|
Edited Books
- Z. Zhou, C. Yang, C. Kim, S. Cimato, Journal of Real-Time Image Processing (17) 1: Special issue on deep learning for real-time information hiding and forensics, Springer, 2020.
- V. Getov, J. Gaudiot, N. Yamai, S. Cimato, J. M. Chang, Y. Teranishi, J. Yang, H. V. Leong, H. Shahriar, M. Takemoto, D. Towey, H. Takakura, A. Elçi, S. Takeuchi, S. Puri, 43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2, IEEE, 2019.
- V. Getov, J. Gaudiot, N. Yamai, S. Cimato, J. M. Chang, Y. Teranishi, J. Yang, H. V. Leong, H. Shahriar, M. Takemoto, D. Towey, H. Takakura, A. Elçi, S. Takeuchi, S. Puri, 43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1, IEEE, 2019.
- S. Reisman, S. I. Ahamed, C. Demartini, T. M. Conte, L. Liu, W. R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C. Lung, H. Takakura, J. Yang, T. Akiyama, Z. Zhang, K. Hasan, 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2, IEEE Computer Society, 2018.
- S. Reisman, S. I. Ahamed, C. Demartini, T. M. Conte, L. Liu, W. R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C. Lung, H. Takakura, J. Yang, T. Akiyama, Z. Zhang, K. Hasan, 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1, IEEE Computer Society, 2018.
- S. Reisman, S. I. Ahamed, C. Demartini, T. M. Conte, L. Liu, W. R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C. Lung, H. Takakura, J. Yang, T. Akiyama, Z. Zhang, K. Hasan, 41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2, IEEE Computer Society, 2017.
- S. Reisman, S. I. Ahamed, C. Demartini, T. M. Conte, L. Liu, W. R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C. Lung, H. Takakura, J. Yang, T. Akiyama, Z. Zhang, K. Hasan, 41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1, IEEE Computer Society, 2017.
- S. Cimato, C. Yang, Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision), Boca Raton, FL, USA: CRC Press, Inc., 2011.
- S. Jajodia, P. Samarati and S. Cimato, Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, ... Federation for Information Processing), Springer Publishing Company, Incorporated, 2008.
- C. Blundo, S. Cimato, Security in Communication Networks: 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers (Lecture Notes in Computer Science), Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2005.
- S. Cimato, C. Galdi and G. Persiano, Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, Springer, 2003.
Papers in International Journals
- C. Blundo, S. Cimato, "Role mining under User-Distribution cardinality constraint", Journal of Information Security and Applications, vol. 78, 2023, pp. 103611.
- C. Blundo, S. Cimato and L. Siniscalchi, "Heuristics for constrained role mining in the post-processing framework", J. Ambient Intell. Humaniz. Comput., vol. 14, no. 8, 2023, pp. 9925–9937.
- C. Blundo, S. Cimato and L. Siniscalchi, "Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints", Comput. J., vol. 65, no. 6, 2022, pp. 1386–1411.
- A. Bernasconi, S. Cimato, V. Ciriani, M. Molteni, "Multiplicative Complexity of XOR Based Regular Functions", IEEE Transactions on Computers, 2022.
- S. Cimato, G. Gianini, M. Sepehri, R. Asal, E. Damiani, "A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem", Journal of Information Security and Applications, vol. 51, 2020, pp. 1-21.
- C. Blundo, S. Cimato and L. Siniscalchi, "Managing Constraints in Role Based Access Control", IEEE Access, vol. 8, 2020, pp. 140497–140511.
- M. Sepehri, S. Cimato and E. Damiani, "Privacy-Preserving Query Processing by Multi-Party Computation", The Computer Journal, vol. 58, no. 10, 2015, pp. 2195-2212.
- V. Bellandi, S. Cimato, E. Damiani, G. Gianini, A. Zilli, "Towards Economics-Aware Risk Assessment on the cloud", IEEE Security & Privacy, vol. 13, no. 6, 2015, pp. 30-37.
