Search

Your search keyword '"Campegiani, Paolo"' showing total 24 results

Search Constraints

Start Over You searched for: Author "Campegiani, Paolo" Remove constraint Author: "Campegiani, Paolo"
24 results on '"Campegiani, Paolo"'

Search Results

1. Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach

2. Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach

3. Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project

5. Comprehensive user requirements engineering methodology for secure and interoperable health data exchange

6. An OpenNCP-based Solution for Secure eHealth Data Exchange

7. A Comprehensive User Requirements Engineering Methodology for Secure and Interoperable Health Information Technologies

9. Security in Computer and Information Sciences

10. Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems

11. Security in Computer and Information Sciences. First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers.

12. Using Blockchains to Strengthen the Security of Internet of Things

13. Deep Learning with Dense Random Neural Networks for Detecting Attacks Against IoT-Connected Home Environments

14. Problem Domain Analysis of IoT-Driven Secure Data Markets

15. Static Analysis-Based Approaches for Secure Software Development

16. GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control

17. Blockchain-Based Logging for the Cross-Border Exchange of eHealth Data in Europe

18. KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System

19. Building an Ethical Framework for Cross-Border Applications: The KONFIDO Project

20. Some Current Cybersecurity Research in Europe

21. Random Number Generation from a Secure Photonic Physical Unclonable Hardware Module

22. Towards a Mobile Malware Detection Framework with the Support of Machine Learning

23. Signalling Attacks in Mobile Telephony

24. Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project

Catalog

Books, media, physical & digital resources