1,842 results on '"CONTI, MAURO"'
Search Results
302. Application of Randomness for Security and Privacy in Multi-Party Computation
303. AALMOND: Decentralized Adaptive Access Control of Multi-Party Data Sharing in Industrial Networks
304. De-Authentication Using Ambient Light Sensor
305. A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks
306. PREVIR: Fortifying Vehicular Networks against Denial of Service Attacks
307. Decentralized and Privacy-Preserving Smart Parking with Secure Repetition and Full Verifiability
308. Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps
309. Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
310. A First Look at Shill Looping in NFT Ecosystem
311. Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis
312. SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks
313. Can machine learning model with static features be fooled: an adversarial machine learning approach
314. BlockAuth: BlockChain based distributed producer authentication in ICN
315. On defending against label flipping attacks on malware detection systems
316. TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks
317. Covert Ephemeral Communication in Named Data Networking
318. MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities
319. Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking
320. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
321. Lexical Mining of Malicious URLs for Classifying Android Malware
322. You Are How You Play: Authenticating Mobile Users via Game Playing
323. An ICN-Based Authentication Protocol for a Simplified LTE Architecture
324. SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
325. SILK-TV : Secret Information Leakage from Keystroke Timing Videos
326. Unraveling Reflection Induced Sensitive Leaks in Android Apps
327. Distributed Services Attestation in IoT
328. Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN
329. FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments
330. Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand
331. Cyber Forensics for CPS
332. Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services
333. SnakeGX: A Sneaky Attack Against SGX Enclaves
334. Efficient privacy preserving device authentication in WBANs for industrial e-health applications
335. Efficient physical intrusion detection in Internet of Things: A Node deployment approach
336. LISA: Lightweight context-aware IoT service architecture
337. AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones
338. Analysis and classification of context-based malware behavior
339. Fast multi-hop broadcast of alert messages in VANETs: An analytical model
340. The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack
341. Temporal dynamics of coordinated online behavior: Stability, archetypes, and influence.
342. Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication
343. Turning Privacy-preserving Mechanisms against Federated Learning
344. HDFL: Private and Robust Federated Learning using Hyperdimensional Computing
345. Anonymous Federated Learning via Named-Data Networking
346. Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
347. Beware of Pickpockets: A Practical Attack against Blocking Cards
348. Boosting Big Brother: Attacking Search Engines with Encodings
349. Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition
350. Honey-list based authentication protocol for industrial IoT swarms
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.