Sfoglia per Autore
Secure and Efficient Design of Block Cipher Implementations on Microcontrollers
2013-01-01 Barenghi, Alessandro; Pelosi, Gerardo; Terraneo, Federico
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
2013-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques
2013-01-01 Antonini, Alessio; Barenghi, Alessandro; Pelosi, Gerardo
Distributed Shuffling for Preserving Access Confidentiality
2013-01-01 S., De Capitani Di Vimercati; S., Foresti; S., Paraboschi; Pelosi, Gerardo; P., Samarati
Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data
2013-01-01 S. D., Capitani; S., Foresti; S., Paraboschi; Pelosi, Gerardo; P., Samarati
Authentication Method
2014-01-01 G. M., Bertoni; L., Chen; P., Fragneto; K., Harrison; Pelosi, Gerardo
Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices
2014-01-01 Pelosi, Gerardo; Agosta, Giovanni; I., Al Khatib
Extending the Design Space for Secure Embedded System Design
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; M., Maggi; Pelosi, Gerardo
Preface of the Proceedings of the First Workshop on Cryptography and Security in Computing Systems (CS2 2014)
2014-01-01 I., Koren; Pelosi, Gerardo
Snake: an End-to-End Encrypted Online Social Network
2014-01-01 Barenghi, Alessandro; M., Beretta; DI FEDERICO, Alessandro; Pelosi, Gerardo
Foreword - Proceedings of the 1st Workshop on Cryptography and Security in Computing Systems, CS2 2014
2014-01-01 Koren, Israel; Pelosi, Gerardo
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
Symmetric key encryption acceleration on heterogeneous many-core architectures
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Design Space Extension for Secure Implementation of Block Ciphers
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; M., Maggi; Pelosi, Gerardo
Security Integration in Medical Device Design: Extension of an Automated Biomedical Engineering Design Methodology
2014-01-01 I., Al Khatib; Pelosi, Gerardo; Agosta, Giovanni; H., Teriö
Security Challenges in Building Automation and SCADA
2014-01-01 Antonini, Alessio; Barenghi, Alessandro; Pelosi, Gerardo; S., Zonouz
On Task Assignment in Data Intensive Scalable Computing
2014-01-01 Agosta, Giovanni; Pelosi, Gerardo; E., Speziale
On the Security of Partially Masked Software Implementations
2014-01-01 Barenghi, Alessandro; Pelosi, Gerardo
Towards transparently tackling functionality and performance issues across different OpenCL platforms
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Protecting access confidentiality with data distribution and swapping
2014-01-01 De Capitani Di Vimercati, Sabrina; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions
2015-01-01 Agosta, Giovanni; Antonini, Alessio; Barenghi, Alessandro; Galeri, Dario; Pelosi, Gerardo
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems
2015-01-01 Pelosi, Gerardo; Koren, Israel; Agosta, Giovanni; Barenghi, Alessandro
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
2015-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers
2015-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives
2015-01-01 Agosta, Giovanni; Barenghi, Alessandro; DI FEDERICO, Alessandro; Pelosi, Gerardo
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software
2015-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Fault Sensitivity Analysis at Design Time
2015-01-01 Barenghi, Alessandro; Breveglieri, LUCA ODDONE; Palomba, Andrea; Pelosi, Gerardo
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
2015-01-01 Barenghi, Alessandro; DI FEDERICO, Alessandro; Pelosi, Gerardo; Sanfilippo, Stefano
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges
2015-01-01 Barenghi, Alessandro; Breveglieri, LUCA ODDONE; Fugini, Mariagrazia; Pelosi, Gerardo
Shuffle Index: Efficient and Private Access to Outsourced Data
2015-01-01 Vimercati, Sabrina De Capitani Di; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Koren, Israel; Pelosi, Gerardo
V2I Cooperation for Traffic Management with SafeCOP
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Delucchi, Stefano; Massa, Massimo; Mongelli, Maurizio; Ferrari, Enrico; Napoletani, Leonardo; Bozzi, Luciano; Tieri, Carlo; Cassioli, Dajana; Pomante, Luigi
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design
2016-01-01 Barenghi, Alessandro; Beretta, Michele; DI FEDERICO, Alessandro; Pelosi, Gerardo
Access control for the shuffle index
2016-01-01 de Capitani di Vimercati, Sabrina; Foresti, Sara; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
Automated instantiation of side-channel attacks countermeasures for software cipher implementations
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
The M2DC Project: Modular Microserver DataCentre
2016-01-01 Oleksiak, Ariel; Kierzynka, Michal; Agosta, Giovanni; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Vor Dem Berge, Micha; Christmann, Wolfgang; Krupop, Stefan; Cecowski, Mariano; Plestenjak, Robert; Cinkelj, Justin; Porrmann, Mario; Hagemeyer, Jens; Griessl, René; Peykanu, Meysam; Tigges, Lennart; Cudennec, Loic; Goubier, Thierry; Philippe, Jean Marc; Rosinger, Sven; Schlitt, Daniel; Pieper, Christian; Adeniyi Jones, Chris; Janssen, Udo
A note on fault attacks against deterministic signature schemes
2016-01-01 Barenghi, Alessandro; Pelosi, Gerardo
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure
2016-01-01 Barenghi, Alessandro; G., Bertoni; Breveglieri, LUCA ODDONE; Pelosi, Gerardo; S., Sanfilippo; R., Susella
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel
2016-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Foreword - Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
2017-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers
2017-01-01 Barenghi, Alessandro; Pelosi, Gerardo
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project
2017-01-01 Agneessens, Alessio; Buemi, Francesco; Delucchi, Stefano; Massa, Massimo; Agosta, Giovanni; Barenghi, Alessandro; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Ferrari, Enrico; Cassioli, Dajana; Pomante, Luigi; Napoletani, Leonardo; Bozzi, Luciano; Tieri, Carlo; Mongelli, Maurizio
A dynamic tree-based data structure for access privacy in the cloud
2017-01-01 De Capitani di Vimercati, Sabrina; Foresti, Sara; Moretti, Riccardo; Paraboschi, Stefano; Pelosi, Gerardo; Samarati, Pierangela
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware
2017-01-01 Oleksiak, Ariel; Kierzynka, Michal; Piatek, Wojciech; Agosta, Giovanni; Barenghi, Alessandro; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Cecowski, Mariano; Plestenjak, Robert; Činkelj, Justin; Porrmann, Mario; Hagemeyer, Jens; Griessl, René; Lachmair, Jan; Peykanu, Meysam; Tigges, Lennart; Berge, Micha vor dem; Christmann, Wolfgang; Krupop, Stefan; Carbon, Alexandre; Cudennec, Loïc; Goubier, Thierry; Philippe, Jean Marc; Rosinger, Sven; Schlitt, Daniel; Pieper, Christian; Adeniyi Jones, Chris; Setoain, Javier; Ceva, Luca; Janssen, Udo
Data Centres for IoT applications: the M2DC Approach
2017-01-01 Oleksiak, Ariel; Kierzynka, Michal; Agosta, Giovanni; Brandolese, Carlo; Fornaciari, William; Pelosi, Gerardo; Vor Dem Berge, Micha; Christmann, Wolfgang; Krupop, Stefan; Cecowski, Mariano; Plestenjak, Robert; Cinkelj, Justin; Porrmann, Mario; Hagemeyer, Jens; Griessl, René; Peykanu, Meysam; Tigges, Lennart; Cudennec, Loic; Goubier, Thierry; Philippe, Jean Marc; Rosinger, Sven; Schlitt, Daniel; Pieper, Christian; Adeniyi Jones, Chris; Janssen, Udo; Ceva, Luca
A Security Audit of the OpenPGP Format
2017-01-01 Barenghi, A.; Mainardi, N.; Pelosi, G.
A Novel Regular Format for X.509 Digital Certificates
2018-01-01 Barenghi, Alessandro; Mainardi, Nicholas; Pelosi, Gerardo
Foreword -Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems
2018-01-01 Agosta, G.; Barenghi, A.; Koren, I.; Pelosi, G.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile