What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Claudio Soriente
Google Scholar
ORCID:
0000-0002-8215-5457
24
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acns
Anonymous Authenticated Key Exchange.
José Ignacio Escribano Pablos
María Isabel González Vasco
Angel L. Pérez del Pozo
Claudio Soriente
2025
conf/ndss
The Forking Way: When TEEs Meet Consensus.
Annika Wilde
Tim Niklas Gruel
Claudio Soriente
Ghassan Karame
2023
conf/ccs
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing.
David Balbás
Dario Fiore
María Isabel González Vasco
Damien Robissout
Claudio Soriente
2023
conf/acsac
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications.
Samira Briongos
Ghassan Karame
Claudio Soriente
Annika Wilde
2022
conf/esorics
Ring Signatures with User-Controlled Linkability.
Dario Fiore
Lydia Garms
Dimitris Kolonelos
Claudio Soriente
Ida Tucker
2022
conf/ctrsa
Subversion-Resilient Enhanced Privacy ID.
Antonio Faonio
Dario Fiore
Luca Nizzardo
Claudio Soriente
2022
conf/cans
Auditable Asymmetric Password Authenticated Public Key Establishment.
Antonio Faonio
María Isabel González Vasco
Claudio Soriente
Hien Thi Thu Truong
2021
journals/popets
Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions.
Miguel Ambrona
Dario Fiore
Claudio Soriente
2019
conf/eurosp
ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud.
Claudio Soriente
Ghassan Karame
Wenting Li
Sergey Fedorov
2018
journals/tifs
Toward Shared Ownership in the Cloud.
Hubert Ritzdorf
Claudio Soriente
Ghassan O. Karame
Srdjan Marinovic
Damian Gruber
Srdjan Capkun
2018
conf/acns
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection.
Andrea Cerulli
Emiliano De Cristofaro
Claudio Soriente
2016
conf/ccs
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Claudio Marforio
Ramya Jayaram Masti
Claudio Soriente
Kari Kostiainen
Srdjan Capkun
2016
conf/ccs
On Information Leakage in Deduplicated Storage Systems.
Hubert Ritzdorf
Ghassan Karame
Claudio Soriente
Srdjan Capkun
2015
conf/uss
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound.
Nikolaos Karapanos
Claudio Marforio
Claudio Soriente
Srdjan Capkun
2015
conf/acsac
Logical Partitions on Many-Core Platforms.
Ramya Jayaram Masti
Claudio Marforio
Kari Kostiainen
Claudio Soriente
Srdjan Capkun
2014
conf/ndss
Smartphones as Practical and Secure Location Verification Tokens for Payments.
Claudio Marforio
Nikolaos Karapanos
Claudio Soriente
Kari Kostiainen
Srdjan Capkun
2013
journals/tifs
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI).
Emiliano De Cristofaro
Claudio Soriente
2013
conf/ccs
Secure enrollment and practical migration for mobile trusted execution environments.
Claudio Marforio
Nikolaos Karapanos
Claudio Soriente
Kari Kostiainen
Srdjan Capkun
2012
conf/sp
Hummingbird: Privacy at the Time of Twitter.
Emiliano De Cristofaro
Claudio Soriente
Gene Tsudik
Andrew Williams
2012
conf/africacrypt
Size-Hiding in Private Set Intersection: Existential Results and Constructions.
Paolo D'Arco
María Isabel González Vasco
Angel L. Pérez del Pozo
Claudio Soriente
2011
conf/wisec
Short paper: PEPSI - privacy-enhanced participatory sensing infrastructure.
Emiliano De Cristofaro
Claudio Soriente
2009
conf/ccs
On the difficulty of software-based attestation of embedded devices.
Claude Castelluccia
Aurélien Francillon
Daniele Perito
Claudio Soriente
2009
conf/pkc
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.
Jan Camenisch
Markulf Kohlweiss
Claudio Soriente
2009
conf/wisec
Collaborative authentication in unattended WSNs.
Roberto Di Pietro
Claudio Soriente
Angelo Spognardi
Gene Tsudik
Coauthors
Andrea Cerulli
(1)
Andrew Williams
(1)
Angel L. Pérez del Pozo
(2)
Angelo Spognardi
(1)
Annika Wilde
(2)
Antonio Faonio
(2)
Aurélien Francillon
(1)
Claude Castelluccia
(1)
Claudio Marforio
(5)
Claudio Soriente
(24)
Damian Gruber
(1)
Damien Robissout
(1)
Daniele Perito
(1)
Dario Fiore
(4)
David Balbás
(1)
Dimitris Kolonelos
(1)
Emiliano De Cristofaro
(4)
Gene Tsudik
(2)
Ghassan Karame
(4)
Ghassan O. Karame
(1)
Hien Thi Thu Truong
(1)
Hubert Ritzdorf
(2)
Ida Tucker
(1)
Jan Camenisch
(1)
José Ignacio Escribano Pablos
(1)
Kari Kostiainen
(4)
Luca Nizzardo
(1)
Lydia Garms
(1)
María Isabel González Vasco
(4)
Markulf Kohlweiss
(1)
Miguel Ambrona
(1)
Nikolaos Karapanos
(3)
Paolo D'Arco
(1)
Ramya Jayaram Masti
(2)
Roberto Di Pietro
(1)
Samira Briongos
(1)
Sergey Fedorov
(1)
Srdjan Capkun
(7)
Srdjan Marinovic
(1)
Tim Niklas Gruel
(1)
Wenting Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to