Sfoglia per Autore  

Opzioni
Mostrati risultati da 21 a 40 di 113
Titolo Data di pubblicazione Autori Tipo File Abstract
Authenticated web services : a WS-security based implementation 2007 S. Cimato + Book Part (author) -
A biometric verification system addressing privacy concerns 2007 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
Method for generating and verifying security information obtained by means of biometric readings 2007 S. CimatoM. GamassiV. PiuriD. SanaR. SassiF. Scotti Patent -
Proceedings of the IFIP TC 11 23. international information security conference : IFIP 20. world computer congress, IFIP SEC '08 : september 7-10, 2008, Milano, Italy 2008 P. SamaratiS. Cimato + Book (editor) -
Biometrics and privacy 2008 S. CimatoR. SassiF. Scotti Article (author) -
Hazards in full-disclosure supply chains 2008 F. FratiE. DamianiP. CeravoloS. CimatoC. FugazzaG. GianiniS. MarraraO. Scotti Book Part (author) -
Risk management and information disclosure in supply chain analysis 2008 P. CeravoloS. CimatoE. DamianiG. GianiniC. FugazzaS. Marrara Book Part (author) -
Privacy-aware biometrics : design and implementation of a multimodal verification system 2008 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
A lightweight protocol for dynamic RFID identification 2008 S. Cimato Book Part (author) -
Obfuscation for the common good 2008 E. DamianiP. CeravoloS. CimatoG. Gianini Book Part (author) -
A multi-biometric verification system for the privacy protection of iris templates 2009 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
Efficient key management for enforcing access control in outsourced scenarios 2009 S. CimatoS. De Capitani di VimercatiS. ForestiP. Samarati + Book Part (author) -
Privacy in biometrics 2009 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
Privacy preserving risk assessment of credit securities 2010 S. CimatoE. DamianiG. Gianini Book Part (author) -
A simple role mining algorithm 2010 S. Cimato + Book Part (author) -
Toward cloud-based key management for outsourced databases 2010 S. CimatoE. Damiani + Book Part (author) -
Secure metering schemes 2010 Cimato, Stelvio + Book Part (author) -
Using incentive schemes to alleviate supply chain risks 2010 M. AnisettiE. DamianiF. FratiS. CimatoG. Gianini Book Part (author) -
A distributed and privacy-preserving method for network intrusion detection 2010 G.GianiniS.Cimato + Book Part (author) -
Managing key hierarchies for access control enforcement : heuristic approaches 2010 S. CimatoS. De Capitani di VimercatiS. ForestiP. Samarati + Article (author) -
Mostrati risultati da 21 a 40 di 113
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile