Sfoglia per Autore
A note on optimal metering schemes
2002 C. Blundo, S. Cimato, B. Masucci
Certified email: Design and implementation of a new optimistic protocol
2003 C. Blundo, S. Cimato, R. De Prisco
Modeling a certified email protocol using I/O Automata
2004 C. Blundo, S. Cimato, R. De Prisco, A.L. Ferrara
A software infrastructure for authenticated web metering
2004 C. Blundo, S. Cimato
Security in communication networks : 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers
2005 C. Blundo, S. Cimato
Ideal contrast visual cryptography schemes with reversing
2005 S. Cimato, A. De Santis, A.L. Ferrara, B. Masucci
Overcoming the obfuscation of Java programs by identifier renaming
2005 S. Cimato, A. De Santis, U. Ferraro Petrillo
Optimal colored threshold visual cryptography schemes
2005 S. Cimato, R. De Prisco, A. De Santis
A lightweight approach to authenticated Web caching
2005 C. Blundo, S. Cimato, R. De Prisco
A web service for certified email
2005 V. Auletta, C. Blundo, S. Cimato, G. Raimato
Design and implementation of an inline certified e-mail service
2005 S. Cimato, C. Galdi, R. Giordano, B. Masucci, G. Tomasco
Secure E-Coupons
2005 C. Blundo, S. Cimato, A. De Bonis
Personal identification and verification using multimodal biometric data
2006 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
Privacy issues in biometric identification
2006 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Visual cryptography schemes with optimal pixel expansion
2006 C. BLUNDO, S. CIMATO, A. DE SANTIS
A web service based micro-payment system
2006 V. Auletta, C. Blundo, S. Cimato, G. Raimato
Probabilistic visual cryptography schemes
2006 S. Cimato, R. DE PRISCO, A. DE SANTIS
A unified model for unconditionally secure key distribution
2006 S. Cimato, A. Cresti, P. D'Arco
Metodo di generazione e di verifica di una informazione di sicurezza ottenuta mediante letture biometriche
2006 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
A biometric verification system addressing privacy concerns
2007 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile