Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Cimato, Stelvio
add a person with the name Cimato, Stelvio
 

Other publications of authors with the same name

Security and searchability in secret sharing-based data outsourcing., , , and . Int. J. Inf. Sec., 14 (6): 513-529 (2015)Visual Cryptography Based Watermarking., , and . Trans. Data Hiding Multim. Secur., (2014)Visual Cryptography Based Watermarking: Definition and Meaning., , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 435-448. Springer, (2012)A Formal Approach to the Specification of Java Components., and . ECOOP Workshops, volume 1743 of Lecture Notes in Computer Science, page 107-108. Springer, (1999)Introduction to the special issue on deep learning for real-time information hiding and forensics., , , and . J. Real-Time Image Processing, 17 (1): 1-5 (2020)A Software Infrastructure for Authenticated Web Metering., and . Computer, 37 (4): 28-33 (2004)Overcoming the obfuscation of Java programs by identifier renaming., , and . J. Syst. Softw., 78 (1): 60-72 (2005)Online Advertising: Secure E-coupons., and . ICTCS, volume 2202 of Lecture Notes in Computer Science, page 370-383. Springer, (2001)Anonymous Group Communication in Mobile Networks., , and . ICTCS, volume 2841 of Lecture Notes in Computer Science, page 316-328. Springer, (2003)Animating a Non-executable Formal Specification with a Distributed Symbolic Language., and . DISCO, volume 1128 of Lecture Notes in Computer Science, page 200-201. Springer, (1996)