- M. Hadavi, R. Jalili, E. Damiani, S. Cimato, "Security and searchability in secret sharing-based data outsourcing", International Journal of Information Security, 2015, pp. 1-17.
- S. Cimato, J. C. N. Yang and C. Wu, "Visual Cryptography Based Watermarking", Transactions on Data Hiding and Multimedia Security, vol. 9, 2014, pp. 91–109.
- E. Damiani, S. Cimato and G. Gianini, "A risk model for cloud processes", The ISecure International Journal on Information Security, 2014, pp. 99-123.
- S. Abbasi, S. Cimato and E. Damiani, "Clustering Models in Secure Clustered Multiparty Computation", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 4, no. 2, 2013, pp. 63–76.
- F. Kerschbaum, A. Schröpfer, A. Zilli, R. Pibernik, O. Catrina, S. d. Hoogh, B. Schoenmakers, S. Cimato, E. Damiani, "Secure Collaborative Supply-Chain Management", IEEE Computer, vol. 44, no. 9, 2011, pp. 38–43.
- C. Blundo, S. Cimato, S. D. C. d. Vimercati, A. D. Santis, S. Foresti, S. Paraboschi, P. Samarati, "Managing key hierarchies for access control enforcement: Heuristic approaches", Computers & Security, vol. 29, no. 5, 2010, pp. 533 - 547.
- S. Cimato, R. Sassi and F. Scotti, "Biometrics and Privacy", Recent Patents on Computer Science, vol. 1, no. 2, 2008, pp. 98-109.
- S. Cimato, R. D. Prisco and A. D. Santis, "Colored visual cryptography without color darkening", Theoretical Computer Science, vol. 374, no. 1-3, 2007, pp. 261 - 276.
- S. Cimato, A. Cresti and P. D'Arco, "A unified model for unconditionally secure key distribution", Journal of Computer Security, vol. 14, no. 1, 2006, pp. 45–64.
- S. Cimato, R. De Prisco and A. De Santis, "Probabilistic Visual Cryptography Schemes", The Computer Journal, vol. 49, no. 1, 2006, pp. 97-107.
- C. Blundo, S. Cimato and A. De Santis, "Visual cryptography schemes with optimal pixel expansion", Theoretical Computer Science, vol. 369, no. 1-3, 2006, pp. 169 - 182.
- S. Cimato, R. Prisco and A. Santis, "Optimal Colored Threshold Visual Cryptography Schemes", Designs, Codes and Cryptography, vol. 35, no. 3, 2005, pp. 311-335.
- S. Cimato, A. D. Santis and U. F. Petrillo, "Overcoming the obfuscation of Java programs by identifier renaming", Journal of Systems and Software, vol. 78, no. 1, 2005, pp. 60 - 72.
- S. Cimato, A. DeSantis, A. L. Ferrara, B. Masucci, "Ideal contrast visual cryptography schemes with reversing", Information Processing Letters, vol. 93, no. 4, 2005, pp. 199 - 206.
- C. Blundo, S. Cimato and A. De Bonis, "Secure E-Coupons", Electronic Commerce Research, vol. 5, no. 1, 2005, pp. 117-139.
- C. Blundo, S. Cimato, R. D. Prisco, A. Ferrara, "Modeling A Certified Email Protocol using I/O Automata", Electronic Notes in Theoretical Computer Science, vol. 99, 2004, pp. 339 - 359.
- C. Blundo, S. Cimato, "A Software Infrastructure for Authenticated Web Metering", IEEE Computer, vol. 37, no. 4, 2004, pp. 28–33.
- C. Blundo, S. Cimato and B. Masucci, "A note on optimal metering schemes", Information Processing Letters, vol. 84, no. 6, 2002, pp. 319 - 326.
- P. Ciancarini, S. Cimato and C. Mascolo, "Engineering formal requirements: An analysis and testing method for Z documents", Annals of Software Engineering, vol. 3, no. 1, 1997, pp. 189-219.
Chapters in Books
- L. Mauri, S. Cimato and E. Damiani, "Untangling the XRP Ledger: Insights and Analysis", in Information Systems Security and Privacy, S. Furnell, P. Mori, E. Weippl, O. Camp, Eds., Cham: Springer International Publishing, 2022, pp. 48–72.
- S. Cimato, E. Damiani, "Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything", in From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, P. Samarati, I. Ray, I. Ray, Eds., Springer, 2018, pp. 113–124.
- V. Bellandi, S. Cimato, E. Damiani, G. Gianini, "Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud", in Computational Intelligence and Quantitative Software Engineering, W. Pedrycz, G. Succi, A. Sillitti, Eds., Springer, 2016, pp. 173–207.
- S. Cimato, S. Mella and R. Susella, "Partial Key Exposure Attacks on RSA with Exponent Blinding", in E-Business and Telecommunications - 12th International Joint Conference, ICETE 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers, 2015, pp. 364–385.
- S. Cimato, V. Ciriani and M. Moroni, "Minimization of ESOP Forms for Secure Computation", in Problems and New Solutions in the Boolean Domain, B. Steinbach, Ed., Cambridge Scholars Publishing, 2015, pp. 241-254.
- S. Cimato, "Image watermarking using visual cryptography", in Steganography and Watermarking, C. Yang, C. Lin, C. Chang, Eds., Nova Science Publishers, 2013, pp. 385-405.
- F. Scotti, S. Cimato and R. Sassi, "Biometric Privacy", in Encyclopedia of Cryptography and Security, 2nd Ed., 2011, pp. 101–104.
- S. Cimato, R. De Prisco and A. De Santis, "Probabilistic Visual Cryptography", in Visual Cryptography and Secret Image Sharing, S. Cimato, C. Yang, Eds., CRC PRess, 2011, pp. 127-153.
- S. Cimato, R. De Prisco and A. De Santis, "Visual Cryptography for Color Images", in Visual Cryptography and Secret Image Sharing, S. Cimato, C. Yang, Eds., CRC Press, 2011, pp. 31-56.
- C. Blundo, S. Cimato and B. Masucci, "Secure Metering Schemes", in Network Security, S. C. Huang, D. MacCallum, D. Du, Eds., Springer US, 2010, pp. 1-32.
Conference and Workshop Papers
- E. Bellini, I. Aversa, S. Cimato, A. Esposito, "A Blockchain-based Trustworthy Cloud Services Digital Ecosystem", in IEEE International Conference on Cyber Security and Resilience, CSR 2022, Rhodes, Greece, July 27-29, 2022, IEEE, pp. 118–124.
- E. Bellini, S. Cimato, E. Damiani, B. D. Martino, A. Esposito, "Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services", in Complex, Intelligent and Software Intensive Systems - Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021), Asan, Korea, 1-3 July 2021, L. Barolli, K. Yim, T. Enokido, Eds., Springer, pp. 606–615.
- C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh, "Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges", in Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020, Revised Selected Papers, G. Hatzivasilis, S. Ioannidis, Eds., Springer, pp. 79–91.
- L. Mauri, S. Cimato and E. Damiani, "A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol", in Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020, S. Furnell, P. Mori, E. R. Weippl, O. Camp, Eds., SCITEPRESS, pp. 52–63.
- A. Bernasconi, S. Cimato, V. Ciriani, M. C. Molteni, "Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security", in 57th ACM/IEEE Design Automation Conference, DAC 2020, San Francisco, CA, USA, July 20-24, 2020, IEEE, pp. 1–6.
- S. Cimato, S. Nicolò, "Towards Efficient and Secure Analysis of Large Datasets", in 44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020, Madrid, Spain, July 13-17, 2020, IEEE, pp. 1351–1356.
