

Papers in
Journals

A.
Castiglione, A. De Santis, B. Masucci, F. Palmieri, X. Huang, and A. Castiglione,
Dynamic Updates in Storage Clouds with the AklTaylor Scheme,
Information Sciences,
to appear, 2016.
(DOI: 10.1016/j.ins.2016.08.093)


A.
Castiglione, R. Pizzolante, F. Palmieri, B. Masucci, B. Carpentieri, A. De Santis,
and A. Castiglione,
Onboard FormatIndependent Security of Functional Magnetic
Resonance Images,
ACM Transactions on Embedded Computing Systems, to appear,
2016.


A.
Castiglione, A. De Santis, B. Masucci, F. Palmieri, A. Castiglione, and X. Huang,
Cryptographic Hierarchical Access Control for Dynamic
Structures,
IEEE Transactions on Information Forensic and Security,
Vol. 11, No. 10, pp. 23492364, 2016.


A.
Castiglione, A. De Santis, and B. Masucci,
Key Indistinguishability vs. Strong Key Indistinguishability for
Hierarchical Key Assignment Schemes,
IEEE Transactions on Dependable and Secure Computing, Vol.
13, No. 4, pp. 451460, 2016.
Preliminary version in IACR Cryptology ePrint Archive, Report 752, 2014.


A. Castiglione, A. De Santis, B.Masucci, F. Palmieri, A. Castiglione, J.
Li, and X. Huang,
Hierarchical and Shared Access Control,
IEEE Transactions on Information Forensic and Security,
Vol. 11, No. 4, pp. 850865, 2016.


M.
Cafaro, R. Civino, and B. Masucci,
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes
in the Unconditional Setting,
IEEE Transactions on Dependable and Secure Computing, Vol.
12, No. 4, pp. 485490, 2015.


G.
Ateniese, A. De
Santis, A. L. Ferrara, and B. Masucci,
A Note on TimeBound Hierarchical Key Assignment Schemes,
Information Processing Letters, Vol. 113, No. 56, pp.
151155, 2013.


G.
Ateniese, A. De
Santis, A. L. Ferrara, and B. Masucci,
ProvablySecure TimeBound Hierarchical Key Assignment Schemes,
Journal of Cryptology, Vol. 25, No. 2, pp. 243270,
2012.


A. De Santis, A. L. Ferrara, and B. Masucci,
Efficient ProvablySecure Hierarchical Key Assignment Schemes
Theoretical Computer
Science, Vol. 412(41), pp. 56845699, 2011.


P. D'Arco, A. De Santis, A. L.
Ferrara, and B. Masucci,
Variations on a Theme by Akl and Taylor: Security and Tradeoffs,
Theoretical
Computer Science,
Vol. 411, pp. 213227, 2010.


A. De
Santis, A. L. Ferrara, and B. Masucci,
New Constructions for
ProvablySecure TimeBound Hierarchical Key
Assignment Schemes,
Theoretical Computer
Science, Vol. 407, No. 13, pp. 213230, November 2008.


A. De
Santis, A. L. Ferrara, and B. Masucci,
An Attack on a Payment Scheme,
Information Sciences,
Vol. 178, No. 5, pp. 14181421, March 2008.


A. De
Santis and B. Masucci,
New Results on NonPerfect Sharing of Multiple Secrets,
The Journal of Systems and Software, Vol. 80, No. 2, pp.
216223, February 2007.


A. De
Santis, A. L. Ferrara, and B. Masucci,
Enforcing the Security of a TimeBound Hierarchical Key Assignment
Scheme,
Information Sciences,Vol. 176, No. 12, pp. 16841694, June
2006.


B. Masucci,
Sharing Multiple Secrets: Models, Schemes, and Analysis, Designs, Codes, and Cryptography,
Vol. 39, No. 1, pp. 89111, April 2006.


A.
De Santis, A. L. Ferrara, and B. Masucci, Unconditionally
Secure Key Assignment Schemes, Discrete Applied
Mathematics, Vol. 154, No. 2 , pp. 234252, February 2006.


S.
Cimato, A.
De Santis, A. L. Ferrara, and B. Masucci, Ideal Contrast
Visual Cryptography Schemes with Reversing, Information Processing Letters,
Vol. 93, No. 4, pp.
199206, February 2005.


A.
De Santis, A. L. Ferrara, and B. Masucci, Cryptographic Key
Assignment Schemes for Any Access Control
Policy, Information Processing Letters, Vol.
92, No. 4, pp. 199205, November 2004.


