What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ernesto Damiani
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Protecting machine learning from poisoning attacks: A risk-based approach.
Nicola Bena
Marco Anisetti
Ernesto Damiani
Chan Yeob Yeun
Claudio A. Ardagna
2025
conf/csr2
Using Legends Into AI-Based Business Decision Making: Embedding Ethics, Cybersecurity and Resilience.
Gohar Sargsyan
Ernesto Damiani
2023
conf/csr2
Blockchain-Based Trustworthy O2O Interaction in the Next 6G Ecosystem.
Emanuele Bellini
Ernesto Damiani
Stefano Marrone
2021
conf/csr2
The THREAT-ARREST Cyber Range Platform.
George Hatzivasilis
Sotiris Ioannidis
Michail Smyrlis
George Spanoudakis
Fulvio Frati
Chiara Braghin
Ernesto Damiani
Hristo Koshutanski
George Tsakirakis
Torsten Hildebrandt
Ludger Goeke
Sebastian Pape
Oleg Blinder
Michael Vinov
George Leftheriotis
Martin Kunc
Fotis Oikonomou
Giovanni Magilo
Vito Petrarolo
Antonio Chieti
Robert Bordianu
2021
conf/csr2
STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets.
Lara Mauri
Ernesto Damiani
2021
conf/csr2
Resilience learning through self adaptation in digital twins of human-cyber-physical systems.
Emanuele Bellini
Franco Bagnoli
Mauro Caporuscio
Ernesto Damiani
Francesco Flammini
Igor Linkov
Pietro Liò
Stefano Marrone
2020
journals/istr
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem.
Stelvio Cimato
Gabriele Gianini
Maryam Sepehri
Rasool Asal
Ernesto Damiani
2019
conf/esorics
The THREAT-ARREST Cyber-Security Training Platform.
Othonas Soultatos
Konstantinos Fysarakis
George Spanoudakis
Hristo Koshutanski
Ernesto Damiani
Kristian Beckers
Dirk Wortmann
George Bravos
Menelaos Ioannidis
2019
conf/esorics
A Model Driven Approach for Cyber Security Scenarios Deployment.
Chiara Braghin
Stelvio Cimato
Ernesto Damiani
Fulvio Frati
Lara Mauri
Elvinia Riccobene
2018
journals/compsec
Modeling time, probability, and configuration constraints for continuous cloud service certification.
Marco Anisetti
Claudio A. Ardagna
Ernesto Damiani
Nabil El Ioini
Filippo Gaudenzi
2018
journals/tifs
Drone Pilot Identification by Classifying Radio-Control Signals.
Abdulhadi Shoufan
Haitham M. Al-Angari
Muhammad Faraz Afzal Sheikh
Ernesto Damiani
2017
journals/istr
On inter-Rater reliability of information security experts.
Abdulhadi Shoufan
Ernesto Damiani
2017
conf/ccs
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud.
Maryam Sepehri
Stelvio Cimato
Ernesto Damiani
2017
conf/dsn
Analysing Selfishness Flooding with SEINE.
Guido Lena Cota
Sonia Ben Mokhtar
Gabriele Gianini
Ernesto Damiani
Julia Lawall
Gilles Muller
Lionel Brunie
2013
journals/istr
Editorial.
Frédéric Cuppens
Nora Cuppens-Boulahia
Ernesto Damiani
Radu State
Joaquín García-Alfaro
Nadia Tawbi
2012
conf/esorics
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Mohammad Ali Hadavi
Ernesto Damiani
Rasool Jalili
Stelvio Cimato
Zeinab Ganjei
2007
conf/sec
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy.
Claudio Agostino Ardagna
Marco Cremonini
Ernesto Damiani
Sabrina De Capitani di Vimercati
Pierangela Samarati
2007
conf/sec
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
Ernesto Damiani
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2006
conf/ccs
Supporting location-based conditions in access control policies.
Claudio A. Ardagna
Marco Cremonini
Ernesto Damiani
Sabrina De Capitani di Vimercati
Pierangela Samarati
2006
conf/sec
CAS++: An Open Source Single Sign-On Solution for Secure e-Services.
