Vincenzo Iovino
Vincenzo Iovino
E-mail confirmado em unisa.it
Título
Citado por
Citado por
Ano
jPBC: Java pairing based cryptography
A De Caro, V Iovino
2011 IEEE symposium on computers and communications (ISCC), 850-855, 2011
4652011
Hidden-vector encryption with groups of prime order
V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 75-88, 2008
1142008
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Annual Cryptology Conference, 519-535, 2013
952013
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
A De Caro, V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 347-366, 2010
782010
Selene: Voting with transparent verifiability and coercion-mitigation
PYA Ryan, PB Rønne, V Iovino
International Conference on Financial Cryptography and Data Security, 176-192, 2016
732016
Private-key hidden vector encryption with key confidentiality
C Blundo, V Iovino, G Persiano
International Conference on Cryptology and Network Security, 259-277, 2009
452009
Does impaired glucose tolerance predict hypertension?
O Vaccaro, G Imperatore, V Iovino, C Iovine, AA Rivellese, G Riccardi
Diabetologia 39 (1), 70-76, 1996
451996
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System.
G Avitabile, V Botta, V Iovino, I Visconti
IACR Cryptol. ePrint Arch. 2020, 493, 2020
332020
Fully secure hidden vector encryption
A De Caro, V Iovino, G Persiano
International Conference on Pairing-Based Cryptography, 102-121, 2012
27*2012
Java pairing-based cryptography library
AD Caro, V Iovino
262013
Predicate encryption with partial public keys
C Blundo, V Iovino, G Persiano
International Conference on Cryptology and Network Security, 298-313, 2010
252010
On the Power of Rewinding Simulators in Functional Encryption
A De Caro, V Iovino
Design, Codes and Cryptography, 2016
162016
Using Selene to Verify your Vote in JCJ
V Iovino, A Rial, PB Rønne, PYA Ryan
132017
Simulation-Based Secure Functional Encryption in the Random Oracle Model
V Iovino, K Zebrowski
LATINCRYPT 2015 9320 (LNCS), 21-39, 2015
122015
Secure and policy-private resource sharing in an online social network
S Braghin, V Iovino, G Persiano, A Trombetta
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
112011
Power of public‐key function‐private functional encryption
V Iovino, Q Tang, K Żebrowski
IET Information Security 12 (4), 248-256, 2018
9*2018
Deniable Functional Encryption
V Iovino, A O'Neill
Public-key Cryptography-PKC 2016, 19th IACR International Conference on …, 2016
9*2016
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
R Giustolisi, V Iovino, P Rønne
VOTING 2016 9604 (Financial Cryptography and Data Security), 193-208, 2015
82015
Controlled homomorphic encryption: definition and construction
Y Desmedt, V Iovino, G Persiano, I Visconti
International Conference on Financial Cryptography and Data Security, 107-129, 2017
72017
“The Simplest Protocol for Oblivious Transfer” Revisited
ZA Genç, V Iovino, A Rial
72017
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20