Search Results - "De Prisco, Roberto"
-
1
Improved Protocols for Distributed Secret Sharing
Published in IEEE transactions on dependable and secure computing (01-09-2023)“…In Distributed Secret Sharing schemes, secrets are encoded with shares distributed over multiple nodes of a network. Each involved party has access to a subset…”
Get full text
Journal Article -
2
Induced Emotion-Based Music Recommendation through Reinforcement Learning
Published in Applied sciences (01-11-2022)“…Music is widely used for mood and emotion regulation in our daily life. As a result, many research works on music information retrieval and affective…”
Get full text
Journal Article -
3
The Conundrum of Success in Music: Playing it or Talking About it?
Published in IEEE access (2019)“…Nowadays social media are the main means for conducting discussions and sharing opinions. The huge amount of information generated by social media users is…”
Get full text
Journal Article -
4
Optimal Colored Threshold Visual Cryptography Schemes
Published in Designs, codes, and cryptography (01-06-2005)Get full text
Journal Article -
5
Revisiting the paxos algorithm
Published in Theoretical computer science (28-07-2000)“…The paxos algorithm is an efficient and highly fault-tolerant algorithm, devised by Lamport, for reaching consensus in a distributed system. Although it…”
Get full text
Journal Article -
6
Creative DNA computing: splicing systems for music composition
Published in Soft computing (Berlin, Germany) (01-09-2022)“…Splicing systems are a form of DNA computing as they mimic the recombination process among DNA molecules. This work discusses the use of splicing systems to…”
Get full text
Journal Article -
7
Bounds and Algorithms for Alphabetic Codes and Binary Search Trees
Published in IEEE transactions on information theory (01-10-2024)“…Alphabetic codes and binary search trees are combinatorial structures that abstract search procedures in ordered sets endowed with probability distributions…”
Get full text
Journal Article -
8
Constructions and lower bounds for evolving 2-threshold secret sharing schemes
Published in IEEE transactions on communications (06-11-2024)“…In this paper we consider evolving 2-threshold secret sharing schemes. In such schemes, the number of participants grows over time and is potentially…”
Get full text
Journal Article -
9
Secure computation without computers
Published in Theoretical computer science (25-10-2016)“…The design of secure protocols which can be used without the aid of a computer and without cryptographic knowledge is an interesting and challenging research…”
Get full text
Journal Article -
10
On the Relation of Random Grid and Deterministic Visual Cryptography
Published in IEEE transactions on information forensics and security (01-04-2014)“…Visual cryptography is a special type of secret sharing. Two models of visual cryptography have been independently studied: 1) deterministic visual…”
Get full text
Journal Article -
11
An adaptive meta-heuristic for music plagiarism detection based on text similarity and clustering
Published in Data mining and knowledge discovery (01-07-2022)“…Plagiarism is a controversial and debated topic in different fields, especially in the Music one, where the commercial market generates a huge amount of money…”
Get full text
Journal Article -
12
Providing music service in Ambient Intelligence: experiments with gym users
Published in Expert systems with applications (01-09-2021)“…•Definition of a novel AmI system for gym environments, named Gym Intelligence.•The system provides adequate music according to the users’ physical effort.•The…”
Get full text
Journal Article -
13
Bounds and Protocols for Graph-Based Distributed Secret Sharing
Published in IEEE transactions on dependable and secure computing (01-01-2024)“…Distributed Secret Sharing is a (multi) secret sharing model in which the shares are distributed over storage nodes of a network and each participant is able…”
Get full text
Journal Article -
14
Secret sharing schemes for infinite sets of participants: A new design technique
Published in Theoretical computer science (06-03-2021)“…We propose a new design technique for constructing secret sharing schemes over a potentially infinite set of participants. Our findings leverage on a nice…”
Get full text
Journal Article -
15
Efficient and reliable post-quantum authentication
Published in Theoretical computer science (01-07-2024)“…In this paper we propose a new lightweight authentication protocol which is efficient, reliable and, properly instantiated, suitable for the post-quantum…”
Get full text
Journal Article -
16
An improved privacy attack on smartphones exploiting the accelerometer
Published in Journal of information security and applications (01-06-2023)“…We define and implement a novel side-channel attack that exploits a smartphone’s accelerometer to eavesdrop entire words that the device itself is reproducing…”
Get full text
Journal Article -
17
Color visual cryptography schemes for black and white secret images
Published in Theoretical computer science (28-10-2013)“…In this paper we propose the use of colors to improve visual cryptography schemes for black-and-white secret images. The resulting model is called…”
Get full text
Journal Article -
18
Splicing music composition
Published in Information sciences (01-04-2017)“…Splicing systems were introduced by Tom Head (1987) as a formal model of a recombination process between DNA molecules. The existing literature on splicing…”
Get full text
Journal Article -
19
Visual Music Perception for Stochastic Music Composition
Published in 2024 28th International Conference Information Visualisation (IV) (22-07-2024)“…The design of digital musical instruments is based on the perceptions, especially visual, that they can generate in users during their use. Given the…”
Get full text
Conference Proceeding -
20
Understanding the structure of musical compositions: Is visualization an effective approach?
Published in Information visualization (01-04-2017)“…Experienced musicians have the ability to understand the structural elements of music compositions. Such an ability is built over time through the study of…”
Get full text
Journal Article