Roberto Tamassia
Affiliations: | Computer Science | Brown University, Providence, RI |
Area:
Algorithms and Theory, Security and CryptographyGoogle:
"Roberto Tamassia"Parents
Sign in to add mentorFranco P. Preparata | grad student | 1988 | UIUC | |
(Dynamic Data Structures for Two-Dimensional Searching) |
Children
Sign in to add traineeStina S. Bridgeman | grad student | 2002 | Brown |
Nikolaos Triandopoulos | grad student | 2007 | Brown |
Danfeng Yao | grad student | 2008 | Brown |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Avci B, Trajcevski G, Tamassia R, et al. (2017) Efficient detection of motion-trend predicates in wireless sensor networks Computer Communications. 101: 26-43 |
Papamanthou C, Tamassia R, Triandopoulos N. (2016) Authenticated Hash Tables Based on Cryptographic Accumulators Algorithmica. 74: 664-712 |
Juels A, Kelley J, Tamassia R, et al. (2015) Falcon codes: Fast, authenticated LT codes (Or: Making rapid tornadoes unstoppable) Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1032-1047 |
Erway CC, Küpç;ü A, Papamanthou C, et al. (2015) Dynamic provable data possession Acm Transactions On Information and System Security. 17 |
Goodrich MT, Ohrimenko O, Tamassia R. (2013) Graph drawing in the cloud: Privately visualizing relational data using small working storage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7704: 43-54 |
Kelley J, Tamassia R, Triandopoulos N. (2012) Hardening access control and data protection in GFS-like file systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 19-36 |
Goodrich MT, Nguyen D, Ohrimenko O, et al. (2012) Efficient verification of webcontent searching through authenticated web crawlers Proceedings of the Vldb Endowment. 5: 920-931 |
Goodrich MT, Tamassia R, Triandopoulos N. (2011) Efficient authenticated data structures for graph connectivity and geometric search problems Algorithmica (New York). 60: 505-552 |
Papamanthou C, Tamassia R, Triandopoulos N. (2011) Optimal verification of operations on dynamic sets Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6841: 91-110 |
Lysyanskaya A, Tamassia R, Triandopoulos N. (2010) Authenticated error-correcting codes with applications to multicast authentication Acm Transactions On Information and System Security. 13 |