- L. Mauri, E. Damiani and S. Cimato, "Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work", in 13th IEEE International Conference on Cloud Computing, CLOUD 2020, Virtual Event, 18-24 October 2020, IEEE, pp. 53–62.
- C. Braghin, S. Cimato, E. Damiani, M. Baronchelli, "Designing Smart-Contract Based Auctions", in Security with Intelligent Computing and Big-data Services, Proceedings of SICBS 2018 - International Conference on Security with Intelligent Computing and Big-data Services, C. Yang, S. Peng, L. C. Jain, Eds., Springer International Publishing, 2019, pp. 54–64.
- S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour, "An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits", in Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings, pp. 158–167.
- C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene, "A Model Driven Approach for Cyber Security Scenarios Deployment", in Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, A. P. Fournaris, M. Athanatos, K. Lampropoulos, S. Ioannidis, G. Hatzivasilis, E. Damiani, H. Abie, S. Ranise, L. Verderame, A. Siena, J. García-Alfaro, Eds., Springer, pp. 107–122.
- C. Braghin, S. Cimato, S. R. Cominesi, E. Damiani, L. Mauri, "Towards Blockchain-Based E-Voting Systems", in Business Information Systems Workshops - BIS 2019 International Workshops, Seville, Spain, June 26-28, 2019, Revised Papers, pp. 274–286.
- C. Blundo, S. Cimato and L. Siniscalchi, "PostProcessing in Constrained Role Mining", in Intelligent Data Engineering and Automated Learning - IDEAL 2018 - 19th International Conference, Madrid, Spain, November 21-23, 2018, Proceedings, Part I, pp. 204–214.
- L. Mauri, S. Cimato and E. Damiani, "A Comparative Analysis of Current Cryptocurrencies", in Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018., pp. 127–138.
- C. Braghin, S. Cimato and A. D. Libera, "Are mHealth Apps Secure? A Case Study", in 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2, pp. 335–340.
- P. J. Houngbo, J. T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C. Y. Yeun, "Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based", in Emerging Technologies for Developing Countries - Second EAI International Conference, AFRICATEK 2018, Cotonou, Benin, May 29-30, 2018, Proceedings, pp. 109–124.
- P. J. Houngbo, J. T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C. Y. Yeun, "Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype", in Emerging Technologies for Developing Countries - Second EAI International Conference, AFRICATEK 2018, Cotonou, Benin, May 29-30, 2018, Proceedings, pp. 47–56.
- S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour, "A Multiple Valued Logic Approach for the Synthesis of Garbled Circuits", in 2017 IFIP/IEEE 25th International Conference on Very Large Scale Integration, VLSI-SoC 2017, ABU Dhabi, UAE, October 22-25, 2017, pp. 232-236.
- M. Ehsanpour, S. Cimato, V. Ciriani, E. Damiani, "Exploiting Quantum Gates in Secure Computation", in Euromicro Conference on Digital System Design, DSD 2017, Vienna, Austria, August 30 - Sept. 1, 2017, pp. 291–294.
- C. Blundo, S. Cimato and L. Siniscalchi, "PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining", in 41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2, pp. 149–154.
- M. Sepehri, S. Cimato and E. Damiani, "Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud", in Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017, pp. 67–74.
- E. Damiani, P. J. Houngbo, J. T. Hounsou, R. Asal, S. Cimato, F. Frati, D. Shehada, C. Y. Yeun, "Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency", in Emerging Technologies for Developing Countries - First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings, pp. 159–168.
- C. Yang, S. Cimato, J. Wu, S. Cai, "3-Out-of-n Cheating Prevention Visual Cryptographic Schemes", in Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016., pp. 400–406.
- S. Cimato, E. Damiani, S. Mella, C. Yang, "Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks", in Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I, pp. 456–467.
- M. Sepehri, S. Cimato, E. Damiani, C. Y. Yeuny, "Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries", in Proceedings of the 7th IEEE International Symposium on Ubisafe Computing in conjunction with 14th IEEE Conference on Trust, Security and Privacy in Computing and Communications,TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1, pp. 1357–1362.
- S. Cimato, S. Mella and R. Susella, "New Results for Partial Key Exposure on RSA with Exponent Blinding", in SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015., pp. 136–147.
- S. Cimato, E. Damiani, F. Frati, J. T. Hounsou, J. Tandjiékpon, "Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography", in e-Infrastructure and e-Services - 7th International Conference, AFRICOMM 2015, Cotonou, Benin, December 15-16, 2015, Revised Selected Papers, pp. 136–141.
- S. Cimato, V. Ciriani and M. Moroni, "ESOP Synthesis for Secure Computation.", in 11th International Workshop on Boolean Problems (IWSBP14), T. U. Bergakademie, Ed., 2014, pp. -.
- S. Cimato, E. Damiani, F. Zavatarelli, R. Menicocci, "Towards the Certification of Cloud Services", in IEEE Ninth World Congress on Services, SERVICES 2013, Santa Clara, CA, USA, June 28 - July 3, 2013, pp. 92–97.
- M. Sepehri, S. Cimato and E. Damiani, "A Multi-Party Protocol for Privacy-Preserving Range Queries", in Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings, pp. 108–120.
- S. Cimato, "Visual Cryptography Schemes for Graph Based Access Structures", in Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2013, Beijing, China, October 16-18, 2013, pp. 365–368.
- S. Abbasi, S. Cimato and E. Damiani, "Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol", in Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings, Berlin, Heidelberg: Springer-Verlag, pp. 447–452.
- M. Sepehri, S. Cimato and E. Damiani, "A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test", in Advanced Information Systems Engineering Workshops - CAiSE 2013 International Workshops, Valencia, Spain, June 17-21, 2013. Proceedings, pp. 466–477.
- S. Cimato, E. Damiani and G. Gianini, "Risk assessment of credit securities: The notion and the issues", in Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on, pp. 1-5.
- C. Blundo, S. Cimato, "Constrained Role Mining", in Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, pp. 289–304.
- R. Tchokpon, S. Cimato and N. Bennani, "Ensuring XML Integrity Using Watermarking Techniques", in Eighth International Conference on Signal Image Technology and Internet Based Systems, SITIS 2012, Sorrento, Naples, Italy, November 25-29, 2012, pp. 668–674.
- S. Cimato, C. Yang and C. Wu, "Visual Cryptography Based Watermarking: Definition and Meaning", in Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers, pp. 435–448.
- M. A. Hadavi, E. Damiani, R. Jalili, S. Cimato, Z. Ganjei, "AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing", in Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers, pp. 201–216.
- C. Blundo, S. Cimato, "A simple role mining algorithm", in Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1958–1962.
- F. Benali, N. Bennani, G. Gianini, S. Cimato, "A Distributed and Privacy-Preserving Method for Network Intrusion Detection", in On the Move to Meaningful Internet Systems, OTM 2010 - Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part II, pp. 861–875.
- M. Anisetti, E. Damiani, F. Frati, S. Cimato, G. Gianini, "Using incentive schemes to alleviate supply chain risks", in MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010, pp. 221–228.
- N. Bennani, E. Damiani and S. Cimato, "Toward Cloud-Based Key Management for Outsourced Databases", in Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, COMPSAC Workshops 2010, Seoul, Korea, 19-23 July 2010, pp. 232–236.
- S. Cimato, E. Damiani and G. Gianini, "Privacy Preserving Risk Assessment of Credit Securities", in Fifth International Conference on Signal-Image Technology & Internet-Based Systems, SITIS 2009, Marrakesh, Morocco, November 29 - December 4, 2009, pp. 506–513.
- C. Blundo, S. Cimato, S. D. C. d. Vimercati, A. D. Santis, S. Foresti, S. Paraboschi, P. Samarati, "Efficient Key Management for Enforcing Access Control in Outsourced Scenarios", in Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 364–375.
- S. Cimato, E. Damiani, F. Frati, G. Gianini, P. Ceravolo, C. Fugazza, S. Marrara, O. Scotti, "Hazards in full-Disclosure supply chain", in 8th Conference on Advanced Information Technologies for Management - AITM 2008, Wroclaw, Poland, 2008, J. Korczak, H. Dudycz, M. Dyczkowski, Eds., Publishing House of the Wrocław University of Economics, pp. -.
- S. Cimato, E. Damiani, G. Gianini, P. Ceravolo, C. Fugazza, S. Marrara, "Risk management and information disclosure in supply chain analysis", in 8th Conference on Advanced Information Technologies for Management - AITM 2008, Wroclaw, Poland, 2008, J. Korczak, H. Dudycz, M. Dyczkowski, Eds., Publishing House of the Wrocław University of Economics, pp. -.
- S. Cimato, "A Lightweight Protocol for Dynamic RFID Identification", in Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 673–678.
- S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti, "A Multi-biometric Verification System for the Privacy Protection of Iris Templates", in Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, CISIS'08, Genova, Italy, October 23-24, 2008, pp. 227–234.
- S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti, "Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System", in Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 130–139.
- S. Cimato, E. Damiani, G. Gianini, P. Ceravolo, "Obfuscation for the common good", in 3rd Conference on Security in Network Architectures and Information Systems, SAR-SSI 2008, Loctudy, France, October 13-17, 2008, pp. 15–36.
- V. Auletta, C. Blundo, S. Cimato, E. De Cristofaro, G. Raimato, "Authenticated Web Services: A WS-Security Based Implementation", in New Technologies, Mobility and Security, H. Labiod, M. Badra, Eds., Springer Netherlands, 2007, pp. 541-553.
- S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti, "A Biometric Verification System Addressing Privacy Concerns", in Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007, pp. 594–598.
- V. Auletta, C. Blundo, S. Cimato, G. Raimato, "A Web Service Based Micro-payment System", in Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 26-29 June 2006, Cagliari, Sardinia, Italy, pp. 328–333.
- S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti, "Personal identification and verification using multimodal biometric data", in Computational Intelligence for Homeland Security and Personal Safety, Proceedings of the 2006 IEEE International Conference on, pp. 41-45.
- C. Blundo, S. Cimato and R. D. Prisco, "A Lightweight Approach to Authenticated Web Caching", in 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January - 4 February 2005, Trento, Italy, pp. 157–163.
- S. Cimato, C. Galdi, R. Giordano, B. Masucci, G. Tomasco, "Design and Implementation of an Inline Certified E-mail Service", in Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 186–199.
- V. Auletta, C. Blundo, S. Cimato, G. Raimato, "A Web Service For Certified Email", in Certification and Security in Inter-Organizational E-Service, E. Nardelli, M. Talamo, Eds., Springer US, 2005, pp. 91-100.
- S. Cimato, R. D. Prisco and A. D. Santis, "Colored Visual Cryptography Without Color Darkening", in Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 235–248.
- C. Blundo, S. Cimato, "A Platform for Secure E-Gambling", in International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 768–772.
- C. Blundo, S. Cimato, "A Framework for Authenticated Web Services", in Web Services, European Conference, ECOWS 2004, Erfurt, Germany, September 27-30, 2004, Proceedings, pp. 61–71.
- S. Cimato, R. De Prisco and A. De Santis, "Contrast optimal colored visual cryptography schemes", in Information Theory Workshop, 2003. Proceedings. 2003 IEEE, pp. 139-142.
- C. Blundo, S. Cimato and R. D. Prisco, "Certified Email: Design and Implementation of a New Optimistic Protocol.", in Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 828–833.
- S. Cimato, P. D'Arco and I. Visconti, "Anonymous Group Communication in Mobile Networks", in Theoretical Computer Science, 8th Italian Conference, ICTCS 2003, Bertinoro, Italy, October 13-15, 2003, Proceedings, pp. 316–328.
- C. Blundo, S. Cimato, "Authenticated metering", in Poster Proceedings of the Eleventh International World Wide Web Conference, WWW 2002, May 7-11, 2002, Honolulu, Hawaii.
- C. Blundo, S. Cimato and A. D. Bonis, "A lightweight protocol for the generation and distribution of secure e-coupons", in Proceedings of the Eleventh International World Wide Web Conference, WWW 2002, May 7-11, 2002, Honolulu, Hawaii, pp. 542–552.
- C. Blundo, S. Cimato, "SAWM: a tool for secure and authenticated web metering", in Proceedings of the 14th international conference on Software engineering and knowledge engineering, SEKE 2002, Ischia, Italy, July 15-19, 2002, pp. 641–648.
- S. Cimato, A. D. Bonis, "Online Advertising: Secure E-coupons", in Theoretical Computer Science, 7th Italian Conference, ICTCS 2001, Torino, Italy, October 4-6, 2001, Proceedings, pp. 370–383.
- S. Cimato, "Design of an Authentication Protocol for Gsm Javacards", in Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 355–368.
- S. Cimato, "Specifying component-based Java applications (Short Paper)", in Formal Methods for Open Object-Based Distributed Systems, IFIF TC6/WG6.1 Third International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS), February 15-18, 1999, Florence, Italy.
- S. Cimato, P. Ciancarini, "A Formal Approach to the Specification of Java Components", in Object-Oriented Technology, ECOOP'99 Workshop Reader, ECOOP'99 Workshops, Panels, and Posters, Lisbon, Portugal, June 14-18, 1999, Proceedings, pp. 107–108.
- P. Ciancarini, S. Cimato, "Specifying component-based software architectures", in 1st Workshop on Foundations of Component-Based Systems, in conjunction with 6th European Software Engineering Conference together with 5th ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 97), Zurich, Switxerlan, September 22-25, 1997, pp. 60–70.
- P. Ciancarini, S. Cimato and C. Mascolo, "Engineering Formal Requirements: Analysis and Testing", in The 8th International Conference on Software Engineering and Knowledge Engineering, SEKE '96, Lake Tahoe, Nevada, USA, June 10-12, 1996, pp. 385–392.
- P. Ciancarini, S. Cimato, "Animating a Non-executable Formal Specification with a Distributed Symbolic Language", in Design and Implementation of Symbolic Computation Systems, International Symposium, DISCO '96, Karlsruhe, Germany, September 18-20, 1996, Proceedings, pp. 200–201.
- S. Cimato, C. Mascolo, "Analyzing and Animating Declarative Specifications", in 1996 Joint Conf. on Declarative Programming, APPIA-GULP-PRODE'96, Donostia-San Sebastian, Spain, July 15-18, 1996, pp. 295–308.
Other Publications
- E. Damiani, P. J. Houngbo, R. Asal, S. Cimato, F. Frati, J. T. Hounsou, D. Shehada, C. Y. Yeun, "Pay-with-a-Selfie, a human-centred digital payment system", 2017.
- C. Blundo, S. Cimato, "Constrained Role Mining", 2012.
- S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti, "European patent no. WO2007113888: Method for generating and verifying security information obtained by means of biometric readings", 2007.
- S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti, "Italian Patent no. MI2006A000641: Metodo di generazione e di verifica di una informazione di sicurezza ottenuta mediante letture biometriche", 2006.
- C. Blundo, S. Cimato and A. De Santis, "Visual Cryptography Schemes with Optimal Pixel Expansion", Rep. 170, 2006.
- P. Ciancarini, S. Cimato and C. Mascolo, "Engineering Formal Requirements: an Analysis and Testing Method for Z Documents", 1996.
|