246 results on '"Lax, Gianluca"'
Search Results
2. Enabling Lawful Interception in Environments Protected by IoT Safeguard
3. Sicilian Heritage Identity: Between Stereotype and AI-Based Knowledge
4. A Blockchain-Based Solution to Chain (Im)Material Art
5. A Blockchain-Based Solution to Chain (Im)Material Art
6. Improving Opinion Spam Detection by Cumulative Relative Frequency Distribution
7. Disarming visualization-based approaches in malware detection systems
8. Corrigendum to “Disarming visualization-based approaches in malware detection systems” [Computers & Security Volume 126, March 2023, 103062]
9. A Graph-Based Approach to Detect Anomalies Based on Shared Attribute Values
10. An Ethereum-based solution for energy trading in smart grids
11. A System to Access Online Services with Minimal Personal Information Disclosure
12. An integrity-preserving technique for range queries over data streams in two-tier sensor networks
13. Partially-federated learning: A new approach to achieving privacy and effectiveness
14. A Blockchain-based approach for matching desired and real privacy settings of social network users
15. A Graph-Based Approach to Detect Anomalies Based on Shared Attribute Values
16. Editorial Paper of the Special Issue on “Variational Inequalities, Nash Equilibrium Problems and Applications”
17. Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks
18. eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security
19. A System for Privacy-Preserving Analysis of Vehicle Movements
20. Not Only Databases: Social Data and Cybersecurity Perspective
21. Integrating Digital Identity and Blockchain
22. Enhancing Histograms by Tree-Like Bucket Indices
23. Tweetchain: An Alternative to Blockchain for Crowd-Based Applications
24. A Threat to Friendship Privacy in Facebook
25. Implementing Advanced Electronic Signature by Public Digital Identity System (SPID)
26. A Middleware to Allow Fine-Grained Access Control of Twitter Applications
27. Range Query Integrity in Cloud Data Streams with Efficient Insertion
28. Enhancing Public Digital Identity System (SPID) to Prevent Information Leakage
29. A model to support design and development of multiple-social-network applications
30. Analysis-preserving protection of user privacy against information leakage of social-network Likes
31. The Challenge of Privacy in the Cloud
32. Discovering missing me edges across social networks
33. A new form of assortativity in online social networks
34. Experiences Using BDS: A Crawler for Social Internetworking Scenarios
35. A Trust-Based Approach to Clustering Agents on the Basis of Their Expertise
36. A Model to Support Multi-Social-Network Applications
37. Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
38. Social Signature: Signing by Tweeting
39. Driving Global Team Formation in Social Networks to Obtain Diversity
40. Measuring Betweenness Centrality in Social Internetworking Scenarios
41. A Trust-Based Approach for Detecting Compromised Nodes in SCADA Systems
42. Allowing Non-identifying Information Disclosure in Citizen Opinion Evaluation
43. Supporting Information Spread in a Social Internetworking Scenario
44. Enhancing Trust-Based Competitive Multi Agent Systems by Certified Reputation : (Short Paper)
45. Discovering Links among Social Networks
46. Allowing Continuous Evaluation of Citizen Opinions through Social Networks
47. Threats to Legal Electronic Storage: Analysis and Countermeasures
48. Allowing privacy-preserving fog computing with digital identity assurance in remote clinical services
49. Improving Similarity-Based Methods for Information Propagation on Social Networks
50. A Lightweight Authentication Protocol for Web Applications in Mobile Environments
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.