei Designs, Codes and Cryptography 26 (1), 97-110, 2002 | 48 | 2002 |
Enforcing the security of a time-bound hierarchical key assignment scheme A De Santis, AL Ferrara, B Masucci Information Sciences 176 (12), 1684-1694, 2006 | 47 | 2006 |
Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes A Castiglione, A De Santis, B Masucci IEEE Transactions on Dependable and Secure Computing 13 (4), 451-460, 2015 | 43 | 2015 |
Metering schemes for general access structures B Masucci, DR Stinson European Symposium on Research in Computer Security, 72-87, 2000 | 36 | 2000 |
Unconditionally secure key assignment schemes A De Santis, AL Ferrara, B Masucci Discrete applied mathematics 154 (2), 234-252, 2006 | 35 | 2006 |
Variations on a theme by Akl and Taylor: Security and tradeoffs P D’Arco, A De Santis, AL Ferrara, B Masucci Theoretical Computer Science 411 (1), 213-227, 2010 | 34 | 2010 |
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme A Castiglione, A De Santis, B Masucci, F Palmieri, X Huang, A Castiglione Information Sciences 387, 56-74, 2017 | 32 | 2017 |
Efficient metering schemes with pricing B Masucci, DR Stinson IEEE Transactions on Information Theory 47 (7), 2835-2844, 2001 | 30 | 2001 |
Hierarchical and shared key assignment A Castiglione, A De Santis, B Masucci 2014 17th International Conference on Network-Based Information Systems, 263-270, 2014 | 28 | 2014 |
On-board format-independent security of functional magnetic resonance images A Castiglione, R Pizzolante, F Palmieri, B Masucci, B Carpentieri, ... ACM Transactions on Embedded Computing Systems (TECS) 16 (2), 1-15, 2017 | 26 | 2017 |
Dynamic multi-threshold metering schemes C Blundo, AD Bonis, B Masucci, DR Stinson International Workshop on Selected Areas in Cryptography, 130-144, 2000 | 25 | 2000 |