Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 100 di 114
Titolo Data di pubblicazione Autori Tipo File Abstract
A note on optimal metering schemes 2002 Cimato S. + Article (author) -
Certified email: Design and implementation of a new optimistic protocol 2003 Cimato S. + Book Part (author) -
Modeling a certified email protocol using I/O Automata 2004 Cimato S. + Article (author) -
A software infrastructure for authenticated web metering 2004 Cimato S. + Article (author) -
A web service for certified email 2005 Cimato S. + Book Part (author) -
Design and implementation of an inline certified e-mail service 2005 Stelvio Cimato + Book Part (author) -
Optimal colored threshold visual cryptography schemes 2005 S. Cimato + Article (author) -
A lightweight approach to authenticated Web caching 2005 Stelvio Cimato + Book Part (author) -
Security in communication networks : 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers 2005 S. Cimato + Book (editor) -
Ideal contrast visual cryptography schemes with reversing 2005 S. Cimato + Article (author) -
Overcoming the obfuscation of Java programs by identifier renaming 2005 S. Cimato + Article (author) -
Secure E-Coupons 2005 Stelvio Cimato + Article (author) -
Personal identification and verification using multimodal biometric data 2006 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti + Book Part (author) -
Privacy issues in biometric identification 2006 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
Visual cryptography schemes with optimal pixel expansion 2006 S. CIMATO + Article (author) -
Probabilistic visual cryptography schemes 2006 S. CIMATO + Article (author) -
A unified model for unconditionally secure key distribution 2006 S. Cimato + Article (author) -
A web service based micro-payment system 2006 Stelvio Cimato + Book Part (author) -
Metodo di generazione e di verifica di una informazione di sicurezza ottenuta mediante letture biometriche 2006 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti + Patent -
Authenticated web services : a WS-security based implementation 2007 S. Cimato + Book Part (author) -
Colored visual cryptography without color darkening 2007 S. Cimato + Article (author) -
A biometric verification system addressing privacy concerns 2007 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
Method for generating and verifying security information obtained by means of biometric readings 2007 S. CimatoM. GamassiV. PiuriD. SanaR. SassiF. Scotti Patent -
Risk management and information disclosure in supply chain analysis 2008 P. CeravoloS. CimatoE. DamianiG. GianiniC. FugazzaS. Marrara Book Part (author) -
Proceedings of the IFIP TC 11 23. international information security conference : IFIP 20. world computer congress, IFIP SEC '08 : september 7-10, 2008, Milano, Italy 2008 P. SamaratiS. Cimato + Book (editor) -
Biometrics and privacy 2008 S. CimatoR. SassiF. Scotti Article (author) -
Hazards in full-disclosure supply chains 2008 F. FratiE. DamianiP. CeravoloS. CimatoC. FugazzaG. GianiniS. MarraraO. Scotti Book Part (author) -
A lightweight protocol for dynamic RFID identification 2008 S. Cimato Book Part (author) -
Obfuscation for the common good 2008 E. DamianiP. CeravoloS. CimatoG. Gianini Book Part (author) -
Privacy-aware biometrics : design and implementation of a multimodal verification system 2008 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
Efficient key management for enforcing access control in outsourced scenarios 2009 S. CimatoS. De Capitani di VimercatiS. ForestiP. Samarati + Book Part (author) -
Privacy in biometrics 2009 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
A multi-biometric verification system for the privacy protection of iris templates 2009 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
Using incentive schemes to alleviate supply chain risks 2010 M. AnisettiE. DamianiF. FratiS. CimatoG. Gianini Book Part (author) -
Secure metering schemes 2010 Cimato, Stelvio + Book Part (author) -
A distributed and privacy-preserving method for network intrusion detection 2010 G.GianiniS.Cimato + Book Part (author) -
Toward cloud-based key management for outsourced databases 2010 S. CimatoE. Damiani + Book Part (author) -
A simple role mining algorithm 2010 S. Cimato + Book Part (author) -
Privacy preserving risk assessment of credit securities 2010 S. CimatoE. DamianiG. Gianini Book Part (author) -
Managing key hierarchies for access control enforcement : heuristic approaches 2010 S. CimatoS. De Capitani di VimercatiS. ForestiP. Samarati + Article (author) -
Secure collaborative supply-chain management 2011 S. CimatoE. Damiani + Article (author) -
Biometric privacy 2011 F. ScottiS. CimatoR. Sassi Book Part (author) -
Probabilistic visual cryptography schemes 2011 S. Cimato + Book Part (author) -
Visual cryptography and secret image sharing 2011 S. Cimato + Book (editor) -
Ensuring XML integrity using watermarking techniques 2012 R. TchokponS. Cimato + Book Part (author) -
Risk assessment of credit securities : the notion and the issues 2012 E. DamianiS. CimatoG. Gianini Book Part (author) -
Visual cryptography for color images 2012 S. Cimato + Book Part (author) -
Constrained role mining 2013 S. Cimato + Book Part (author) -
Visual cryptography based watermarking: definition and meaning 2013 S. Cimato + Book Part (author) -
AS5 : a secure searchable secret sharing scheme for privacy preserving database outsourcing 2013 E. DamianiS. Cimato + Book Part (author) -
Image watermarking using visual cryptography 2013 S. Cimato Book Part (author) -
A scalable multi-party protocol for privacy-preserving equality test 2013 M. SepehriS. CimatoE. Damiani Book Part (author) -