C.
Blundo, S. Martin, B. Masucci, and C. Padrņ, A
Linear Algebraic Approach to Metering
Schemes, Designs, Codes, and Cryptography,
Vol. 33, pp. 241260, 2004.


A.
De Santis and B. Masucci, Anonymous
Membership Broadcast Schemes, Designs, Codes, and
Cryptography, Vol. 32, No. 1, pp. 135151, 2004.


C.
Blundo, S. Cimato, and B. Masucci, A Note
on Optimal Metering Schemes, Information Processing
Letters, Vol. 84 No. 6, pp. 319326, November
2002.


C.
Blundo, B. Masucci, D.R. Stinson and R. Wei, Constructions
and Bounds for Unconditionally Secure NonInteractive Commitment
Schemes, Designs, Codes, and Cryptography, Vol.
26, pp. 97110, 2002.


C.
Blundo, A. De Bonis, and B. Masucci, Bounds and
Constructions for Metering Schemes, Communications in Information
and Systems, Vol. 2, No. 1, pp. 128, June
2002.


B.
Masucci and D. R. Stinson, Efficient
Metering Schemes with Pricing, IEEE Transactions on
Information Theory, Vol. 47, No. 7, pp. 28352844, November 2001.


A.
De Santis and B. Masucci, On
Secret Set Schemes, Information Processing
Letters, Vol. 74, Issue 56, pp. 243251, June
2000.


A.
De Santis and B. Masucci, Multiple
Ramp Schemes, IEEE Transactions on Information
Theory, Vol. 45, No. 5, pp. 17201728, July 1999.


C.
Blundo and B. Masucci, A Note on
the Randomness in Dynamic Threshold Schemes, Journal
of Computer Security, Vol. 7, No. 1, pp. 7385, 1999.


C.
Blundo and B. Masucci, Randomness
in MultiSecret Sharing Schemes, Journal of Universal Computer
Science, Vol. 5, No. 7, pp. 367389, 1999.


A.
De Santis and B. Masucci, A Lower
Bound on the Encoding Length in Lossy
Transmission, Information Sciences, No. 116, pp.
129146, June 1999.

Papers in
Proceedings

A.
Castiglione, A. De Santis, B. Masucci, F. Palmieri, and A. Castiglione,
On the Relations between Security Notions in Hierarchical Key
Assignmrnt Schemes for Dynamic
Structures,
in Proc. of the
21st Australasian Conference on Information Security and
Privacy  ACISP 2016, Melbourne, Australia, July 46, 2016, Lecture Notes in Computer Science, Springer Verlag,
2016.


A.
Castiglione, A. Castiglione, A. De Santis, B. Masucci, F.
Palmieri, and R. Pizzolante,
Novel Insider Threat Techniques: Automation and Generation of Ad
Hoc Digital Evidence,
in Proc. of the
7th ACM CCS International Workshop on Managing Insider Security
Threats  MIST 2015, Denver, Colorado, USA, October 12  16,
2015, pp. 2939, ACM, 2015. (DOI: 10.1145/2808783.2808789)


A.
Castiglione, A. De Santis, and B. Masucci,
Hierarchical and Shared Key Assignment,
in Proc. of the
17th IEEE International Conference on NetworkBased Information
Systems  NBIS 2014,
Salerno, Italy, September 10  12, 2014, pp. 263270, IEEE, 2014.
(DOI: 10.1109/NBIS.2014.106)


P.
D'Arco, A. De Santis, A. L. Ferrara, and B. Masucci,
Security and Tradeoffs of the AklTaylor Scheme and its Variants,
in Proc. of the
34th International Symposium on Mathematical Foundations of
Computer Science  MFCS 2009,
Novy Smokovec, High
Tatras, Slovak Republic, August 24  28, 2009, R. Kralovic and D.
Niwinski (Eds.), Lecture Notes in Computer Science, Vol. 5734, pp.
247257, Springer Verlag, 2009.


A. De Santis, A. L. Ferrara, and B. Masucci,
Efficient ProvablySecure Hierarchical Key Assignment Schemes,
in Proc. of the
32nd International Symposium on Mathematical Foundations of
Computer Science  MFCS 2007,
Cesky Krumlov, Czech
Republic, August 27  31, 2007, L. Kucera and A. Kucera (Eds.), Lecture Notes in Computer
Science, Vol. 4708, pp. 371382, Springer Verlag, 2007.
Extended version in Cryptology ePrint Archive,
Report 2006/479


