Home
Awards
Publications
Talks
Tool
Contact
Light
Dark
Automatic
paper-conference
Hierarchical Key Assignment Schemes with Key Rotation
Hierarchical structures are frequently used to manage access to sensitive data in various contexts, ranging from organizational …
Roberta Cimorelli Belfiore
,
Alfredo De Santis
,
Anna Lisa Ferrara
,
Barbara Masucci
Cite
DOI
Identity-Based Matchmaking Encryption from Standard Lattice Assumptions
Identity-Based Matchmaking Encryption (IB-ME), initially proposed by Ateniese et al. (Crypto 2019), is an extension of Identity-Based …
Roberta Cimorelli Belfiore
,
Andrea De Cosmo
,
Anna Lisa Ferrara
Cite
DOI
Security Analysis of Access Control Policies for Smart Homes
Ensuring security is crucial in smart home settings, where only authorized users should have access to home devices. Over the past …
Roberta Cimorelli Belfiore
,
Anna Lisa Ferrara
PDF
Cite
DOI
Cite
×