Sfoglia per Autore
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design
2016-01-01 Barenghi, Alessandro; Beretta, Michele; DI FEDERICO, Alessandro; Pelosi, Gerardo
V2I Cooperation for Traffic Management with SafeCOP
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Delucchi, Stefano; Massa, Massimo; Mongelli, Maurizio; Ferrari, Enrico; Napoletani, Leonardo; Bozzi, Luciano; Tieri, Carlo; Cassioli, Dajana; Pomante, Luigi
Access control for the shuffle index
2016-01-01 de Capitani di Vimercati, Sabrina; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
A note on fault attacks against deterministic signature schemes
2016-01-01 Barenghi, Alessandro; Pelosi, Gerardo
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Koren, Israel; Pelosi, Gerardo
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure
2016-01-01 Barenghi, Alessandro; G., Bertoni; Breveglieri, LUCA ODDONE; Pelosi, Gerardo; S., Sanfilippo; R., Susella
Automated instantiation of side-channel attacks countermeasures for software cipher implementations
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
Foreword - Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
2017-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project
2017-01-01 Agneessens, Alessio; Buemi, Francesco; Delucchi, Stefano; Massa, Massimo; Agosta, Giovanni; Barenghi, Alessandro; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Ferrari, Enrico; Cassioli, Dajana; Pomante, Luigi; Napoletani, Leonardo; Bozzi, Luciano; Tieri, Carlo; Mongelli, Maurizio
A Security Audit of the OpenPGP Format
2017-01-01 Barenghi, A.; Mainardi, N.; Pelosi, G.
Data Centres for IoT applications: the M2DC Approach
2017-01-01 Oleksiak, Ariel; Kierzynka, Michal; Agosta, Giovanni; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Vor Dem Berge, Micha; Christmann, Wolfgang; Krupop, Stefan; Cecowski, Mariano; Plestenjak, Robert; Cinkelj, Justin; Porrmann, Mario; Hagemeyer, Jens; Griessl, René; Peykanu, Meysam; Tigges, Lennart; Cudennec, Loic; Goubier, Thierry; Philippe, Jean Marc; Rosinger, Sven; Schlitt, Daniel; Pieper, Christian; Adeniyi Jones, Chris; Janssen, Udo; Ceva, Luca
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers
2017-01-01 Barenghi, Alessandro; Pelosi, Gerardo
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware
2017-01-01 Oleksiak, Ariel; Kierzynka, Michal; Piatek, Wojciech; Agosta, Giovanni; Barenghi, Alessandro; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Cecowski, Mariano; Plestenjak, Robert; Činkelj, Justin; Porrmann, Mario; Hagemeyer, Jens; Griessl, René; Lachmair, Jan; Peykanu, Meysam; Tigges, Lennart; Berge, Micha vor dem; Christmann, Wolfgang; Krupop, Stefan; Carbon, Alexandre; Cudennec, Loïc; Goubier, Thierry; Philippe, Jean Marc; Rosinger, Sven; Schlitt, Daniel; Pieper, Christian; Adeniyi Jones, Chris; Setoain, Javier; Ceva, Luca; Janssen, Udo
A dynamic tree-based data structure for access privacy in the cloud
2017-01-01 De Capitani di Vimercati, Sabrina; Foresti, Sara; Moretti, Riccardo; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
Access Privacy in the Cloud
2018-01-01 De Capitani di Vimercati, S.; Foresti, S.; Paraboschi, S.; Pelosi, G.; Samarati, P.
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
2018-01-01 Baldi, M.; Barenghi, A.; Chiaraluce, F.; Pelosi, G.; Santini, P.
Enforcing authorizations while protecting access confidentiality
2018-01-01 De Capitani Di Vimercati, Sabrina; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
Software-only reverse engineering of physical dram mappings for rowhammer attacks
2018-01-01 Barenghi, A.; Breveglieri, L.; Izzo, Niccolo'; Pelosi, G.
Reactive Side-channel Countermeasures: Applicability and Quantitative Security Evaluation
2018-01-01 Agosta, G.; Barenghi, A.; Pelosi, G.; Scandale, M.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile