Andrea Sgarro
 
 

References

BEING UPDATED ! Please be patient.




[1] A fuzzy Hamming distance, Bulletin Math. de la Soc. Sci. Math. de la R.S. de Roumanie, Tome 21 (69), nr. 1-2 (1977) 137-144

[2] Source coding with side information at several decoders, IEEE Transactions on Information Theory, vol. IT-23, n.2 (1977) 179-182

[3] Two-step encoding applied to multi-user communication schemes, (with G. Longo), Alta Frequenza , vol. XLVI, n.11 (1977) 530-534

[4] An informational divergence geometry for stochastic matrices, Calcolo, vol.XV, fasc.I (1978) 41-49

[5] Probability exponents of the classes of certain partitions relative to discrete-parameter stochastic processes, Rend. Ist. di Matem. Univ. Trieste, vol.X, fasc.I-II (1978) 57-65

[6] A new proof for source coding with side information at two decoders, Alta Frequenza, vol.XLVII, n.7 (1978) 594-595

[7] Noiseless block-coding of useful information, Elektronische Informationsverarbeitung und Kybernetik, EIK 15, 5/6 (1979) 309-314

[8] The source coding theorem revisited: a combinatorial approach, (with G. Longo), IEEE Transactions on Information Theory, vol.IT-25, n.5 (1979) 544-548

[9] A recycling of the statistical principle of maximum information, Rend. Ist. di Matem. Univ. di Trieste, vol.XI, fasc. I-II (1979) 1-8

[10] The error exponent for the testing of simple statistical hypotheses, (with G. Longo), Jrnl of Combinatorics, Information & System Sciences, vol.5, n.1 (1980) 58-67

[11] Combinatorial evaluation of error probabilities in source coding and hypothesis testing, (with G. Longo), invited paper, Proceedings of 3rd Czechoslovak-Soviet-Hungarian Seminar on Inform. Th., Liblice, Czechoslovakia, 1980

[12] Universally attainable error exponents for broadcast channels with degraded message sets, (with J. Körner), IEEE Trans. on Inform. Th., vol.IT-26, n.6 (1980) 670-679

[13] The error exponent for the noiseless encoding of finite ergodic Markov sources, (with L. Davisson and G. Longo), IEEE Trans. on Inform. Th., vol.IT-27, n.4, (1981) 431-438

[14] Informational divergence and the dissimilarity of probability distributions, Calcolo, vol. XVIII, fasc. IV (1981) 1-10

[15] Side information for the discrimination of simple hypotheses (with. M.A. Cisek), Rend. Ist. di Mat. Univ. Trieste, vol.XIII (1981) 71-78

[16] Asymmetric broadcast channels, in "Multi-user communication systems" ed. by G. Longo, CISM Courses and Lectures 265, Springer (1981) 233- 241

[17] Pragmatic entropy for finitely additive probabilities, Rend. Ist. di Mat. Univ. Trieste , vol.XV (1983) 89-95

[18] Error probabilities for simple substitution ciphers, IEEE Trans. on Inform. Th., vol. IT-30, n.2 (1983) 190-198

[19] Simple substitution ciphers, in "Secure Digital Communications" ed. by G. Longo, CISM Courses and Lectures 279, Springer (1983) 61-77

[20] Entropy and divergence in information theory and statistics, (with G. Longo; discussion by M. Aitkin), in "Recent developments in the analysis of large-scale data sets", invited paper, Eurostat News, Special Number (1984) 221-231

[21] Equivocations for homophonic ciphers, in "Advances in Cryptology", ed. by Th. Bet, N. Cot, I. Ingemarsson, Eurocrypt 84, Lecture Notes in Computer Science 209, Springer Verlag (1985) 51-61

[22] Exponential-type parameters and substitution ciphers, Prblms of Control and Inform. Th., vol.14, n.5 (1985) 394-403

[23] Equivocations for transposition ciphers, Rivista di matematica per le scienze economiche e sociali, anno VIII, fasc. II (1985) 107-114

[24] Source coding, (with G. Longo), Chapter 2 of "Data Compression and Error Control Techniques" ed. by V. Cappellini, Academic Press, London (1985) 11-32

[25] Cryptographic techniques for the protection of confidential data, invited paper, in "Atti del XXXIII Convegno Internazionale delle Comunicazioni, Ist. Internaz. delle Telecomunicazioni, Genova, IIC Compagnia dei Librai ed. (1985) 177-183

[26] A new approach to rate-distortion theory, (with J. Körner), Rend. Ist. di Mat. Univ. Trieste, vol.XVIII (1986) 177-187

