puting, 2004. Proceedings. ITCC 2004. International
Conference on, volume 1, pages 12–16. IEEE.
Berta, I. Z. and Vajda, I. (2003). Documents from malicious
terminals. In Microtechnologies for the New Millen-
nium 2003, pages 325–336. International Society for
Optics and Photonics.
Buccafurri, F., Fotia, L., and Lax, G. (2014a). Social signa-
ture: Signing by tweeting. In Electronic Government
and the Information Systems Perspective, pages 1–14.
Springer.
Buccafurri, F., Lax, G., Nicolazzo, S., and Nocera, A.
(2014b). A Privacy-Preserving Solution for Tracking
People in Critical Environments. In Proc. of the In-
ternational Workshop on Computers, Software & Ap-
plications (COMPSAC’14), pages 146–151, V ¨aster˙as,
Sweden. IEEE Computer Society.
Buccafurri, F., Lax, G., Nicolazzo, S., and Nocera, A.
(2014c). A model to support multi-social-network
applications. In On the Move to Meaningful Inter-
net Systems: OTM 2014 Conferences, pages 639–656.
Springer.
Buccafurri, F., Lax, G., Nicolazzo, S., and Nocera, A.
(2015). Accountability-preserving anonymous deliv-
ery of cloud services. In Trust, Privacy and Security
in Digital Business, pages 124–135. Springer.
Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A., and
Ursino, D. (2013). Measuring betweenness centrality
in social internetworking scenarios. In On the Move to
Meaningful Internet Systems: OTM 2013 Workshops,
pages 666–673. Springer.
Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A., and
Ursino, D. (2014d). Driving global team formation
in social networks to obtain diversity. In Web Engi-
neering, pages 410–419. Springer.
Carter, J. L. and Wegman, M. N. (1977). Universal classes
of hash functions. In Proceedings of the ninth annual
ACM symposium on Theory of computing, pages 106–
112. ACM.
Chaum, D. and Roijakkers, S. (1991). Unconditionally-
secure digital signatures. In Advances in Cryptology-
CRYPT090, pages 206–214. Springer.
Chor, B., Goldwasser, S., Micali, S., and Awerbuch, B.
(1985). Verifiable secret sharing and achieving simul-
taneity in the presence of faults. In Foundations of
Computer Science, 1985., 26th Annual Symposium on,
pages 383–395. IEEE.
Clarke, D., Gassend, B., Kotwal, T., Burnside, M.,
Van Dijk, M., Devadas, S., and Rivest, R. (2002).
The untrusted computer problem and camera-based
authentication. In Pervasive Computing, pages 114–
124. Springer.
Gilbert, E. N., MacWilliams, F. J., and Sloane, N. J. (1974).
Codes which detect deception. Bell System Technical
Journal, 53(3):405–424.
He, D., Chan, S.-C., Zhang, Y., Guizani, M., Chen, C.,
and Bu, J. (2014). An enhanced public key infras-
tructure to secure smart grid wireless communication
networks. Network, IEEE, 28(1):10–16.
Kim, D., Jeon, Y., and Kim, J. (2014). A secure channel
establishment method on a hardware security module.
In Information and Communication Technology Con-
vergence (ICTC), 2014 International Conference on,
pages 555–556. IEEE.
Ko´scielny, C., Kurkowski, M., and Srebrny, M. (2013).
Public key infrastructure. In Modern Cryptography
Primer, pages 175–191. Springer.
Lax, G., Buccafurri, F., and Caminiti, G. (2015). Digi-
tal document signing: Vulnerabilities and solutions.
Information Security Journal: A Global Perspective,
pages 1–14.
Lee, B. and Kim, K. (2002). Fair exchange of digital sig-
natures using conditional signature. In Symposium on
Cryptography and Information Security, pages 179–
184.
Matsumoto, T. (1998). Human–computer cryptography: An
attempt. Journal of Computer Security, 6(3):129–149.
Mavrovouniotis, S. and Ganley, M. (2014). Hardware se-
curity modules. In Secure Smart Embedded Devices,
Platforms and Applications, pages 383–405. Springer.
Naor, M. and Pinkas, B. (1997). Visual authentica-
tion and identification. In Advances in Cryptology-
CRYPTO’97, pages 322–336. Springer.
Naor, M. and Shamir, A. (1995). Visual cryptography.
In Advances in CryptologyEUROCRYPT’94, pages 1–
12. Springer.
Nocera, A. and Ursino, D. (2012). PHIS: a system for scout-
ing potential hubs and for favoring their “growth” in
a Social Internetworking Scenario. Knowledge-Based
Systems, 36:288–299. Elsevier.
Rabin, T. (1994). Robust sharing of secrets when the dealer
is honest or cheating. Journal of the ACM (JACM),
41(6):1089–1109.
Rabin, T. and Ben-Or, M. (1989). Verifiable secret sharing
and multiparty protocols with honest majority. In Pro-
ceedings of the twenty-first annual ACM symposium
on Theory of computing, pages 73–85. ACM.
Shaji, S. et al. (2014). Anti phishing approach using visual
cryptography and iris recognition. IJRCCT, 3(3):088–
092.
Sharma, A. and Srivastava, D. K. (2014). A comprehen-
sive view on encryption techniques of visual cryptog-
raphy? International Journal of Recent Research and
Review, 7(2).
Simmons, G. J. (1985). Authentication theory/coding the-
ory. In Advances in Cryptology, pages 411–431.
Springer.
Sustek, L. (2011). Hardware security module. In Encyclo-
pedia of Cryptography and Security, pages 535–538.
Springer.