Search

Your search keyword '"CONTI, MAURO"' showing total 32 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Journal information systems security : 12th international conference, iciss 2016, jaipur, india, december 16-20, 2016, proceedings Remove constraint Journal: information systems security : 12th international conference, iciss 2016, jaipur, india, december 16-20, 2016, proceedings
32 results on '"CONTI, MAURO"'

Search Results

1. Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption

2. Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach

3. Detection of SQLite Database Vulnerabilities in Android Apps

4. Towards Useful Anomaly Detection for Back Office Networks

5. Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme

6. Honeypot Deployment in Broadband Networks

7. Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic

8. Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches

9. Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks

10. JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET

11. Privacy Preserving Network Analysis of Distributed Social Networks

12. A Solution to Detect Phishing in Android Devices

13. Generic Construction of Certificateless Signcryption Scheme

14. A Secure Routing Scheme for Wireless Mesh Networks

15. Risk Evaluation of X.509 Certificates – A Machine Learning Application

16. Network Vulnerability Analysis Using a Constrained Graph Data Model

17. Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data

18. Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid

19. On the Security of 'Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems'

20. Network Counter-Attack Strategy by Topology Map Analysis

21. A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations

22. Data Loss Prevention Based on Text Classification in Controlled Environments

23. An Efficient Certificateless Signature Scheme in the Standard Model

24. Building a Fair System Using Access Rights

25. Performance Evaluation of Modified Henon Map in Image Encryption

26. Enhanced Modulo Based Multi Secret Image Sharing Scheme

27. Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications

28. SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing

29. Collaborative Access Decisions: Why Has My Decision Not Been Enforced?

30. Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment

31. Practical DoS Attacks on Embedded Networks in Commercial Vehicles

32. An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms

Catalog

Books, media, physical & digital resources