30 results on '"Luccio, Flaminia L."'
Search Results
2. The Revenge of Password Crackers: Automated Training of Password Cracking Tools
3. Secure Key Management Policies in Strand Spaces
4. Gathering of Robots in a Grid with Mobile Faults
5. Usable and Accessible Tourism Websites for Children: A Case Study of a Naturalistic Oasis
6. Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study
7. A Review of Websites and Mobile Applications for People with Autism Spectrum Disorders: Towards Shared Guidelines
8. Mobile Agents Rendezvous in Spite of a Malicious Agent
9. Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors
10. Secure Recharge of Disposable RFID Tickets
11. Type-Based Analysis of PKCS#11 Key Management
12. An Introduction to Security API Analysis
13. Cracking Bank PINs by Playing Mastermind
14. Secure Upgrade of Hardware Security Modules in Bank Networks
15. Blunting Differential Attacks on PIN Processing APIs
16. A New Concept Map Model for E-Learning Environments
17. Type-Based Analysis of PIN Processing APIs
18. Intruder Capture in Sierpiński Graphs
19. Tighter Bounds on Feedback Vertex Sets in Mesh-Based Networks
20. Mobile Agents Rendezvous When Tokens Fail
21. Banana - A Tool for Boundary Ambients Nesting ANAlysis
22. Complexity of Nesting Analysis in Mobile Ambients
23. Fault-Tolerant Support for Reliable Multicast in Mobile Wireless Systems
24. String recognition on anonymous rings
25. Mobile Agents Rendezvous in Spite of a Malicious Agent.
26. Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors.
27. Secure Upgrade of Hardware Security Modules in Bank Networks.
28. Blunting Differential Attacks on PIN Processing APIs.
29. Intruder Capture in Sierpiński Graphs.
30. Fault-Tolerant Support for Reliable Multicast in Mobile Wireless Systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.