Sfoglia per Autore
Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices
2014-01-01 Pelosi, Gerardo; Agosta, Giovanni; I., Al Khatib
Protecting access confidentiality with data distribution and swapping
2014-01-01 De Capitani Di Vimercati, Sabrina; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
Design Space Extension for Secure Implementation of Block Ciphers
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; M., Maggi; Pelosi, Gerardo
Preface of the Proceedings of the First Workshop on Cryptography and Security in Computing Systems (CS2 2014)
2014-01-01 I., Koren; Pelosi, Gerardo
On Task Assignment in Data Intensive Scalable Computing
2014-01-01 Agosta, Giovanni; Pelosi, Gerardo; E., Speziale
Security Challenges in Building Automation and SCADA
2014-01-01 Antonini, Alessio; Barenghi, Alessandro; Pelosi, Gerardo; S., Zonouz
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
On the Security of Partially Masked Software Implementations
2014-01-01 Barenghi, Alessandro; Pelosi, Gerardo
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Snake: an End-to-End Encrypted Online Social Network
2014-01-01 Barenghi, Alessandro; M., Beretta; DI FEDERICO, Alessandro; Pelosi, Gerardo
Towards transparently tackling functionality and performance issues across different OpenCL platforms
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Security Integration in Medical Device Design: Extension of an Automated Biomedical Engineering Design Methodology
2014-01-01 I., Al Khatib; Pelosi, Gerardo; Agosta, Giovanni; H., Teriö
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges
2015-01-01 Barenghi, Alessandro; Breveglieri, LUCA ODDONE; Fugini, Mariagrazia; Pelosi, Gerardo
Shuffle Index: Efficient and Private Access to Outsourced Data
2015-01-01 Vimercati, Sabrina De Capitani Di; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
Fault Sensitivity Analysis at Design Time
2015-01-01 Barenghi, Alessandro; Breveglieri, LUCA ODDONE; Palomba, Andrea; Pelosi, Gerardo
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
2015-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions
2015-01-01 Agosta, Giovanni; Antonini, Alessio; Barenghi, Alessandro; Galeri, Dario; Pelosi, Gerardo
Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers
2015-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems
2015-01-01 Pelosi, Gerardo; Koren, Israel; Agosta, Giovanni; Barenghi, Alessandro
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
2015-01-01 Barenghi, Alessandro; DI FEDERICO, Alessandro; Pelosi, Gerardo; Sanfilippo, Stefano
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile