Dr. Nicolosi’s research consists of; Identity and Authentication for User-centric Environments, Practical Internet Voting (PIVot), Security and Privacy in Collaborative Mobile Computing, Lattices and Cryptography and P2PCast.
Nicolosi has developed a prototype system for elections and voting by small and medium-sized constituencies, like the members of a professional society or the Faculty of a School or University. The system, called PIVot (Practical Internet Voting), leverages existing Internet technology, and attains voter anonymity guarantees comparable to the paper-based mail-in ballot system, while additionally providing each individual voter with evidence of accurate tallying.
The PIVot system is designed so that voters may cast their vote using any web browser on a machine connected to the Internet. This aids both system usability, because voters do not have to learn how to interact with a dedicated voting software, and system availability, because virtually no setup is necessary before a machine can be used for voting. A prototype of the system has been completed. Early user studies conducted with Stevens undergraduate students suggest that the prototype makes the voting process highly transparent, whereas the system interface should be improved to make for a smoother user experience.
Dr. Nicolosi is also affiliated with the Center for the Advancement of Secure Systems and Information Assurance (CASSIA), and is a Program Committee Member, 12th Information Security Conference (ISC09), Program Committee Member, 2nd International Conference on Provable Security (ProvSec08), Program Committee Member, 6th International Conference on Cryptology and Network Security (CANS07).
G. Baumslag, N. Fazio, A. Nicolosi, V. Shpilrain, W.E. Skeith III. (Oct 16-18, 2011). Generalized Learning Problems and Applications to Non-commutative Cryptography, 5th International Conference on Provable Security (ProvSec 2011), Xi'an, China. LNCS 6980 324--339
J.Naous, M.Miller, A.Seehra, M.Walfish, A.Nicolosi, D.Mazieres. (Dec 6-9, 2011). Verifying and Enforcing Network Paths with ICING, 7th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2011), Tokyo, Japan
Arun Seehra, Jad Naous, Michael Walfish, David Mazières, Antonio Nicolosi, Scott Shenker. (Dec 23, 2009). A Policy Framework for the Future Internet, The Eighth ACM Workshop on Hot Topics in Networks (HotNets-VIII) . W. Leland, R. Mahajan, ACM
D. Micciancio and A. Nicolosi. (Jul 11, 2008). Efficient Bounded-Distance Decoders for Barnes-Wall Lattices, IEEE International Symposium on Information Theory. Alex Vardy, IEEE CNF. 2484–2488
N. Fazio, A. Nicolosi, and D.H. Phan. (Oct 9, 2007). Traitor Tracing with Optimal Transmission Rate, Information Security Conference. Juan Garay, Springer-Verlag. LNCS 4779 71–88