Giuseppe Ateniese
Scholar

Giuseppe Ateniese

Google Scholar ID: EyZJ08MAAAAJ
George Mason University
Cloud SecurityCybersecurityApplied Cryptography
Citations & Impact
All-time
Citations
10,207
 
H-index
40
 
i10-index
81
 
Publications
20
 
Co-authors
52
list available
Resume (English only)
Academic Achievements
  • NSF CAREER Award for research in privacy and security
  • Google Faculty Research Award
  • IBM Faculty Award
  • IEEE CISTC Technical Recognition Award for cloud security research
  • Pioneering contributions to proxy re-cryptography, anonymous communication, two-party computation, secure storage, and provable data possession
  • Widely recognized in media for work on editable blockchains and AI-powered password cracking
Research Experience
  • Professor and Eminent Scholar in Cybersecurity, George Mason University
  • Farber Endowed Chair and Department Chair, Stevens Institute of Technology
  • Assistant/Associate Professor and co-founder of the Information Security Institute, Johns Hopkins University
  • Researcher, IBM Zurich Research Lab
  • Scientist, Information Sciences Institute, University of Southern California
  • Visiting Professor, Microsoft, Redmond
Background
  • Professor, Eminent Scholar in Cybersecurity and CCI Faculty Fellow in the Department of Computer Science and the Department of Cyber Security Engineering at George Mason University.
  • Former Farber Endowed Chair in Computer Science and Department Chair at Stevens Institute of Technology.
  • Previously affiliated with Sapienza University of Rome (Italy), Assistant/Associate Professor at Johns Hopkins University (USA), and co-founder of the JHU Information Security Institute.
  • Former researcher at IBM Zurich Research Lab (Switzerland) and scientist at the Information Sciences Institute of the University of Southern California (USA); also served briefly as a visiting professor at Microsoft in Redmond (USA).
  • Current research focuses on privacy-preserving machine learning and decentralized secure computing based on blockchain technology.
  • Contributions span proxy re-cryptography, anonymous communication, two-party computation, secure storage, and provable data possession.