Toward secure clustered multi-party computation : a privacy-preserving clustering protocol 2013 ABBASI, SEDIGHEHS. CimatoE. Damiani Book Part (author) -
Towards the certification of cloud services 2013 S. CimatoE. DamianiF. Zavatarelli + Book Part (author) -
Visual cryptography schemes for graph based access structures 2013 S. Cimato Book Part (author) -
Clustering models in secure clustered multiparty computation 2013 S. AbbasiS. CimatoE. Damiani Article (author) -
Visual cryptography based watermarking 2014 S. Cimato + Book Part (author) -
A risk model for cloud processes 2014 E. DamianiS. CimatoG. Gianini Article (author) -
A multi-party protocol for privacy-preserving range queries 2014 M. SepehriS. CimatoE. Damiani Book Part (author) -
Visual cryptography based watermarking 2014 S. Cimato + Book Part (author) -
ESOP Synthesis for Secure Computation 2014 S. CimatoV. Ciriani + Book Part (author) -
Toward economic-aware risk assessment on the cloud 2015 V. BellandiS. CimatoE. DamianiG. Gianini + Article (author) -
New Results for Partial Key Exposure on RSA with Exponent Blinding 2015 S. MellaS. Cimato + Book Part (author) -
Data sharing on the cloud: a scalable proxy-based protocol for privacy-preserving queries 2015 M. SepehriS. CimatoE. Damiani + Book Part (author) -
Security and searchability in secret sharing based data outsourcing 2015 E. DamianiS. Cimato + Article (author) -
Privacy-Preserving Query Processing by Multi-Party Computation 2015 M. SepehriS. CimatoE. Damiani Article (author) -
Key recovery in public clouds: A survey on cross-vm side channel attacks 2016 S. CimatoE. DamianiS. Mella + Book Part (author) -
3-out-of-n cheating prevention visual cryptographic schemes 2016 S. Cimato + Book Part (author) -
Minimization of ESOP forms for secure computation 2016 S. CimatoV. Ciriani + Book Part (author) -
Partial key exposure attacks on RSA with exponent blinding 2016 S. CimatoS. Mella + Book Part (author) -
Possibilistic assessment of process-related disclosure risks on the cloud 2016 V. BellandiS. CimatoE. DamianiG. Gianini Book Part (author) -
Paying with a selfie: a hybrid micro-payment framework based on visual cryptography 2016 S. CimatoE. DamianiF. Frati + Book Part (author) -
Exploiting Quantum Gates in Secure Computation 2017 M. EhsanpourS. CimatoV. CirianiE. Damiani Book Part (author) -
Visual Cryptography in Action: The Pay-with-a-Selfie Demo 2017 S. CimatoE. DamianiF. Frati + Book Part (author) -
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining 2017 S. Cimato + Book Part (author) -
A multiple valued logic approach for the synthesis of garbled circuits 2017 S. CimatoV. CirianiE. DamianiM. Ehsanpour Book Part (author) -
41st IEEE Annual Computer Software and Applications Conference 2017 S. Cimato + Book (editor) -
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud 2017 M. SepehriS. CimatoE. Damiani Book Part (author) -
Are mHealth Apps Secure? : A Case Study 2018 Chiara BraghinStelvio Cimato + Book Part (author) -
A Comparative Analysis of Current Cryptocurrencies 2018 E. DamianiS. CimatoMAURI, LARA Book Part (author) -
Some ideas on privacy-aware data analytics in the internet-of-everything 2018 Cimato, StelvioDamiani, Ernesto Book Part (author) -
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency 2018 Damiani, ErnestoCimato, StelvioFrati, Fulvio + Book Part (author) -
PostProcessing in Constrained Role Mining 2018 Cimato, Stelvio + Book Part (author) -
2018 IEEE 42nd Annual Computer Software and Applications Conference 2018 Stelvio Cimato + Book (editor) -
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype 2019 Damiani, ErnestoCimato, StelvioFrati, Fulvio + Book Part (author) -
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based 2019 Damiani, ErnestoCimato, StelvioFrati, Fulvio + Book Part (author) -
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 1 2019 Stelvio Cimato + Book (editor) -
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits 2019 Stelvio CimatoValentina CirianiErnesto DamianiMaryam Ehsanpour Book Part (author) -
Towards Blockchain-Based E-Voting Systems 2019 Braghin C.Cimato S.Damiani E.Mauri L. + Book Part (author) -
Designing smart-contract based auctions 2019 C. BraghinS. CimatoE. Damiani + Book Part (author) -
Be your neighbor's miner: Building trust in ledger content via reciprocally useful work 2020 Mauri L.Damiani E.Cimato S. Book Part (author) -
Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security 2020 Cimato, StelvioCiriani, ValentinaMolteni, Maria Chiara + Book Part (author) -
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol 2020 Lara MauriStelvio CimatoErnesto Damiani Book Part (author) -
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges 2020 Braghin, ChiaraCimato, StelvioDamiani, ErnestoFrati, FulvioRiccobene, ElviniaAstaneh, Sadegh Book Part (author) -
Special Issue "Computing Methods in Steganography and Multimedia Security" 2020 S. Cimato + Journal volume (editor) -
A Model Driven Approach for Cyber Security Scenarios Deployment 2020 Braghin, ChiaraCimato, StelvioDamiani, ErnestoFrati, FulvioMauri, LaraRiccobene, Elvinia Book Part (author) -
Towards Efficient and Secure Analysis of Large Datasets 2020 Cimato, Stelvio + Book Part (author) -
Introduction to the special issue on deep learning for real-time information hiding and forensics 2020 Cimato, Stelvio + Article (author) -
Deep Learning for Real-time Information Hiding and Forensics 2020 Stelvio Cimato + Journal volume (editor) -
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem 2020 Cimato, StelvioGianini, GabrieleSepehri, MaryamDamiani, Ernesto + Article (author) -
Mostrati risultati da 1 a 100 di 114
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile