Stelvio Cimato


Ontology type: schema:Person     


Person Info

NAME

Stelvio

SURNAME

Cimato

Publications in SciGraph latest 50 shown

  • 2019 Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype in EMERGING TECHNOLOGIES FOR DEVELOPING COUNTRIES
  • 2019 Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based in EMERGING TECHNOLOGIES FOR DEVELOPING COUNTRIES
  • 2018-11-09 PostProcessing in Constrained Role Mining in INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING – IDEAL 2018
  • 2018 Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything in FROM DATABASE TO CYBER SECURITY
  • 2017-10-20 Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency in EMERGING TECHNOLOGIES FOR DEVELOPING COUNTRIES
  • 2016 Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography in E-INFRASTRUCTURE AND E-SERVICES
  • 2016 Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks in CLOUD COMPUTING AND SECURITY
  • 2016 Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud in COMPUTATIONAL INTELLIGENCE AND QUANTITATIVE SOFTWARE ENGINEERING
  • 2016 Partial Key Exposure Attacks on RSA with Exponent Blinding in E-BUSINESS AND TELECOMMUNICATIONS
  • 2015-11 Security and searchability in secret sharing-based data outsourcing in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2014 A Multi-Party Protocol for Privacy-Preserving Range Queries in SECURE DATA MANAGEMENT
  • 2014 Visual Cryptography Based Watermarking in TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY IX
  • 2013 Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol in INFORMATION AND COMMUNICATIAON TECHNOLOGY
  • 2013 Constrained Role Mining in SECURITY AND TRUST MANAGEMENT
  • 2013 AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing in DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY
  • 2013 A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test in PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS, COMPUTER VISION, AND APPLICATIONS
  • 2013 Visual Cryptography Based Watermarking: Definition and Meaning in DIGITAL FORENSICS AND WATERMAKING
  • 2011 Blum–Goldwasser Public Key Encryption System in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometrics in Video Surveillance in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Bytecode Verification in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Binding Pattern in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Buffer Overrun in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Authentication in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Big Number Multiplication in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Broadcast Stream Authentication in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Bank Card in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Botnet Detection in Enterprise Networks in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biba Mandatory Integrity Policy in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 BLP in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Fusion in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Recognition in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Blowfish in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Boomerang Attack in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Blum–Blum–Shub Pseudorandom Bit Generator in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Binary Exponentiation in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 BIOS Basic Input Output System in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 BLP Model in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Cryptosystem in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Buffer Overflow Attacks in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Binomial Distribution in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Technologies and Security – International Biometric Standards Development Activities in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Encryption in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Broadcast Authentication from an Information Theoretic Perspective in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Boolean Functions in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Blind Signature in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Barter in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Broadcast Authentication from a Conditional Perspective in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Bell-LaPadula Confidentiality Model in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Big Number Squaring in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Privacy in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "familyName": "Cimato", 
        "givenName": "Stelvio", 
        "id": "sg:person.010733436721.88", 
        "identifier": {
          "name": "orcid_id", 
          "type": "PropertyValue", 
          "value": [
            "0000-0003-1737-6218"
          ]
        }, 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010733436721.88", 
          "https://orcid.org/0000-0003-1737-6218"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:37", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1399.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.010733436721.88'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.010733436721.88'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.010733436721.88'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.010733436721.88'


     

    This table displays all metadata directly associated to this object as RDF triples.

    16 TRIPLES      10 PREDICATES      12 URIs      7 LITERALS      2 BLANK NODES

    Subject Predicate Object
    1 sg:person.010733436721.88 schema:familyName Cimato
    2 schema:givenName Stelvio
    3 schema:identifier N0f0f73239e8e49ccbc3fd191a1773536
    4 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010733436721.88
    5 https://orcid.org/0000-0003-1737-6218
    6 schema:sdDatePublished 2019-03-07T13:37
    7 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    8 schema:sdPublisher Na14552810f3740c38349479070890baa
    9 sgo:license sg:explorer/license/
    10 sgo:sdDataset persons
    11 rdf:type schema:Person
    12 N0f0f73239e8e49ccbc3fd191a1773536 schema:name orcid_id
    13 schema:value 0000-0003-1737-6218
    14 rdf:type schema:PropertyValue
    15 Na14552810f3740c38349479070890baa schema:name Springer Nature - SN SciGraph project
    16 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...