97 results on '"Riccardo Lazzeretti"'
Search Results
2. Exploring Jamming and Hijacking Attacks for Micro Aerial Drones.
3. X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices.
4. Is AI a Trick or T(h)reat for Securing Programmable Data Planes?
5. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices.
6. Anonymous Federated Learning via Named-Data Networking.
7. FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns.
8. GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks.
9. A comprehensive security and performance assessment of UAV authentication schemes.
10. Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey.
11. Sim2Testbed Transfer: NDN Performance Evaluation.
12. ICN PATTA: ICN Privacy Attack Through Traffic Analysis.
13. Bloom Filter based Collective Remote Attestation for Dynamic Networks.
14. Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey.
15. A survey on security and privacy issues of UAVs.
16. dAPTaset: A Comprehensive Mapping of APT-Related Data.
17. Malware Triage for Early Identification of Advanced Persistent Threat Activities.
18. Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges.
19. Leveraging Blockchain to Enable Smart-Health Applications.
20. PADS: Practical Attestation for Highly Dynamic Swarm Topologies.
21. GATE and FENCE: Geo-Blocking Protocols for Named Data Networking.
22. A Survey on Security and Privacy Issues of UAVs.
23. SEMBA: secure multi-biometric authentication.
24. Ensuring information security by using Haskell's advanced type system.
25. Malware Triage Based on Static Features and Public APT Reports.
26. Building Regular Registers with Rational Malicious Servers and Anonymous Clients.
27. It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features.
28. Anonymous subject identification and privacy information management in video surveillance.
29. Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems.
30. Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach.
31. ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks.
32. Privacy preserving cloud computing through piecewise approximation of multivariate functions.
33. Piecewise Function Approximation With Private Data.
34. Learning With Privacy in Consensus + Obfuscation.
35. Secure multi-party consensus gossip algorithms.
36. Secure Evaluation of Private Functions through Piecewise Linear Approximation.
37. Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting.
38. Privacy preserving ECG quality evaluation.
39. General function evaluation in a STPC setting via piecewise linear approximation.
40. An efficient protocol for private iris-code matching by means of garbled circuits.
41. Division between encrypted integers by means of Garbled Circuits.
42. SEMBA: SEcure multi-biometric authentication.
43. Malware triage for early identification of Advanced Persistent Threat activities.
44. A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
45. Privacy-preserving fingercode authentication.
46. Privacy preserving evaluation of signal quality with application to ECG analysis.
47. Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing.
48. Efficient privacy-preserving classification of ECG signals.
49. Secure Evaluation of Private Linear Branching Programs with Medical Applications.
50. Lossless compression of encrypted grey-level and color images.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.