Roberto Tamassia

Ontology type: schema:Person     

Person Info





Publications in SciGraph latest 50 shown

  • 2016-02 Authenticated Hash Tables Based on Cryptographic Accumulators in ALGORITHMICA
  • 2016 Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2016 Zero-Knowledge Accumulators and Set Algebra in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • 2016 More Practical and Secure History-Independent Hash Tables in COMPUTER SECURITY – ESORICS 2016
  • 2015 Minimal Spatio-Temporal Database Repairs in ADVANCES IN SPATIAL AND TEMPORAL DATABASES
  • 2015 Zero-Knowledge Authenticated Order Queries and Order Statistics on a List in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2014 The Melbourne Shuffle: Improving Oblivious Storage in the Cloud in AUTOMATA, LANGUAGES, AND PROGRAMMING
  • 2013 Signatures of Correct Computation in THEORY OF CRYPTOGRAPHY
  • 2013 Authenticating Email Search Results in SECURITY AND TRUST MANAGEMENT
  • 2013 Graph Drawing in the Cloud: Privately Visualizing Relational Data Using Small Working Storage in GRAPH DRAWING
  • 2013 Streaming Authenticated Data Structures in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2013
  • 2012 Hardening Access Control and Data Protection in GFS-like File Systems in COMPUTER SECURITY – ESORICS 2012
  • 2011-10 Ranking continuous nearest neighbors for uncertain trajectories in THE VLDB JOURNAL
  • 2011-07 Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems in ALGORITHMICA
  • 2011 Optimal Verification of Operations on Dynamic Sets in ADVANCES IN CRYPTOLOGY – CRYPTO 2011
  • 2010 Optimal Authenticated Data Structures with Multilinear Forms in PAIRING-BASED CRYPTOGRAPHY - PAIRING 2010
  • 2009 Graph Drawing for Security Visualization in GRAPH DRAWING
  • 2009 Reliable Resource Searching in P2P Networks in SECURITY AND PRIVACY IN COMMUNICATION NETWORKS
  • 2008 Algorithms for Location Estimation Based on RSSI Sampling in ALGORITHMIC ASPECTS OF WIRELESS SENSOR NETWORKS
  • 2008 Super-Efficient Verification of Dynamic Outsourced Databases in TOPICS IN CRYPTOLOGY – CT-RSA 2008
  • 2008 Athos: Efficient Authentication of Outsourced File Systems in INFORMATION SECURITY
  • 2008 Effective Visualization of File System Access-Control in VISUALIZATION FOR COMPUTER SECURITY
  • 2007 On the Cost of Persistence and Authentication in Skip Lists in EXPERIMENTAL ALGORITHMS
  • 2007 Efficient Content Authentication in Peer-to-Peer Networks in ROBOCUP-97: ROBOT SOCCER WORLD CUP I
  • 2007 Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust in TRUST MANAGEMENT
  • 2007 Privacy-Preserving Schema Matching Using Mutual Information in DATA AND APPLICATIONS SECURITY XXI
  • 2007 A Role and Attribute Based Access Control System Using Semantic Web Technologies in ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS
  • 2007 Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures in INFORMATION AND COMMUNICATIONS SECURITY
  • 2006 Notarized Federated Identity Management for Web Services in DATA AND APPLICATIONS SECURITY XX
  • 2006 Point-Based Trust: Define How Much Privacy Is Worth in INFORMATION AND COMMUNICATIONS SECURITY
  • 2005 Curvilinear Graph Drawing Using the Force-Directed Method in GRAPH DRAWING
  • 2005 Indexing Information for Data Forensics in ROBOCUP 2005: ROBOT SOCCER WORLD CUP IX
  • 2005 Computational Bounds on Hierarchical Data Processing with Applications to Information Security in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2005 Secure Biometric Authentication for Weak Computational Devices in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2004 Efficient Tree-Based Revocation in Groups of Low-State Devices in ADVANCES IN CRYPTOLOGY – CRYPTO 2004
  • 2004 GDS — A Graph Drawing Server on the Internet in GRAPH DRAWING SOFTWARE
  • 2003-05-27 Authenticated Dictionaries for Fresh Attribute Credentials in TRUST MANAGEMENT
  • 2003-02-28 Authenticated Data Structures for Graph and Geometric Searching in TOPICS IN CRYPTOLOGY — CT-RSA 2003
  • 2003-02-11 Minimum Depth Graph Embedding in ALGORITHMS - ESA 2000
  • 2003 Authenticated Data Structures in ALGORITHMS - ESA 2003
  • 2002-04-19 Accessing the Internal Organization of Data Structures in the JDSL Library in ALGORITHM ENGINEERING AND EXPERIMENTATION
  • 2002-02-21 The Graph Drawing Server in GRAPH DRAWING
  • 2002 An Efficient Dynamic and Distributed Cryptographic Accumulator* in INFORMATION SECURITY
  • 2001-09-11 Persistent Authenticated Dictionaries and Their Applications in INFORMATION SECURITY
  • 2001-03-29 Implementing Algorithms and Data Structures: An Educational and Research Perspective in ALGORITHMS AND COMPUTATION
  • 2001 Fast Layout Methods for Timetable Graphs in GRAPH DRAWING
  • 2001 A User Study in Similarity Measures for Graph Drawing in GRAPH DRAWING
  • 2000-03-03 Turn-Regularity and Planar Orthogonal Drawings in GRAPH DRAWING
  • 2000-01 Foreword in ALGORITHMICA
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

        "@context": "", 
        "affiliation": [
            "affiliation": {
              "id": "", 
              "type": "Organization"
            "isCurrent": true, 
            "type": "OrganizationRole"
            "id": "", 
            "type": "Organization"
            "id": "", 
            "type": "Organization"
        "familyName": "Tamassia", 
        "givenName": "Roberto", 
        "id": "sg:person.0674326220.33", 
        "sameAs": [
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:15", 
        "sdLicense": "", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1074.json", 
        "type": "Person"

    Download the RDF metadata as:  json-ld nt turtle xml License info


    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' ''

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' ''

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' ''

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' ''


    Preview window. Press ESC to close (or click here)