[27] Information-theoretic versus decision-theoretic cryptography, Elektrotechnik und Maschinenbau (now: Elektrotechnik und Informationsverarbeitung), Springer Verlag, Heft 12 (1987) 562-564

[28] Information measures from rate-distortion theories, in "Uncertainty and Intelligent Systems", ed. by B. Bouchon, L. Saitta, R. Yager, Springer Verlag, Lecture Notes in Computer Science 313 (1988) 112-118

[29] A measure of semiequivocation, in "Advances in Cryptology - Eurocrypt 88", ed. by Ch. Günther, Springer Verlag, Lecture Notes in Computer Science 330 (1988) 375-387

[30] Are keys best chosen at random?, Rivista di Matematica pura e applicata, n.4 (1989) 73-77

[31] Three types of perfection in Shannon-theoretic cryptography, in "Sequences. Combinatorics, Compression, Security and Transmission", ed. by R. Capocelli, Springer Verlag (1990) 420-425

[32] Fuzziness measures for fuzzy rectangles, Fuzzy Sets and Systems, n.34 (1990) 39-45

[33] Informational-divergence bounds for authentication codes, in "Advances in Cryptology - Eurocrypt '89", ed. by J.-J. Quisquater and J. Vandewalle, Springer Verlag, Lecture Notes in Computer Science 434 (1990) 93-101

[34] An introduction to the theory of unconditional secrecy and authentication, in "Geometries, Codes and Cryptography", ed. by G. Longo, M. Marchi, A. Sgarro, Springer Verlag, CISM Courses and Lectures 313 (1990) 131-160

[35] Lower bounds for authentication codes with splitting, in "Advances in Cryptology - Eurocrypt '90", ed. by I. B. Damgård, Springer Verlag, Lecture Notes in Computer Science 473 (1991) 283-293

[36] A pragmatic way-out of the maze of uncertainty measures (with G. Longo), in "Uncertainty in Knowledge-Bases" ed. by B. Bouchon- Meunier, R.R. Yager, L.A. Zadeh, Springer Verlag, Lecture Notes in Computer Science 521 (1991) 370-376

[37] Strengthening Simmons' bound on impersonation (with R. Johannesson), IEEE Transactions on Information Theory, vol.IT-37, n.4 (1991) 1182- 1185

[38] A Shannon-theoretic coding theorem in authentication theory, in "Eurocode '90", ed. by G. Cohen, P. Charpin, Springer Verlag, Lecture Notes in Computer Science 514 (1991) 282-291

[39] Joint fractional entropy (with A. Fioretto), in "Eurocode '90", ed. by G. Cohen, P. Charpin, Springer Verlag, Lecture Notes in Computer Science 514 (1991) 292-297

[40] A rate-distortion approach to information measures, Proceedings of IFSA '91 Brussels, vol. "Computer, management and systems science" ed. by R. Lowen and M. Roubens (1991) 248-251

[41] An asymptotic coding theorem for authentication and secrecy, in "Sequences II. Methods in Communication, Security and Computer Science", ed. by R. Capocelli, A. De Sanctis and U. Vaccaro, Springer Verlag (1993) 430-436

[42] An explicit formula for fractional entropy (with A. Fioretto and A. Delmestri), in "Uncertainty in intelligent systems", ed. by B. Bouchon- Meunier, Ll. Valverde and R.R. Yager, Elsevier, (1993) 413-420

[43] Information-theoretic bounds for authentication frauds, Journal of Computer Security, vol.2, No.1 (1993) 53-63

[43 bis] Information-theoretic bounds for authentication frauds, (short version) in "Advances in Cryptology - Eurocrypt '92", ed. by R.A. Rueppel, Springer Verlag, Lecture Notes in Computer Science 658 (1993) 467-471

[44] On the zero-error capacity of multiple access channels (with. A. Fioretto and E. Inglese), Eurocode '92, ed. by P. Camion, P. Charpin and S. Harari, Springer Verlag, CISM Courses and Lectures No.339 (1993) 323-328

[45] An asymptotic theorem for substitution-resistant authentication codes (with S. Maset), Eurocode '92, ed. by P. Camion, P. Charpin and S. Harari, Springer Verlag, CISM Courses and Lectures No.339 (1993) 201-206

[46] Two equality criteria for fractional entropy (with A. Fioretto), in "Mathematical linguistics and related topics", ed. by Gh. Paun, Editura Academiei Romane, Bucuresti (1995) 119-126

