Sfoglia per Autore
Are mHealth Apps Secure? : A Case Study
2018 C. Braghin, S. Cimato, A. Della Libera
A Comparative Analysis of Current Cryptocurrencies
2018 E. Damiani, S. Cimato, L. Mauri
PostProcessing in Constrained Role Mining
2018 C. Blundo, S. Cimato, L. Siniscalchi
Some ideas on privacy-aware data analytics in the internet-of-everything
2018 S. Cimato, E. Damiani
Towards Blockchain-Based E-Voting Systems
2019 C. Braghin, S. Cimato, S.R. Cominesi, E. Damiani, L. Mauri
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based
2019 P.J. Houngbo, J.T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C.Y. Yeun
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 1
2019 V. Getov, J. Gaudiot, N. Yamai, S. Cimato, J. Morris Chang, Y. Teranishi, J. Yang, H. Va Leong, H. Shahriar, M. Takemoto, D. Towey, H. Takakura, A. Elcci, S. Takeuchi, S. Puri
Designing smart-contract based auctions
2019 C. Braghin, S. Cimato, E. Damiani, M. Baronchelli
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits
2019 S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype
2019 P.J. Houngbo, J.T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C.Y. Yeun
Towards Efficient and Secure Analysis of Large Datasets
2020 S. Cimato, S. Nicolo
Special Issue "Computing Methods in Steganography and Multimedia Security"
2020 J.C.N. Yang, C. Kim, S. Cimato
Be your neighbor's miner: Building trust in ledger content via reciprocally useful work
2020 L. Mauri, E. Damiani, S. Cimato
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh
A Model Driven Approach for Cyber Security Scenarios Deployment
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene
Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security
2020 A. Bernasconi, S. Cimato, V. Ciriani, M.C. Molteni
Introduction to the special issue on deep learning for real-time information hiding and forensics
2020 Z. Zhou, C. Yang, C. Kim, S. Cimato
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
2020 L. Mauri, S. Cimato, E. Damiani
Deep Learning for Real-time Information Hiding and Forensics
2020 Z. Zhou, C. Yang, C. Kim, S. Cimato
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem
2020 S. Cimato, G. Gianini, M. Sepehri, R. Asal, E. Damiani
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile