#### Filter Results:

- Full text PDF available (22)

#### Publication Year

2003

2015

- This year (0)
- Last 5 years (5)
- Last 10 years (15)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Jad Naous, Michael Walfish, Antonio Nicolosi, David MaziÃ¨res, Michael Miller, Arun Seehra
- CoNEXT
- 2011

We describe a new networking primitive, called a Path Verification Mechanism (pvm). There has been much recent work about how senders and receivers <i>express</i> policies about the paths that theirâ€¦ (More)

- Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup
- EUROCRYPT
- 2004

We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove membershipâ€¦ (More)

- Ivan DamgÃ¥rd, Nelly Fazio, Antonio Nicolosi
- TCC
- 2006

We propose a method for compiling a class of Î£-protocols (3-move public-coin protocols) into non-interactive zero-knowledge arguments. The method is based on homomorphic encryption and does not useâ€¦ (More)

We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesâ€”the client and the serverâ€”jointly to produceâ€¦ (More)

- Tom Anderson, Kenneth P. Birman, +17 authors Christopher S. Yoo
- Future Internet Assembly
- 2013

The NEBULA Future Internet Architecture (FIA) project is focused on a future network that enables the vision of cloud computing [8,12] to be realized. With computation and storage moving to dataâ€¦ (More)

- Daniele Micciancio, Antonio Nicolosi
- 2008 IEEE International Symposium on Informationâ€¦
- 2008

We describe a new family of parallelizable bounded distance decoding algorithms for the Barnes-Wall lattices, and analyze their decoding complexity. The algorithms are parameterized by the number p =â€¦ (More)

Currently, the only way to disseminate streaming media to many users is to pay for lots of bandwidth. A more democratic alternative would be for interested users to donate bandwidth to helpâ€¦ (More)

- Arun Seehra, Jad Naous, Michael Walfish, David MaziÃ¨res, Antonio Nicolosi, Scott Shenker
- HotNets
- 2009

This paper is about the Internetâ€™s future, but we begin with its past. The history of network routing began as a topological problem: how does one find the shortest paths in a graph ([11])? However,â€¦ (More)

After their first appearance in the cryptographic community ten years ago, cryptographic accumulators have received a discontinuous attention from the researchers of the field. Although occasionallyâ€¦ (More)

- Antonio Nicolosi, David MaziÃ¨res
- IPTPS
- 2004

We propose a new cryptographic technique, Acknowledgment Compression, permitting senders of multicast data to verify that all interested parties have either received the data or lost networkâ€¦ (More)