Emanuele Cesena
Cited by
Cited by
Anonymous authentication with TLS and DAA
E Cesena, H Löhr, G Ramunno, AR Sadeghi, D Vernizzi
International Conference on Trust and Trustworthy Computing, 47-62, 2010
On scalability of remote attestation
E Cesena, G Ramunno, R Sassu, D Vernizzi, A Lioy
Proceedings of the sixth ACM workshop on Scalable trusted computing, 25-30, 2011
Secure storage using a sealing proxy
E Cesena, G Ramunno, D Vernizzi
Proceedings of the 1st European workshop on system security, 27-34, 2008
Trace zero varieties over fields of characteristic 2 for cryptographic applications
RM Avanzi, E Cesena
Algebraic Geometry And Its Applications: Dedicated to Gilles Lachaud on His …, 2008
Trace zero varietes in pairing-based cryptography
E Cesena
Università degli studi Roma Tre, 2010
Quantum programming made easy
L Paolini, L Roversi, M Zorzi
arXiv preprint arXiv:1711.00774, 2017
Pairing with Supersingular Trace Zero Varieties Revisited.
E Cesena
IACR Cryptol. ePrint Arch. 2008, 404, 2008
The trusted platform agent
G Cabiddu, E Cesena, R Sassu, D Vernizzi, G Ramunno, A Lioy
IEEE software 28 (2), 35-41, 2010
A unified ontology for the virtualization domain
J Silvestro, D Canavese, E Cesena, P Smiraglia
OTM Confederated International Conferences" On the Move to Meaningful …, 2011
Typing a core binary-field arithmetic in a light logic
E Cesena, M Pedicini, L Roversi
International Workshop on Foundational and Practical Aspects of Resource …, 2011
Towards trusted broadcast encryption
E Cesena, G Ramunno, D Vernizzi
2008 The 9th International Conference for Young Computer Scientists, 2125-2130, 2008
Varietaa traccia zero su campi binari–applicazioni crittografiche
E Cesena
Master’s thesis, Universita degli Studi di Milano, 2004
Can a light typing discipline be compatible with an efficient implementation of finite fields inversion?
D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi
International Workshop on Foundational and Practical Aspects of Resource …, 2013
Light combinators for finite fields arithmetic
D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi
Science of Computer Programming 111, 365-394, 2015
Slides for teaching: the slim approach
E Cesena, D Vernizzi
Crittografia al liceo: approfondire le classi di resto modulo n
OG Rizzo, E Cesena
Didamatica, 2011
Anonymous services: Enhancing end-user privacy exploiting anonymous networks
G Cabiddu, E Cesena, D Vernizzi
2010 International Conference on Security and Cryptography (SECRYPT), 1-5, 2010
Toward a Formal Framework to Evaluate Wireless Sensor Network Security
S Lindskog, S Fischer Hübner, L Martucci, A Abou El Kalam, A Atzeni, ...
NEWCOM++/ACoRN Joint Workshop Barcelona, March 30-April 1, 2009, 2009
G Cabiddu, E Cesena, D Vernizzi
Adams, M., AHM ter Hofstede, and M. La Rosa," Open Source Software for Workflo w
M Ardis, T Arts, M Atallah, J Aussel, D Avery, P Avgeriou, CP Ayala, ...
The system can't perform the operation now. Try again later.
Articles 1–20