Cryptographically Enforced RBAC,
26th IEEE Computer Security Foundations Symposium - CSF 2013,
to appear,
with B. Warinschi, and G. Fuchsbauer.

A Note on Time-Bound Hierarchical Key Assignment Schemes,
Information Processing Letters, to appear,
DOI: 10.1016/j.ipl.2013.01.006,
with G. Ateniese, A. De Santis and B. Masucci.

Policy Analysis for Self-Administrated Role-Based Access Control,
19th Int'l Conference on Tools and Algorithms for the Construction and Analysis of Systems - TACAS 2013,
Rome, Italy, 2013,
with P. Madhusudan, and G. Parlato.

Security Analysis of Access Control Policies through Program Verification,
25th IEEE Computer Security Foundations Symposium - CSF 2012,
Harvard University, Cambridge MA, USA, 2012,
with P. Madhusudan, and G. Parlato.

Analyzing Temporal Role Based Access Control Models,
17th ACM Symposium on Access Control Models and Technologies - SACMAT 2012,
Newark, USA, 2012,
with V. Atluri, P. Madhusudan, S. Sural, G. Parlato, E. Uzun, and J. Vaidya.

Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
Journal of Cryptology, vol. 25(2), pp. 243-270, 2012,
with G. Ateniese, A. De Santis, and B. Masucci.

Efficient Provably-Secure Hierarchical Key Assignment Schemes,
Theorethical Computer Science, vol. 412(41), pp. 5684-5699, 2011,
with A. De Santis and B. Masucci.

Variations on a Theme by Akl and Taylor: Security and Tradeoffs,
Theorethical Computer Science, vol. 411, pp. 213-227, 2010,
with P. D'Arco, A. De Santis, and B. Masucci.
(TCS2010)

Security and Tradeoffs of the Akl-Taylor Scheme and its Variants,
in Proc. of the 34th International Symposium on Mathematical Foundations of Computer Science - MFCS 2009,
Novy Smokovec, High Tatras, Slovak Republic, August 24 - 28, 2009, R. Kralovic and D. Niwinski (Eds.),
Lecture Notes in Computer Science, Vol. 5734, pp. 247-257, Springer Verlag, 2009,
with P. D'Arco, A. De Santis, and B. Masucci.
(MFCS09)

Practical Short Signature Batch Verification,
Topics in Cryptology. The Cryptographers' Track at the RSA Conference 2009 - CT-RSA 2009 ,
Marc Fischlin (Ed.), Lecture Notes in Computer Science, vol. 5473, pp. 309--324, Springer Verlag, 2009,
with M. Green, S. Hohenberger, M. O. Pedersen.
(CT-RSA09)

New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
Theoretical Computer Science, Vol. 407, pp. 213--230, November 2008,
with A. De Santis, and B. Masucci.
(TCS08)

An Attack on a Payment Scheme,
Information Sciences, Vol. 178, No. 5, pp. 1418-1421, March 2008,
with A. De Santis, and B. Masucci.
(InfSc08)

Efficient Provably-Secure Hierarchical Key Assignment Schemes,
in Proc. of the 32nd International Symposium on Mathematical Foundations of Computer Science - MFCS 2007,
Cesky Krumlov, Czech Republic,  August 27 - 31, 2007,
L. Kucera and A. Kucera (Eds.), Lecture Notes in Computer Science, Vol. 4708, pp. 371--382, Springer Verlag, 2007,
with A. De Santis, and B. Masucci.
(MFCS07)

New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
in Proc. of the 12th ACM Symposium on Access Control Models and Technologies - SACMAT 2007,
Sophia Antipolis, France, June 20 - 22 2007,
pp. 133--138,
with A. De Santis, and B. Masucci.
(SACMAT07)

Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
in Proc. of the 14th ACM Conference on Computer and Communications Security - CCS 2006,
Alexandria, Virginia, USA, November 2006,
with G. Ateniese, A. De Santis, and B. Masucci.
(CCS06)

Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme,
Information Sciences, Vol. 176, No. 12, pp. 1684--1694, June 2006,
with A. De Santis, and B. Masucci.
(InfSc06)

Unconditionally Secure Key Assignment Schemes,
Discrete Applied Mathematics, Vol. 154, No. 2 , pp. 234--252, February 2006,
with A. De Santis, and B. Masucci.
(DAM06)

A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy,
in Proc. of the International Workshop on Coding and Cryptography - WCC 2005,                                                       
Bergen, Norway, March 14 - 18  2005, O. Ytrehus (Ed.),
Lecture Notes in Computer Science, Vol. 3969, pp. 202--217, Springer Verlag, 2006,
with A. De Santis, and B. Masucci.
(WCC05)

Ideal Contrast Visual Cryptography Schemes with Reversing,
Information Processing Letters, Vol. 93, n. 4, pp. 199-206, February 28, 2005,
with S. Cimato, A. De Santis, and B. Masucci.
(IPL05)

F A Simple Algorithm for the Constrained Sequence Problems,
Information Processing Letters, Vol. 92, n. 4, pp. 199-205, November 30, 2004,
with A. De Santis, and B. Masucci.
(IPL04)

F A Simple Algorithm for the Constrained Sequence Problems,
Information Processing Letters, vol. 90, n. 4, pp. 175-179, May 31, 2004, with Y.L. Chin, A. De Santis, N.L. Ho, and S.K. Kim.
(IPL04b)

Modeling A Certified Email Protocol using I/O Automata,
Electronic Notes in Theoretical Computer Science, vol. 99, 2004, pp. 339-359,
with C. Blundo, S. Cimato and R. De Prisco.
(ENTCS04)

An Information-Theoretic Approach to the Access Control Problem,
in Proc. of The Eighth Italian Conference on Theoretical Computer Science - ICTCS 2003,                                         
University Center Bertinoro, Italy, October 13 - 15, 2003, Lecture Notes in Computer Science,
Vol. 2841, pp. 342--354, Springer Verlag, 2003,
with B. Masucci.
(ICTCS03)

Unconditionally Secure Hierarchical Key Assignment Schemes,
in Proc. of the International Workshop on Coding and Cryptography - WCC 2003,
Veirsalles, France, March 24 - 28, 2003,
with A. De Santis, and B. Masucci.