Hyperledger fabric: a distributed operating system for permissioned blockchains E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ... Proceedings of the thirteenth EuroSys conference, 1-15, 2018 | 2917 | 2018 |
A secure data deduplication scheme for cloud storage J Stanek, A Sorniotti, E Androulaki, L Kencl International conference on financial cryptography and data security, 99-118, 2014 | 283 | 2014 |
Boosting efficiency and security in proof of ownership for deduplication R Di Pietro, A Sorniotti Proceedings of the 7th ACM symposium on information, computer and …, 2012 | 274 | 2012 |
SMoTherSpectre: exploiting speculative execution through port contention A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 131 | 2019 |
System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger E Androulaki, A DeCaro, T Kramp, A Sorniotti, M Vukolic US Patent 9,992,028, 2018 | 102 | 2018 |
Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric M Brandenburger, C Cachin, R Kapitza, A Sorniotti arXiv preprint arXiv:1805.08541, 2018 | 89 | 2018 |
An authentication flaw in browser-based single sign-on protocols: Impact and remediations A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti Computers & Security 33, 41-58, 2013 | 87 | 2013 |
Secure isolation of tenant resources in a multi-tenant storage system using a security gateway ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ... US Patent 9,411,973, 2016 | 85 | 2016 |
Policy-based secure deletion C Cachin, K Haralambiev, HC Hsiao, A Sorniotti Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 79 | 2013 |
Robust data sharing with key-value stores C Băsescu, C Cachin, I Eyal, R Haas, A Sorniotti, M Vukolić, I Zachevsky IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012 | 76 | 2012 |
A tunable proof of ownership scheme for deduplication using bloom filters J Blasco, R Di Pietro, A Orfila, A Sorniotti 2014 IEEE Conference on Communications and Network Security, 481-489, 2014 | 64 | 2014 |
Secure and trusted in-network data processing in wireless sensor networks: a survey A Sorniotti, L Gomez, K Wrona, L Odorico Journal of Information Assurance and Security 2 (3), 189-199, 2007 | 63 | 2007 |
Secure logical isolation for multi-tenancy in cloud storage M Factor, D Hadas, A Harnama, N Har'El, EK Kolodner, A Kurmus, ... 2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST), 1-5, 2013 | 46 | 2013 |
RFID-based supply chain partner authentication and key agreement F Kerschbaum, A Sorniotti Proceedings of the second ACM conference on Wireless network security, 41-50, 2009 | 46 | 2009 |
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs A Kurmus, A Sorniotti, R Kapitza Proceedings of the Fourth European Workshop on System Security, 1-6, 2011 | 45 | 2011 |
From multiple credentials to browser-based single sign-on: Are we more secure? A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti IFIP International Information Security Conference, 68-79, 2011 | 43 | 2011 |
Resisting replay attacks efficiently in a permissioned and privacy-preserving blockchain network E Androulaki, A De Caro, T Kramp, DW Kravitz, A Sorniotti, M Vukolic US Patent 10,230,756, 2019 | 39 | 2019 |
Proof of ownership for deduplication systems: a secure, scalable, and efficient solution R Di Pietro, A Sorniotti Computer Communications 82, 71-82, 2016 | 37 | 2016 |
Shared data encryption and confidentiality E Androulaki, N Baracaldo, JS Glider, A Sorniotti US Patent 9,397,832, 2016 | 36 | 2016 |
Secure isolation of tenant resources in a multi-tenant storage system using a gatekeeper ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ... US Patent App. 13/875,300, 2014 | 36 | 2014 |