CIMATO, STELVIO

CIMATO, STELVIO  

Dipartimento di Informatica Giovanni Degli Antoni  

Mostra records
Risultati 1 - 20 di 107 (tempo di esecuzione: 0.003 secondi).
Titolo Data di pubblicazione Autori Tipo File Abstract
2018 IEEE 42nd Annual Computer Software and Applications Conference 1-gen-2018 Stelvio Cimato + Book (editor) -
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 1 1-gen-2019 Stelvio Cimato + Book (editor) -
3-out-of-n cheating prevention visual cryptographic schemes 1-gen-2016 S. Cimato + Book Part (author) -
41st IEEE Annual Computer Software and Applications Conference 1-gen-2017 S. Cimato + Book (editor) -
A biometric verification system addressing privacy concerns 1-gen-2007 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
A Blockchain-based Trustworthy Cloud Services Digital Ecosystem 1-gen-2022 Cimato, Stelvio + Book Part (author) -
A Comparative Analysis of Current Cryptocurrencies 1-gen-2018 E. DamianiS. CimatoMAURI, LARA Book Part (author) -
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem 1-apr-2020 Cimato, StelvioGianini, GabrieleSepehri, MaryamDamiani, Ernesto + Article (author) -
A distributed and privacy-preserving method for network intrusion detection 1-gen-2010 G.GianiniS.Cimato + Book Part (author) -
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol 1-gen-2020 Lara MauriStelvio CimatoErnesto Damiani Book Part (author) -
A lightweight approach to authenticated Web caching 1-gen-2005 Stelvio Cimato + Book Part (author) -
A lightweight protocol for dynamic RFID identification 1-gen-2008 S. Cimato Book Part (author) -
A Model Driven Approach for Cyber Security Scenarios Deployment 1-gen-2020 Braghin, ChiaraCimato, StelvioDamiani, ErnestoFrati, FulvioMauri, LaraRiccobene, Elvinia Book Part (author) -
A multi-biometric verification system for the privacy protection of iris templates 1-gen-2009 S. CimatoM. GamassiV. PiuriR. SassiF. Scotti Book Part (author) -
A multi-party protocol for privacy-preserving range queries 1-gen-2014 M. SepehriS. CimatoE. Damiani Book Part (author) -
A multiple valued logic approach for the synthesis of garbled circuits 1-gen-2017 S. CimatoV. CirianiE. DamianiM. Ehsanpour Book Part (author) -
A note on optimal metering schemes 1-gen-2002 Cimato S. + Article (author) -
A risk model for cloud processes 1-gen-2014 E. DamianiS. CimatoG. Gianini Article (author) -
A scalable multi-party protocol for privacy-preserving equality test 1-gen-2013 M. SepehriS. CimatoE. Damiani Book Part (author) -
A simple role mining algorithm 1-gen-2010 S. Cimato + Book Part (author) -