Squicciarini, Anna Cinzia
132  results:
Search for persons X
?
2

Multi-party Access Control - 10 Years of Successes and Less..:

, In: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies,
Squicciarini, Anna Cinzia - p. 189-190 , 2020
 
?
3

Backdoor Embedding in Convolutional Neural Network Models v..:

, In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy,
 
?
4

Location Privacy Protection in Vehicle-Based Spatial Crowds..:

, In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS),
Qiu, Chenxi ; Squicciarini, Anna Cinzia - p. 1061-1071 , 2019
 
?
6

Towards Privacy-Preserving and Practical Image-Centric Soci..:

Yuan, Xingliang ; Wang, Xinyu ; Wang, Cong..
IEEE Transactions on Dependable and Secure Computing.  15 (2018)  5 - p. 868-882 , 2018
 
?
7

Session details: Mobile Security:

, In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy,
 
?
8

Multi-Party Access Control : Requirements, State of the ..:

, In: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies,
 
?
9

Towards Privacy-Preserving Storage and Retrieval in Multipl..:

Li, Jingwei ; Lin, Dan ; Squicciarini, Anna Cinzia..
IEEE Transactions on Cloud Computing.  5 (2017)  3 - p. 499-509 , 2017
 
?
10

Dynamic Contract Design for Heterogenous Workers in Crowdso..:

, In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS),
 
?
11

MMB$^{cloud}$ -Tree: Authenticated Index for Verifiable Clo..:

Li, Jingwei ; Squicciarini, Anna Cinzia ; Lin, Dan..
IEEE Transactions on Dependable and Secure Computing.  14 (2017)  2 - p. 185-198 , 2017
 
?
12

Toward De-Anonymizing Bitcoin by Mapping Users Location:

, In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy,
 
?
13

Privacy Policy Inference of User-Uploaded Images on Content..:

Squicciarini, Anna Cinzia ; Lin, Dan ; Sundareswaran, Smitha.
IEEE Transactions on Knowledge and Data Engineering.  27 (2015)  1 - p. 193-206 , 2015
 
?
14

Privacy and Access Control : How are These Two concepts ..:

, In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies,
Squicciarini, Anna Cinzia ; Yu, Ting - p. 197-198 , 2015
 
?
15

In the wild : a large scale study of web services vulner..:

, In: Proceedings of the 29th Annual ACM Symposium on Applied Computing,
 
1-15