A. De Santis, A. L. Ferrara, and B. Masucci,
New Constructions for ProvablySecure TimeBound Hierarchical Key Assignment Schemes,
in Proc. of the 12th ACM Symposium on Access Control
Models and Technologies  SACMAT 2007,
Sophia Antipolis, France, June 20  22 2007, pp. 133138.
Extended version in Cryptology ePrint Archive,
Report 2006/483


G.
Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci,
ProvablySecure TimeBound Hierarchical Key Assignment Schemes,
in Proc. of the 14th ACM Conference on Computer and Communications
Security  CCS 2006,
Alexandria, Virginia, USA, November 2006, pp. 288297.
Extended version in Cryptology ePrint Archive,
Report 2006/225


A. De
Santis, A. L. Ferrara, and B. Masucci,
A New Key Assignment Scheme for Access Control in a Complete Tree
Hierarchy,
in Proc. of the International Workshop on Coding and Cryptography 
WCC 2005,
Bergen, Norway, March 14  18 2005,
O. Ytrehus (Ed.), Lecture Notes in Computer Science, Vol. 3969, pp.
202217, Springer Verlag, 2006.


S.
Cimato, C. Galdi, R. Giordano, B. Masucci, and G. Tomasco,
Design and Implementation of an Inline Certified Email Service,
in Proc. of The Fourth International Conference on Cryptology and
Network Security  CANS 2005,
Xiamen, China, December 14  16, 2005,
Y. Desmedt, H. Wang, Y. Mu, Y. Li (Eds.), Lecture Notes in Computer
Science, Vol. 3810, pp. 186199, Springer Verlag, 2005.


A.
L. Ferrara and B. Masucci, An
InformationTheoretic Approach to the Access Control
Problem, in Proc. of The Eighth Italian Conference on
Theoretical Computer Science  ICTCS 2003,
University Center
Bertinoro, Italy, October 13  15, 2003,
Lecture Notes in Computer
Science, Vol. 2841, pp. 342354, Springer Verlag, 2003.


A.
De Santis, A. L. Ferrara, and B. Masucci, Unconditionally
Secure Hierarchical Key Assignment Schemes, in Proc. of
the International Workshop on Coding and Cryptography  WCC
2003,
Veirsalles, France, March 24  28, 2003.


A.
De Santis and B. Masucci, On
Information Dispersal Algorithms, in Proc. of 2002
IEEE International Symposium on Information Theory  ISIT 2002,
Lausanne, Switzerland, June 30  July 5, 2002.


C.
Blundo, S. Martin, B. Masucci, and C. Padrņ, New
Bounds on the Communication Complexity of Metering Schemes,
in Proc. of 2002 IEEE International Symposium on
Information Theory  ISIT 2002,
Lausanne, Switzerland, June 30 
July 5, 2002.


B.
Masucci and D. R. Stinson, Metering
Schemes for General Access Structures, in Proc. of 6th
European Symposium on Research in Computer Security  ESORICS
2000,
Toulouse, France, October 4  6, 2000, F. Cuppens, Y.
Deswarte, D. Gollmann, M.Waidner (Eds.), Lecture Notes in Computer
Science, Vol. 1895, pp. 7287, Springer Verlag, 2000.


C.
Blundo, A. De Bonis, and B. Masucci, Metering
Schemes with Pricing, in Proc. of 14th International
Symposium on DIStributed Computing  DISC 2000,
Toledo, Spain,
October 4  6, 2000, M. Herlihy (Ed.), Lecture Notes in Computer
Science, Vol. 1914, pp. 194208, Springer Verlag,
2000.


C.
Blundo, A. De Bonis, B. Masucci, and D. R. Stinson, Dynamic
MultiThreshold Metering Schemes, in Proc. of Seventh
Annual Workshop on Selected Areas in Cryptography  SAC 2000,
Waterloo, Canada, Aug 14  15, 2000, D. R. Stinson, S. Tavares
(Eds.), Lecture Notes in Computer Science, Vol. 2012, pp. 130144, Springer Verlag, 2001.


A.
De Bonis and B. Masucci, An
Information Theoretical Approach to Metering Schemes, in
Proc. of 2000 IEEE International Symposium on Information Theory
 ISIT 2000,
Sorrento, Italy, June 25  30, 2000.

Preprints
Chapters in
Books

A.
De Santis, A. L. Ferrara, and B. Masucci, Visual Cryptography
Schemes with Reversing, in
"Visual Cryptography and Secret Image Sharing", CRC Press, Boca
Raton, USA, August 2011. 

S.
Cimato, C. Blundo, and B. Masucci, Secure Web Metering, in
"Network Security", Scott C.H. Huang, David MacCallum, DingZhu Du
(editors), Springer Verlag, New York Inc. , USA, October 2008.