[47] Tunstall adaptive coding and miscoding (with with R. Pauletti and F. Fabris), IEEE Trans. on Inform. Th., vol. IT-42, n.6 (1996) 2167-2180

[48] The Shannon theorem and the quadratic span of sequences (with F. Fabris)

[49] A pragmatic uncertainty measure based on rate-distortion theory and

the uncertainty of BOE's (with A. Fioretto), Mathware & Soft Computing, vol. iii, n.1-2 (1996) 225-231

[50] A second-step information measure and the uncertainty of bodies of evidence (with A. Fioretto), Proceedings of IPMU 96 (Sixth International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems), vol. II, Granada (1996) 687- 691

[51] Bodies of evidence versus simple interval probabilities, Int. J. of Uncertainty, Fuzziness and Knowledge-based Systems, vol 5.2 (april 1997) 199-209

[52] General lower bounds for chosen-content attacks against authentication codes (with C. Crevato), Journal of Discrete Mathematical Sciences and Cryptography, vol.1.1 (april 1998) 63-72

[53] Evidence for and evidence against in non-dogmatic lower probabilities, Proceedings of IPMU 98 (Seventh International Conference on Information Processing and Management of Uncertainty in Knowledge- Based Systems), vol. II, Paris (1998) 1040-1046

[54] An open-frame theory of incomplete interval probabilities, Int. J. of Uncertainty, Fuzziness and Knowledge-based Systems, vol 6.6 (1998) 551-562

[55] On the composition of Tunstall messages (with F. Fabris), IEEE Trans. on Inform. Th., vol. IT-45, n.6 (1999) 1608-1612

[56] Authentication frauds from the point of view of rate-distortion theory, WCC 99, Workshop on Coding and Cryptography, Paris, January 1999, Proceedings (149-155)

[57a] Open-Frame Dempster conditioning for incomplete interval probabilities (con P. Castellan). ISIPTA ’99, International Symposium on Imprecise Probabilities and their Applications, Ghent, Belgium, June 1999, Proceedings (68-75) (preliminary version of [57])

[57] Open-Frame Dempster conditioning for incomplete interval probabilities (con P. Castellan) Int. J. of Uncertainty, Fuzziness and Knowledge-based Systems, vol 8.3 (2000) 285-293

[58] A possibilistic distance for sequences of equal and unequal length (with M. Borelli), in “Finite versus infinite. Mathematical contributions to an eternal dilemma”, ed. by C. Calude and Gh. Paun, Lecture Notes in Discrete Mathematics and Theoretical Computer Science, Springer-Verlag Singapore (2000) 27-38

[59] Possibilistic data transmission and fuzzy integral decoding (with F. Fabris) IPMU 2000, Madrid July 2000, Proceedings (1153-1158)

[60] Measures of imprecise information: from the epistemic to an empiric view, in "Saggi e lavori: novembre 1999 - dicembre 2000", Laboratorio di Scienze cognitive di Rovereto (Università di Trento) (2001), pp. 213-220

[61] Blind coding: authentication frauds from the point of view of rate- distortion theory, Journal of Discrete Mathematical Sciences & Cryptography, vol.4 (2001), Nos. 2-3, pp.133-150

[62] The capacity of a possibilistic channel, in "Symbolic and Quantitative Approaches to Reasoning with Uncertainty", ed. by S. Benferhat and Ph. Besnard, Springer, Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) n.2143 (2001) 398-409

[63] Possibilistic information theory: a coding-theoretic approach, Fuzzy Sets and Systems, 132-1 (2002) 11-32

[64] Fuzzy Graphs and Error-proof Keyboards (with F.L. Luccio), 2001, Proceedings of IPMU 2002, Annecy, France, pp. 1503-1508

[65] Possibilistic entropies and the compression of possibilistic data (with L.P. Dinu), Int. J. of Uncertainty, Fuzziness and Knowledge-based Systems, (2002), vol. 10, n. 6, December, pp. 635-653

[66] Cryptography and statistics: a didactical project (with M. Borelli, A. Fioretto, L. Zuccheri), Electronic Proceedings of the 2nd International Conference on the Teaching of Mathematics, Hersonissos, Crete, Greece, 1-6 July 2002, ID 234

[67] An axiomatic derivation of the coding-theoretic possibilistic entropy, Fuzzy Sets and Systems, 143 (2004) 335-353

[68] Fuzzy integrals and error correction in a telephone network with sensitive users (with L. Bortolussi), 2004, Proceedings of IPMU 2004, Perugia, Italy, pp. 1503-1508

[69] Utilities and distortions: an objective approach to possibilistic coding,  Int. J. of Uncertainty, Fuzziness and Knowledge-based Systems, (2005), vol. 13, n. 2, April, pp. 139-161

[70] Possibilistic time processes and soft decoding,  in Soft Methodology and Random Information Systems,  ed. by M. López-Díaz, M.Á. Gil, P. Grzegorzewsky, O. Hryniewicz, J. Lawry, Advances in Soft Computing, Springer Verlag (2004), pp.249-256

[71] Constraint satisfaction problems over DNA strings (with L. Bortolussi), 2005, Proceedings of WCB 2005, Sitges, Spain, Oct. 2005

[72] Codeword distinguishability in minimum diversity decoding (with L. Bortolussi), J. of Discrete Mathematical Sciences & Cryptography, (2006) vol.9, N.3, pp. 487-502

[73] Fuzzy codebooks for DNA Word Design (with L. Bortolussi), Proceedings of IPMU 2006, Paris, France, pp. 2784-2790 


[74] Rank distance: a soft tool for comparison of DNA strings (with L. P. Dinu), Proceedings of IPMU 2006, Paris, France, pp. 2791-2798

[75] Channel Models for DNA Word Design (con L. Bortolussi). In: Proceedings of SIMAI 2006. VIII Congresso della Società Italiana di Matematica Applicata e Industriale. Baia Samuele, Ragusa. 21-26 May 2006. (pp. 34). RAGUSA: L. Puccio, A. Agreste, A. Guido, and A. Vocaturo (ITALY). Full paper in electronic proceedings.

[76] Possibilistic channels for DNA Word Design (with L. Bortolussi), in Soft Methods for Integrated Uncertainty Modelling,  ed. by J. Lawry et alt., Advances in Soft Computing, Springer Verlag (2006), pp.327-335

[77] A low-complexity distance for DNA strings (with L. P. Dinu), Fundamenta Informaticae 73-7 (2006) 361-372

[78] Splitting the BLOSUM score into terms of biological significance (with F. Fabris and A. Tossi), EURASIP Journal of Bioinformatics and Systems Biology, vol.2007, ID 31450, 18 pages, 2007, Special Issue "Information-theoretic Methods for Bioinformatics" ed. by J. Rissanen, P. Grünwald, J. Heikkonen, P. Millimãki, T. Roos,  J. Rousu.

[79] Maximum possibility vs. maximum likelihood decisions (with M. Borelli and L. Bortolussi), Proceedings, 28th Linz Seminar on Fuzzy Set Theory: Fuzzy Sets, Probabilities and Statistics - Gaps and Bridges, Linz, Austria, Febr. 2007

[80] Hamming-like distances for ill-defined strings in linguistic classification (with L. Bortolussi), Rend. Ist. di Mat. Univ. Trieste, vol.39 (2007) 105-118

[81] Maximum rank distance for binary strings (with L.P.  Dinu), Mathematica Pannonica, 19/1 (2008) 125-133

[82] Measures of fuzzy disarray in linguistic typology (with L.  Bortolussi and L.P. Dinu), Proceedings of IPMU 2008, Malaga, Spain, pp.167-172 

[83] A criterion for the stochasticity of matrices with specified order relations (with L. Bortolussi), Rend. Ist. di Mat. Univ. Trieste, vol.40 (2009) 55-64

being updated


 
 

June 2009


 
 

Titoli in italiano, o comunque non in inglese




[I1] L'esponenziale: un esempio di istruzione assistita da calcolatore, L'insegnamento della matematica, vol.3, n.2-3-4 (1972) 111-117

[I2] Reti d'informazione e informazione collaterale, (con G. Longo), Alta Frequenza, vol.XLV, n.11 (1976) 661-666

[I3] Un nuovo orientamentoi nei metodi della teoria dell'informazione, (con G. Longo), Alta Frequenza, vol.XLVIII, n.5 (1979) 237-242

[I4] La linguistica matematica, Cultura e scuola, n.75 (1980) 202-206

[I5] I logaritmi e la teoria dell'informazione, L'insegnamento della matematica e delle scienze integrate, vol. 3, n.3 (1980) 47-74

[I6] Metodi crittografici per la protezione dei dati riservati, Cultura e scuola, n.79 (1981) 222-228

[I7] Metodi crittografici per la protezione della voce, Cultura e scuola, n.92 (1984) 193-199

[I8] Crittografia, Muzzio ed., Padova (1986)

[I9] Insiemi sfocati e docimologia, Cultura e scuola, n.102 (1987) 227-235

[I10] Codici segreti, Oscar Mondadori, Verona (1989)

[I10 bis] Geheimschriften, Weltbild Verlag, Augsburg (1991) (traduzione tedesca del precedente)

[I11] Giochi di autenticazione (con A. Mereu), Atti del Secondo Simposio Stato e prospettive della ricerca crittografica in Italia, Fondazione Ugo Bordoni, Roma (1989) 256-262

[I12] Crittografia, voce nell'Enciclopedia delle Scienze Fisiche, vol. II, Istituto dell'Enciclopedia Italiana fondata da G. Treccani, Roma (1993) 64-66

[I13] I codici segreti nell'insegnamento della matematica (con L. Zuccheri), in: "La matematica tra didattica e cultura", Laboratorio dell'immaginario scientifico, Trieste (1992) 131-142

[I14] Crittografia, Muzzio, II ed., 1993

[I15] La scrittura sotto chiave, Sapere, anno 60o, num. 8-9 (1994) 57-63

[I16] Crittografia senza segretezza, Sistemi & Impresa, num. 8 (1995) 13-18

[I17] La gestione matematica dell'incertezza e dell'ambiguità, in "Ambiguità", a cura di G.O.Longo e C.Magris, Moretti & Vitali ed., Bergamo (1996) 55-64

[I18] L'esito incerto delle partite a scacchi, AEI, vol. 83, n.6, giugno 1996, 41-44

[I19] Unentscheidbarkeit und Mehrdeutigkeit, in "Die Natur ist unser Modell von ihr", V. Breitenberg, I. Hosp (Hg.), rororo Rowohlt, Sachbuch 60254, 1996, 293-302

[I20] Il vago e l'incerto nel ragionamento automatico, Cultura e scuola, n.137 (1996) 293-302

[I21] La crittografia storica e le radici arabe della statistica, in Pensiero scientifico. Fondamenti ed epistemologia, a cura di A. Repola Boatto, Atti del                 convegno IRRSAE, Quaderno 29 di "Innovazione e scuola", Ancona (1997) 143-156

[I22] L'insostenibile soggettività del numero, Pluriverso, n. 2 (1998) 97-106

[I23] I giochi del matematico e le fantasie dello scrittore, Quaderno n. 9, a cura di I. Hosp, Europäische Akademie Bozen (1998) 11-19

[I24] Il cammino elicoidale dell'incertezza, Quaderno n. 10, a cura di I. Hosp, Europäische Akademie Bozen (1999), 67-75

[I25] Moduli di matematica e statistica (con M. Rinaldi e S. Invernizzi), Zanichelli, 2000

[I26] Crittografia e sicurezza della comunicazione, in "Evoluzione della comunicazione" a cura di G. Tartara, Istituto Lombardo di Scienze e Lettere, Milano (2004) pag. 99-111

[I26] Crittografia e statistica con le calcolatrici grafiche (con S. Invernizzi e M. Borelli), Atti del 4. Convegno Nazionale dell'ADT, Associazione per la Didattica con le Tecnologie, Monopoli, 11-13 ott. 2002, pp. 18-23

[I27] Zufall und Information, in "Entwicklung des Universums und des Menschen: Entscheidung Zufall Naturgesetz ?", I. Hosp, P. Mulser, Kl. Schredelseker (Hg.), GCA-Verlag (2003)159-172

[I28] Divagazioni sul futuro: ci sta dietro o ci sta davanti? Ulisse - Biblioteca, sett. 2006, http://ulisse.sissa.it

[I-29] Raccontare la crittografia, in Nuova secondaria, Anno XXV n. 7 (2008) 32-35

[I-30] L'ordine delle parole (con L.P. Dinu), in Rivista internazionale di Tecnica della Traduzione. International Journal of Translation, n. 10 (2008) 175-182

[I-31] Dall'Atbash biblico alla Pretty Good Privacy. La crittografia fra cultura e tecnica, in Scienza & società, 9/10 aprile (2010) 79-86

June 2009


 

Recensioni




[R1] Leon Battista Alberti: Dello scrivere in cifra (De Componendis Cyfris), su Sapere, anno 61o, num. 4 (1995) 70-71

[R2] Henri Poincaré: Geometria e caso, su Le Scienze, n.334, giu. 1996, 109- 110

[R3] Mark Kac: Gli enigmi del caso, su Le Scienze, n.335, lu. 1996, 102

[R4] Giuseppe O. Longo: Il nuovo Golem, Nuova Civiltà delle Macchine, Anno XVI n.1-2 (1998) 226-227
 
 

ott. 2000