246 results on '"Lax, Gianluca"'
Search Results
52. A System for Privacy-Preserving Analysis of Vehicle Movements
53. eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security
54. Not Only Databases: Social Data and Cybersecurity Perspective
55. Moving from social networks to social internetworking scenarios: The crawling perspective
56. Enabling Selective Flooding to Reduce P2P Traffic
57. TLS: A Tree-Based DHT Lookup Service for Highly Dynamic Networks
58. Reducing Data Stream Sliding Windows by Cyclic Tree-Like Histograms
59. Bridge analysis in a Social Internetworking Scenario
60. Pre-computing Approximate Hierarchical Range Queries in a Tree-Like Histogram
61. Binary-Tree Histograms with Tree Indices
62. A User Behavior-Based Agent for Improving Web Usage
63. Advances in Information Security and Privacy
64. Exploiting European GNSS and Ethereum in location proof systems
65. Disarming visualization-based approaches in malware detection systems
66. Using Artificial Intelligence for Space Challenges: A Survey
67. Implementing Advanced Electronic Signature by Public Digital Identity System (SPID)
68. Range Query Integrity in Cloud Data Streams with Efficient Insertion
69. A Middleware to Allow Fine-Grained Access Control of Twitter Applications
70. Evading model poisoning attacks in federated learning by a long-short-term-memory-based approach.
71. Approximating sliding windows by cyclic tree-like histograms for efficient range queries
72. The Next Generation of eHealth: A Multidisciplinary Survey
73. Allowing Privacy-Preserving Fog Computing with Digital Identity Assurance in Remote Clinical Services
74. An Ethereum-based solution for energy trading in smart grids
75. Enhancing Public Digital Identity System (SPID) to Prevent Information Leakage
76. A warning on how to implement anonymous credential protocols into the information card framework
77. Implementing disposable credit card numbers by mobile phones
78. CellTrust: a reputation model for C2C commerce
79. Enhancing histograms by tree-like bucket indices
80. A System to Access Online Services with Minimal Personal Information Disclosure
81. Social Signature: Signing by Tweeting
82. A Model to Support Multi-Social-Network Applications
83. A Lightweight Scheme Exploiting Social Networks for Data Minimization According to the GDPR
84. Supporting Information Spread in a Social Internetworking Scenario
85. A Trust-Based Approach for Detecting Compromised Nodes in SCADA Systems
86. Allowing Non-identifying Information Disclosure in Citizen Opinion Evaluation
87. Discovering Links among Social Networks
88. Allowing Continuous Evaluation of Citizen Opinions through Social Networks
89. Enhancing Trust-Based Competitive Multi Agent Systems by Certified Reputation
90. Threats to Legal Electronic Storage: Analysis and Countermeasures
91. Improving Similarity-Based Methods for Information Propagation on Social Networks
92. A Lightweight Authentication Protocol for Web Applications in Mobile Environments
93. Approximate Range Querying over Sliding Windows
94. Experience
95. ID-Service: A Blockchain-Based Platform to Support Digital-Identity-Aware Service Accountability
96. TLS: A Tree-Based DHT Lookup Service for Highly Dynamic Networks
97. Pre-computing Approximate Hierarchical Range Queries in a Tree-Like Histogram
98. A User Behavior-Based Agent for Improving Web Usage
99. Fast range query estimation by N-level tree histograms
100. A Privacy-Preserving Localization Service for Assisted Living Facilities
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.