Claudio Agostino Ardagna
Ernesto Damiani
Sabrina De Capitani di Vimercati
Fulvio Frati
Pierangela Samarati
2006
conf/iciss
Extending Context Descriptions in Semantics-Aware Access Control.
Ernesto Damiani
Sabrina De Capitani di Vimercati
Cristiano Fugazza
Pierangela Samarati
2005
conf/iciss
Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.
Ernesto Damiani
Marco Anisetti
Valerio Bellandi
2004
journals/istr
XML-based access control languages.
Claudio A. Ardagna
Ernesto Damiani
Sabrina De Capitani di Vimercati
Pierangela Samarati
2003
conf/ccs
Balancing confidentiality and efficiency in untrusted relational DBMSs.
Ernesto Damiani
Sabrina De Capitani di Vimercati
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2003
conf/sec
Securing XML-based Multimedia Content.
Ernesto Damiani
Sabrina De Capitani di Vimercati
2002
conf/ccs
A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Ernesto Damiani
Sabrina De Capitani di Vimercati
Stefano Paraboschi
Pierangela Samarati
Fabio Violante
2001
conf/sec
An Access Control Model for Data Archives.
Piero A. Bonatti
Ernesto Damiani
Sabrina De Capitani di Vimercati
Pierangela Samarati
2001
conf/acsac
A Component-Based Architecture for Secure Data Publication.
Piero A. Bonatti
Ernesto Damiani
Sabrina De Capitani di Vimercati
Pierangela Samarati
2000
conf/sec
Regulating Access To Semistructured Information on the Web.
Ernesto Damiani
Sabrina De Capitani di Vimercati
Stefano Paraboschi
Pierangela Samarati
Coauthors
Abdulhadi Shoufan
(2)
Antonio Chieti
(1)
Chan Yeob Yeun
(1)
Chiara Braghin
(2)
Claudio A. Ardagna
(4)
Claudio Agostino Ardagna
(2)
Cristiano Fugazza
(1)
Dirk Wortmann
(1)
Elvinia Riccobene
(1)
Emanuele Bellini
(2)
Ernesto Damiani
(29)
Fabio Violante
(1)
Filippo Gaudenzi
(1)
Fotis Oikonomou
(1)
Francesco Flammini
(1)
Franco Bagnoli
(1)
Frédéric Cuppens
(1)
Fulvio Frati
(3)
Gabriele Gianini
(2)
George Bravos
(1)
George Hatzivasilis
(1)
George Leftheriotis
(1)
George Spanoudakis
(2)
George Tsakirakis
(1)
Gilles Muller
(1)
Giovanni Magilo
(1)
Gohar Sargsyan
(1)
Guido Lena Cota
(1)
Haitham M. Al-Angari
(1)
Hristo Koshutanski
(2)
Igor Linkov
(1)
Joaquín García-Alfaro
(1)
Julia Lawall
(1)
Konstantinos Fysarakis
(1)
Kristian Beckers
(1)
Lara Mauri
(2)
Lionel Brunie
(1)
Ludger Goeke
(1)
Marco Anisetti
(3)
Marco Cremonini
(2)
Martin Kunc
(1)
Maryam Sepehri
(2)
Mauro Caporuscio
(1)
Menelaos Ioannidis
(1)
Michael Vinov
(1)
Michail Smyrlis
(1)
Mohammad Ali Hadavi
(1)
Muhammad Faraz Afzal Sheikh
(1)
Nabil El Ioini
(1)
Nadia Tawbi
(1)
Nicola Bena
(1)
Nora Cuppens-Boulahia
(1)
Oleg Blinder
(1)
Othonas Soultatos
(1)
Pierangela Samarati
(11)
Piero A. Bonatti
(2)
Pietro Liò
(1)
Radu State
(1)
Rasool Asal
(1)
Rasool Jalili
(1)
Robert Bordianu
(1)
Sabrina De Capitani di Vimercati
(12)
Sara Foresti
(1)
Sebastian Pape
(1)
Sonia Ben Mokhtar
(1)
Sotiris Ioannidis
(1)
Stefano Marrone
(2)
Stefano Paraboschi
(4)
Stelvio Cimato
(4)
Sushil Jajodia
(2)
Torsten Hildebrandt
(1)
Valerio Bellandi
(1)
Vito Petrarolo
(1)
Zeinab Ganjei
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to