Search

Your search keyword '"Gianmarco Baldini"' showing total 38 results

Search Constraints

Start Over You searched for: Author "Gianmarco Baldini" Remove constraint Author: "Gianmarco Baldini" Topic computer security Remove constraint Topic: computer security
38 results on '"Gianmarco Baldini"'

Search Results

1. A Survey of Cybersecurity Certification for the Internet of Things

2. An Interledger Blockchain Platform for Cross-Border Management of Cybersecurity Information

3. Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments

4. Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles

5. Autopolicy: Automated Traffic Policing for Improved IoT Network Security

6. Updating IoT devices: challenges and potential approaches

7. An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting

8. Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices

9. Ethical Design in the Internet of Things

10. SecKit: A Model-based Security Toolkit for the Internet of Things

11. Privacy-preserving attribute-based credentials in cooperative intelligent transport systems

12. A wireless propagation analysis for the frequency of the pseudonym changes to support privacy in VANETs

13. Security and privacy issues for an IoT based smart home

14. Public Protection and Disaster Relief Communication System Integrity: A Radio-Flexibility and Identity-Based Cryptography Approach

15. Public Safety Mobile Broadband: A Techno-Economic Perspective

16. Informed consent in Internet of Things: The case study of cooperative intelligent transport systems

17. Distributed access control policies for spectrum sharing

18. Securing disaster supply chains with cryptography enhanced RFID

19. The EULER project: application of software defined radio in joint security operations

20. An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure

21. An agent-based framework for Informed Consent in the internet of things

22. Policies for Efficient Spectrum Sharing

23. Detection of DECT identity spoofing through radio frequency fingerprinting

24. Privacy leakages in Smart Home wireless technologies

25. A Cognitive Access Framework for Security and Privacy Protection in Mobile Cloud Computing

26. A Model-based Security Toolkit for the Internet of Things

27. Enforcement of Security Policy Rules for the Internet of Things

28. Connectivity and Security in a D2D Communication Protocol for Public Safety Applications

29. Identity-based security systems for vehicular ad-hoc networks

30. An Architecture for Secure m-Commerce Applications

31. LTE: the technology driver for future public safety communications

32. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead

33. Adaptive and Distributed Access Control in Cognitive Radio Networks

34. The use of secure RFID to support the resolution of emergency crises

35. Improving Internet of Things device certification with policy-based management

36. Security certification and labelling in Internet of Things

37. Zone Keys Trust Management in Vehicular Networks based on Blockchain

38. Toward a Blockchain-based Platform to Manage Cybersecurity Certification of IoT devices

Catalog

Books, media, physical & digital resources