Roberto Tamassia


Ontology type: schema:Person     


Person Info

NAME

Roberto

SURNAME

Tamassia

Publications in SciGraph latest 50 shown

  • 2019-09-02 Full Database Reconstruction with Access and Search Pattern Leakage in INFORMATION SECURITY
  • 2019-09-02 Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries in INFORMATION SECURITY
  • 2017-06-26 Accountable Storage in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2016-11-09 Zero-Knowledge Accumulators and Set Algebra in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • 2016-09-15 More Practical and Secure History-Independent Hash Tables in COMPUTER SECURITY – ESORICS 2016
  • 2016-08-11 Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2015-08-13 Minimal Spatio-Temporal Database Repairs in ADVANCES IN SPATIAL AND TEMPORAL DATABASES
  • 2015-01-09 Authenticated Hash Tables Based on Cryptographic Accumulators in ALGORITHMICA
  • 2015 Zero-Knowledge Authenticated Order Queries and Order Statistics on a List in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2014 The Melbourne Shuffle: Improving Oblivious Storage in the Cloud in AUTOMATA, LANGUAGES, AND PROGRAMMING
  • 2013 Signatures of Correct Computation in THEORY OF CRYPTOGRAPHY
  • 2013 Authenticating Email Search Results in SECURITY AND TRUST MANAGEMENT
  • 2013 Graph Drawing in the Cloud: Privately Visualizing Relational Data Using Small Working Storage in GRAPH DRAWING
  • 2013 Streaming Authenticated Data Structures in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2013
  • 2012 Hardening Access Control and Data Protection in GFS-like File Systems in COMPUTER SECURITY – ESORICS 2012
  • 2011-08-30 Ranking continuous nearest neighbors for uncertain trajectories in THE VLDB JOURNAL
  • 2011 Optimal Verification of Operations on Dynamic Sets in ADVANCES IN CRYPTOLOGY – CRYPTO 2011
  • 2010 Optimal Authenticated Data Structures with Multilinear Forms in PAIRING-BASED CRYPTOGRAPHY - PAIRING 2010
  • 2009-09-11 Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems in ALGORITHMICA
  • 2009 Graph Drawing for Security Visualization in GRAPH DRAWING
  • 2009 Reliable Resource Searching in P2P Networks in SECURITY AND PRIVACY IN COMMUNICATION NETWORKS
  • 2008 Algorithms for Location Estimation Based on RSSI Sampling in ALGORITHMIC ASPECTS OF WIRELESS SENSOR NETWORKS
  • 2008-01-01 Super-Efficient Verification of Dynamic Outsourced Databases in TOPICS IN CRYPTOLOGY – CT-RSA 2008
  • 2008-01-01 Athos: Efficient Authentication of Outsourced File Systems in INFORMATION SECURITY
  • 2008-01-01 Effective Visualization of File System Access-Control in VISUALIZATION FOR COMPUTER SECURITY
  • 2007-01-01 Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust in TRUST MANAGEMENT
  • 2007 Efficient Content Authentication in Peer-to-Peer Networks in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2007-01-01 On the Cost of Persistence and Authentication in Skip Lists in EXPERIMENTAL ALGORITHMS
  • 2007 Privacy-Preserving Schema Matching Using Mutual Information in DATA AND APPLICATIONS SECURITY XXI
  • 2007-01-01 A Role and Attribute Based Access Control System Using Semantic Web Technologies in ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS
  • 2007 Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures in INFORMATION AND COMMUNICATIONS SECURITY
  • 2006 Notarized Federated Identity Management for Web Services in DATA AND APPLICATIONS SECURITY XX
  • 2006 Point-Based Trust: Define How Much Privacy Is Worth in INFORMATION AND COMMUNICATIONS SECURITY
  • 2005 Curvilinear Graph Drawing Using the Force-Directed Method in GRAPH DRAWING
  • 2005 Secure Biometric Authentication for Weak Computational Devices in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2005 Indexing Information for Data Forensics in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2005 Computational Bounds on Hierarchical Data Processing with Applications to Information Security in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2004 GDS — A Graph Drawing Server on the Internet in GRAPH DRAWING SOFTWARE
  • 2004 Efficient Tree-Based Revocation in Groups of Low-State Devices in ADVANCES IN CRYPTOLOGY – CRYPTO 2004
  • 2003-05-27 Authenticated Dictionaries for Fresh Attribute Credentials in TRUST MANAGEMENT
  • 2003-02-28 Authenticated Data Structures for Graph and Geometric Searching in TOPICS IN CRYPTOLOGY — CT-RSA 2003
  • 2003 Authenticated Data Structures in ALGORITHMS - ESA 2003
  • 2002-09-05 An Efficient Dynamic and Distributed Cryptographic Accumulator* in INFORMATION SECURITY
  • 2002-02-21 The Graph Drawing Server in GRAPH DRAWING
  • 2001-09-11 Persistent Authenticated Dictionaries and Their Applications in INFORMATION SECURITY
  • 2001 A User Study in Similarity Measures for Graph Drawing in GRAPH DRAWING
  • 2001 Fast Layout Methods for Timetable Graphs in GRAPH DRAWING
  • 2000-01 Foreword in ALGORITHMICA
  • 2000 Minimum Depth Graph Embedding in ALGORITHMS - ESA 2000
  • 2000 Improving Angular Resolution in Visualizations of Geographic Networks in DATA VISUALIZATION 2000
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.40263.33", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.8509.4", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.7841.a", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.35403.31", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.47840.3f", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.5328.c", 
            "type": "Organization"
          }
        ], 
        "familyName": "Tamassia", 
        "givenName": "Roberto", 
        "id": "sg:person.0674326220.33", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0674326220.33"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-01-01T19:59", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/person/person_959.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.0674326220.33'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.0674326220.33'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.0674326220.33'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.0674326220.33'


     

    This table displays all metadata directly associated to this object as RDF triples.

    26 TRIPLES      10 PREDICATES      16 URIs      7 LITERALS      2 BLANK NODES

    Subject Predicate Object
    1 sg:person.0674326220.33 schema:affiliation N98881d72a3304aa695cbe8fcf95ab234
    2 grid-institutes:grid.35403.31
    3 grid-institutes:grid.47840.3f
    4 grid-institutes:grid.5328.c
    5 grid-institutes:grid.7841.a
    6 grid-institutes:grid.8509.4
    7 schema:familyName Tamassia
    8 schema:givenName Roberto
    9 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0674326220.33
    10 schema:sdDatePublished 2022-01-01T19:59
    11 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    12 schema:sdPublisher N2ea3d672285b4a5a964d0d08f832c517
    13 sgo:license sg:explorer/license/
    14 sgo:sdDataset persons
    15 rdf:type schema:Person
    16 N2ea3d672285b4a5a964d0d08f832c517 schema:name Springer Nature - SN SciGraph project
    17 rdf:type schema:Organization
    18 N98881d72a3304aa695cbe8fcf95ab234 schema:affiliation grid-institutes:grid.40263.33
    19 sgo:isCurrent true
    20 rdf:type schema:OrganizationRole
    21 grid-institutes:grid.35403.31 schema:Organization
    22 grid-institutes:grid.40263.33 schema:Organization
    23 grid-institutes:grid.47840.3f schema:Organization
    24 grid-institutes:grid.5328.c schema:Organization
    25 grid-institutes:grid.7841.a schema:Organization
    26 grid-institutes:grid.8509.4 schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...