Giuseppe Persiano


Ontology type: schema:Person     


Person Info

NAME

Giuseppe

SURNAME

Persiano

Publications in SciGraph latest 50 shown

  • 2018-11 Metastability of Logit Dynamics for Coordination Games in ALGORITHMICA
  • 2018-07-24 Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018 Symmetric Searchable Encryption with Sharing and Unsharing in COMPUTER SECURITY
  • 2017 Controlled Homomorphic Encryption: Definition and Construction in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2017 Logit Dynamics with Concurrent Updates for Local Interaction Games in EXTENDED ABSTRACTS SUMMER 2015
  • 2017 Information Retention in Heterogeneous Majority Dynamics in WEB AND INTERNET ECONOMICS
  • 2016-09 Convergence to Equilibrium of Logit Dynamics for Strategic Games in ALGORITHMICA
  • 2016 Online/Offline OR Composition of Sigma Protocols in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2016
  • 2016 Improved OR-Composition of Sigma-Protocols in THEORY OF CRYPTOGRAPHY
  • 2016 A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles in THEORY OF CRYPTOGRAPHY
  • 2015-11 Logit Dynamics with Concurrent Updates for Local Interaction Potential Games in ALGORITHMICA
  • 2015 Minority Becomes Majority in Social Networks in WEB AND INTERNET ECONOMICS
  • 2015 Guaranteeing Dependency Enforcement in Software Updates in SECURE IT SYSTEMS
  • 2015-01 Special Issue on Approximation and Online Algorithms in THEORY OF COMPUTING SYSTEMS
  • 2015-01 Special Issue on Approximation and Online Algorithms in THEORY OF COMPUTING SYSTEMS
  • 2015 Impossibility of Black-Box Simulation Against Leakage Attacks in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2014-04 Special Issue on Algorithmic Game Theory in THEORY OF COMPUTING SYSTEMS
  • 2014 On Input Indistinguishable Proof Systems in AUTOMATA, LANGUAGES, AND PROGRAMMING
  • 2014 Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption in SECURE IT SYSTEMS
  • 2013-07 Mixing Time and Stationary Expected Social Welfare of Logit Dynamics in THEORY OF COMPUTING SYSTEMS
  • 2013 Logit Dynamics with Concurrent Updates for Local Interaction Games in ALGORITHMS – ESA 2013
  • 2013 On the Achievability of Simulation-Based Security for Functional Encryption in ADVANCES IN CRYPTOLOGY – CRYPTO 2013
  • 2013 Fully Secure Hidden Vector Encryption in PAIRING-BASED CRYPTOGRAPHY – PAIRING 2012
  • 2012 Stability and Metastability of the Logit Dynamics of Strategic Games in FUN WITH ALGORITHMS
  • 2011-01 Alternatives to truthfulness are hard to recognize in AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
  • 2011-01 A response to “Mechanism Design with Partial Verification and Revelation Principle” in AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
  • 2010 Predicate Encryption with Partial Public Keys in CRYPTOLOGY AND NETWORK SECURITY
  • 2010 Predicate Encryption for Secure Remote Storage in TRUSTWORTHLY GLOBAL COMPUTING
  • 2010 Mixing Time and Stationary Expected Social Welfare of Logit Dynamics in ALGORITHMIC GAME THEORY
  • 2010 Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2010 Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts in PAIRING-BASED CRYPTOGRAPHY - PAIRING 2010
  • 2010 Untraceable Tags Based on Mild Assumptions in DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY
  • 2009 Directed Tree Networks in ENCYCLOPEDIA OF OPTIMIZATION
  • 2009 Collusion-Free Multiparty Computation in the Mediated Model in ADVANCES IN CRYPTOLOGY - CRYPTO 2009
  • 2009 Private Capacities in Mechanism Design in MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2009
  • 2009 Private-Key Hidden Vector Encryption with Key Confidentiality in CRYPTOLOGY AND NETWORK SECURITY
  • 2009 Simulation-Based Concurrent Non-malleable Commitments and Decommitments in THEORY OF CRYPTOGRAPHY
  • 2008-07 WAOA 2005 Special Issue of TOCS in THEORY OF COMPUTING SYSTEMS
  • 2008 Interference Games in Wireless Networks in INTERNET AND NETWORK ECONOMICS
  • 2008 A Distributed Implementation of the Certified Information Access Service in COMPUTER SECURITY - ESORICS 2008
  • 2008 Hidden-Vector Encryption with Groups of Prime Order in PAIRING-BASED CRYPTOGRAPHY – PAIRING 2008
  • 2008 Alternatives to Truthfulness Are Hard to Recognize in ALGORITHMIC GAME THEORY
  • 2008 Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2008 Improved Security Notions and Protocols for Non-transferable Identification in COMPUTER SECURITY - ESORICS 2008
  • 2007-01 Low-randomness constant-round private XOR computations in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2007 Distributed Certified Information Access for Mobile Devices in INFORMATION SECURITY THEORY AND PRACTICES. SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS
  • 2006 Approximation Algorithms for Path Coloring in Trees in EFFICIENT APPROXIMATION AND ONLINE ALGORITHMS
  • 2006 The Price of Defense and Fractional Matchings in DISTRIBUTED COMPUTING AND NETWORKING
  • 2006 On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model in MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2006
  • 2006 New Constructions of Mechanisms with Verification in AUTOMATA, LANGUAGES AND PROGRAMMING
  • Affiliations

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.158820.6", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Persiano", 
        "givenName": "Giuseppe", 
        "id": "sg:person.013255374317.27", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013255374317.27"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:51", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1635.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.013255374317.27'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.013255374317.27'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.013255374317.27'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.013255374317.27'


     




    Preview window. Press ESC to close (or click here)


    ...