Sfoglia per Autore
Authenticated web services : a WS-security based implementation
2007 V. Auletta, C. Blundo, S. Cimato, E. De Cristofaro, G. Raimato
A biometric verification system addressing privacy concerns
2007 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Method for generating and verifying security information obtained by means of biometric readings
2007 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
Proceedings of the IFIP TC 11 23. international information security conference : IFIP 20. world computer congress, IFIP SEC '08 : september 7-10, 2008, Milano, Italy
2008 S. Jajodia, P. Samarati, S. Cimato
Biometrics and privacy
2008 S. Cimato, R. Sassi, F. Scotti
Hazards in full-disclosure supply chains
2008 F. Frati, E. Damiani, P. Ceravolo, S. Cimato, C. Fugazza, G. Gianini, S. Marrara, O. Scotti
Risk management and information disclosure in supply chain analysis
2008 P. Ceravolo, S. Cimato, E. Damiani, G. Gianini, C. Fugazza, S. Marrara
Privacy-aware biometrics : design and implementation of a multimodal verification system
2008 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
A lightweight protocol for dynamic RFID identification
2008 S. Cimato
Obfuscation for the common good
2008 E. Damiani, P. Ceravolo, S. Cimato, G. Gianini
A multi-biometric verification system for the privacy protection of iris templates
2009 S. Cimato , M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Efficient key management for enforcing access control in outsourced scenarios
2009 C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati
Privacy in biometrics
2009 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Privacy preserving risk assessment of credit securities
2010 S. Cimato, E. Damiani, G. Gianini
A simple role mining algorithm
2010 C. Blundo, S. Cimato
Toward cloud-based key management for outsourced databases
2010 N. Bennani, S. Cimato, E. Damiani
Secure metering schemes
2010 C. Blundo, S. Cimato, B. Masucci
Using incentive schemes to alleviate supply chain risks
2010 M. Anisetti, E. Damiani, F. Frati, S. Cimato, G. Gianini
A distributed and privacy-preserving method for network intrusion detection
2010 F. Benali, N. Bennani, G. Gianini, S. Cimato
Managing key hierarchies for access control enforcement : heuristic approaches
2010 C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile