PELOSI, GERARDO

PELOSI, GERARDO  

DIPARTIMENTO DI ELETTRONICA, INFORMAZIONE E BIOINGEGNERIA  

Mostra records
Risultati 1 - 19 di 19 (tempo di esecuzione: 0.03 secondi).
Titolo Data di pubblicazione Autori File
Access Privacy in the Cloud 1-gen-2018 G. Pelosi +
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEFUGINI, MARIAGRAZIAPELOSI, GERARDO
Design Time Engineering of Side Channel Resistant Cipher Implementations 1-gen-2013 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPALOMBA, ANDREAPELOSI, GERARDO +
Distributed Shuffling for Preserving Access Confidentiality 1-gen-2013 PELOSI, GERARDO +
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 1-gen-2013 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Fault Sensitivity Analysis at Design Time 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPALOMBA, ANDREAPELOSI, GERARDO
Injection Technologies for Fault Attacks on Microprocessors 1-gen-2012 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate 1-gen-2019 A. BarenghiG. Pelosi +
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes 1-gen-2018 A. BarenghiG. Pelosi +
The M2DC Approach towards Resource-efficient Computing 1-gen-2019 Giovanni AgostaAlessandro BarenghiWilliam FornaciariNicholas MainardiGerardo PelosiMichele Zanella +
M2DC-A novel heterogeneous hyperscale microserver platform 1-gen-2018 G. AgostaA. BarenghiC. BrandoleseW. FornaciariG. Pelosi +
A Novel Regular Format for X.509 Digital Certificates 1-gen-2018 BARENGHI, ALESSANDROMAINARDI, NICHOLASPELOSI, GERARDO
Preface of the Proceedings of the First Workshop on Cryptography and Security in Computing Systems (CS2 2014) 1-gen-2014 PELOSI, GERARDO +
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks 1-gen-2021 Barenghi A.Pelosi G. +
Secure Audit Logs 1-gen-2011 PELOSI, GERARDO
Secure Index 1-gen-2011 PELOSI, GERARDO
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 1-gen-2013 ANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO
Selective Exchange of Confidential Data in the Outsourcing Scenario 1-gen-2011 PELOSI, GERARDO +
Symmetric key encryption acceleration on heterogeneous many-core architectures 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE