Search

Your search keyword '"CONTI, MAURO"' showing total 42 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Topic privacy Remove constraint Topic: privacy
42 results on '"CONTI, MAURO"'

Search Results

2. RedactBuster: Entity Type Recognition from Redacted Documents

7. Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

8. PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition

9. Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain

10. Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions

11. Obfuscation and Diversification for Securing Cloud Computing

12. Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking

13. CED2: Communication Efficient Disjointness Decision

14. Time Warp: How Time Affects Privacy in LBSs

15. User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.

18. Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.

19. Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.

20. BitProb: Probabilistic Bit Signatures for Accurate Application Identification.

21. Towards privacy preserving unstructured big data publishing.

22. Security and Privacy Analysis of National Science Foundation Future Internet Architectures.

23. Provably Secure Authenticated Key Agreement Scheme for Smart Grid.

24. Robust Smartphone App Identification via Encrypted Network Traffic Analysis.

25. BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.

26. Analyzing Android Encrypted Network Traffic to Identify User Actions.

27. FakeBook: Detecting Fake Profiles in On-Line Social Networks.

28. Time in Privacy Preserving LBSs: An Overlooked Dimension.

29. Towards a Privacy-Preserving Attestation for Virtualized Networks

30. Privacy-Preserving Split Learning via Pareto Optimal Search

31. Two Models are Better Than One: Federated Learning is Not Private for Google GBoard Next Word Prediction

33. Achilles’ Heels: Vulnerable Record Identification in Synthetic Data Publishing

34. A User-Centric Approach to API Delegations : Enforcing Privacy Policies on OAuth Delegations

35. Unsupervised Labelling of Stolen Handwritten Digit Embeddings with Density Matching

36. Evaluation of the Adoption and Privacy Risks of Google Prompts

37. Cluster-Based Anonymization of Knowledge Graphs

38. BioID: A Privacy-Friendly Identity Document

39. On the Statistical Detection of Adversarial Instances over Encrypted Data

40. On the Security of 'Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems'

41. Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment

42. DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone

Catalog

Books, media, physical & digital resources