Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 13 di 13
Titolo Data di pubblicazione Autori Tipo File Abstract
A tool for pro-active defense against the buffer overrun attack 1998 D. BruschiE. RostiR. Banfi Book Part (author) -
Adding availability to log services of untrusted machines 1999 A. AronaD. BruschiE. Rosti Book Part (author) -
Disarming offense to facilitate defense 2000 D. BruschiE. Rosti Book Part (author) -
Less harm, less worry or how to improve network security by bounding system offensiveness 2000 D. BruschiL. CavallaroE. Rosti Book Part (author) -
AngeL : a tool to disarm computer systems 2001 D. BruschiE. Rosti Book Part (author) -
Internet voting : do people accept it? : Do they trust it? 2002 D. BruschiF. De CindioFERRAZZI, DAVIDE GIUSEPPEG. PolettiE. Rosti Book Part (author) -
Voice over IPsec : analysis and solutions 2002 D. BruschiE. Rosti + Book Part (author) -
E-vote and PKI’s : a Need, a Bliss or a Curse? 2003 D. BruschiG. PolettiE. Rosti Book Part (author) -
How to unwittingly sign non-repudiable documents with Java applications 2003 D. BruschiFABRIS, DAVIDEGLAVE, VINCENZOE. Rosti Book Part (author) -
S-ARP : a secure address resolution protocol 2003 D. BruschiE. Rosti + Book Part (author) -
L'evoluzione della sicurezza informatica: la prospettiva del CERT-IT 2004 Danilo BruschiMattia MongaROSTI, EMILIA Book Part (author) -
Trusted Internet Forensics: design of a network forensics appliance 2005 Danilo BruschiMattia MongaEmilia Rosti Book Part (author) -
IP multicast and its security 2006 Emilia Rosti Book Part (author) -
Mostrati risultati da 1 a 13 di 13
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile