Search

Your search keyword '"Conti, Mauro"' showing total 111 results

Search Constraints

Start Over You searched for: "Conti, Mauro" Remove constraint "Conti, Mauro" Publisher springer nature switzerland Remove constraint Publisher: springer nature switzerland
111 results on '"Conti, Mauro"'

Search Results

1. Relation Extraction Techniques in Cyber Threat Intelligence

2. RedactBuster: Entity Type Recognition from Redacted Documents

3. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

4. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

5. Acoustic Side-Channel Attacks on a Computer Mouse

6. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection

7. DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network

8. X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices

9. HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments

13. If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps

16. For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

18. Tactics for Account Access Graphs

19. ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment

20. Machine-Checked Proofs of Accountability: How to sElect Who is to Blame

21. n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi

22. stoRNA: Stateless Transparent Proofs of Storage-time

23. You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults

24. Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing

25. Efficient Transparent Polynomial Commitments for zk-SNARKs

26. Syntax-Aware Mutation for Testing the Solidity Compiler

27. When is Slower Block Propagation More Profitable for Large Miners?

28. Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations

29. Bijack: Breaking Bitcoin Network with TCP Vulnerabilities

30. Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition

31. MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack

32. Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC

33. Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks

34. Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks

35. Layered Symbolic Security Analysis in

36. A Rowhammer Reproduction Study Using the Blacksmith Fuzzer

37. Reviving Meltdown 3a

38. Everlasting ROBOT: The Marvin Attack

39. The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard

40. Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements

41. JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

42. Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication

43. Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage

44. Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis

45. Password-Based Credentials with Security Against Server Compromise

46. Code-Based Secret Handshake Scheme, Revisited

47. Threshold Fully Homomorphic Encryption Over the Torus

48. Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head

49. A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth

50. Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE

Catalog

Books, media, physical & digital resources