Segui
Valentina Ciriani
Valentina Ciriani
Associate Professor, Dipartimento di Informatica, Università degli Studi di Milano
Email verificata su unimi.it - Home page
Titolo
Citata da
Citata da
Anno
Combining fragmentation and encryption to protect privacy in data storage
V Ciriani, SDCD Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-33, 2010
2772010
κ-anonymity
V Ciriani, SDC di Vimercati, S Foresti, P Samarati
Secure Data Management in Decentralized Systems, 323-353, 2007
2562007
Keep a few: Outsourcing data while maintaining confidentiality
V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ...
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
1332009
Microdata protection
V Ciriani, S De Capitani di Vimercati, S Foresti, P Samarati
Secure data management in decentralized systems, 291-321, 2007
1312007
Fragmentation and encryption to enforce privacy in data storage
V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ...
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
1282007
k-Anonymous Data Mining: A Survey
V Ciriani, SDC Di Vimercati, S Foresti, P Samarati
Privacy-Preserving Data Mining: Models and Algorithms, 105-136, 2008
1072008
Fragmentation design for efficient query execution over sensitive distributed databases
V Ciriani, SDC di Vimercati, S Foresti, S Jajodia, S Paraboschi, ...
2009 29th IEEE International Conference on Distributed Computing Systems, 32-39, 2009
682009
Synthesis of SPP three-level logic networks using affine spaces
V Ciriani
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2003
482003
Selective data outsourcing for enforcing privacy
V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ...
Journal of Computer Security 19 (3), 531-566, 2011
402011
Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients
V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ...
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009
402009
On decomposing Boolean functions via extended cofactoring
A Bernasconi, V Ciriani, G Trucco, T Villa
2009 Design, Automation & Test in Europe Conference & Exhibition, 1464-1469, 2009
392009
Three-level logic minimization based on function regularities
A Bernasconi, V Ciriani, F Luccio, L Pagli
IEEE Transactions on computer-aided design of integrated circuits and …, 2003
362003
Logic minimization and testability of 2-SPP networks
A Bernasconi, V Ciriani, R Drechsler, T Villa
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2008
332008
Logic minimization using exclusive OR gates
V Ciriani
Proceedings of the 38th annual Design Automation Conference, 115-120, 2001
262001
Theory of privacy and anonymity
V Ciriani, SDC Di Vimercati, S Foresti, P Samarati
Algorithms and theory of computation handbook, 2009
252009
Room allocation: a polynomial subcase of the quadratic assignment problem
V Ciriani, N Pisanti, A Bernasconi
Discrete Applied Mathematics 144 (3), 263-269, 2004
212004
Logic synthesis and testing techniques for switching nano-crossbar arrays
D Alexandrescu, M Altun, L Anghel, A Bernasconi, V Ciriani, L Frontini, ...
Microprocessors and Microsystems 54, 14-25, 2017
202017
Synthesis on switching lattices of dimension-reducible boolean functions
A Bernasconi, V Ciriani, L Frontini, G Trucco
2016 IFIP/IEEE International Conference on Very Large Scale Integration …, 2016
202016
Logic synthesis for switching lattices by decomposition with p-circuits
A Bernasconi, V Ciriani, L Frontini, V Liberali, G Trucco, T Villa
2016 Euromicro Conference on Digital System Design (DSD), 423-430, 2016
202016
An OBDD approach to enforce confidentiality and visibility constraints in data publishing
V Ciriani, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati
Journal of Computer Security 20 (5), 463-508, 2012
202012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20