Sfoglia per Autore
Hierarchical and shared key assignment
2014-01-01 Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence
2015-01-01 Castiglione, Aniello; Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Pizzolante, Raffaele
On the equivalence of two security notions for hierarchical key assignment schemes in the unconditional setting
2015-01-01 Cafaro, Massimo; Civino, Roberto; Masucci, Barbara
Hierarchical and Shared Access Control
2016-01-01 Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Castiglione, Aniello; Li, Jin; Huang, Xinyi
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
2016-01-01 Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara
Cryptographic Hierarchical Access Control for Dynamic Structures
2016-01-01 Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Castiglione, Aniello; Huang, Xinyi
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures
2016-01-01 Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Castiglione, Aniello
On-board format-independent security of functional magnetic resonance images
2017-01-01 Castiglione, Arcangelo; Pizzolante, Raffaele; Palmieri, Francesco; Masucci, Barbara; Carpentieri, Bruno; DE SANTIS, Alfredo; Castiglione, Aniello
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme
2017-01-01 Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Huang, Xinyi; Castiglione, Aniello
One-Message Unilateral Entity Authentication Schemes
2017-01-01 DE SANTIS, Alfredo; Flores, Manuela; Masucci, Barbara
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity
2020-01-01 Castaldo, M.; Castiglione, A.; Masucci, B.; Nappi, M.; Pero, C.
Digital Rights Management e Ingegneria Inversa: Analisi Tecnica e Aspetti Legali
2022-01-01 Ianulardo, Mario; Masucci, Barbara; Cesare Paoli, Giulio
Capture The Flag: un nuovo approccio all’apprendimento della Cybersecurity
2023-01-01 Flores, Manuela; Masucci, Barbara
Provably-Secure One-Message Unilateral Entity Authentication Schemes
2023-01-01 De Santis, A.; Ferrara, A. L.; Flores, M.; Masucci, B.
New Results on Distributed Secret Sharing Protocols
2023-01-01 DE SANTIS, Alfredo; Masucci, Barbara
Continuous Entity Authentication in the Internet of Things Scenario
2023-01-01 De Santis, Alfredo; Ferrara, Anna Lisa; Flores, Manuela; Masucci, Barbara
Hierarchical Key Assignment Schemes with Key Rotation
2024-01-01 Cimorelli Belfiore, Roberta; DE SANTIS, Alfredo; Lisa Ferrara, Anna; Masucci, Barbara
An Information-Theoretic Approach to Anonymous Access Control
2024-01-01 DE SANTIS, Alfredo; Lisa Ferrara, Anna; Masucci, Barbara; Venditti, Giorgio
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Hierarchical and shared key assignment | 1-gen-2014 | Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara | |
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence | 1-gen-2015 | Castiglione, Aniello; Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Pizzolante, Raffaele | |
On the equivalence of two security notions for hierarchical key assignment schemes in the unconditional setting | 1-gen-2015 | Cafaro, Massimo; Civino, Roberto; Masucci, Barbara | |
Hierarchical and Shared Access Control | 1-gen-2016 | Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Castiglione, Aniello; Li, Jin; Huang, Xinyi | |
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes | 1-gen-2016 | Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara | |
Cryptographic Hierarchical Access Control for Dynamic Structures | 1-gen-2016 | Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Castiglione, Aniello; Huang, Xinyi | |
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures | 1-gen-2016 | Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Castiglione, Aniello | |
On-board format-independent security of functional magnetic resonance images | 1-gen-2017 | Castiglione, Arcangelo; Pizzolante, Raffaele; Palmieri, Francesco; Masucci, Barbara; Carpentieri, Bruno; DE SANTIS, Alfredo; Castiglione, Aniello | |
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme | 1-gen-2017 | Castiglione, Arcangelo; DE SANTIS, Alfredo; Masucci, Barbara; Palmieri, Francesco; Huang, Xinyi; Castiglione, Aniello | |
One-Message Unilateral Entity Authentication Schemes | 1-gen-2017 | DE SANTIS, Alfredo; Flores, Manuela; Masucci, Barbara | |
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity | 1-gen-2020 | Castaldo, M.; Castiglione, A.; Masucci, B.; Nappi, M.; Pero, C. | |
Digital Rights Management e Ingegneria Inversa: Analisi Tecnica e Aspetti Legali | 1-gen-2022 | Ianulardo, Mario; Masucci, Barbara; Cesare Paoli, Giulio | |
Capture The Flag: un nuovo approccio all’apprendimento della Cybersecurity | 1-gen-2023 | Flores, Manuela; Masucci, Barbara | |
Provably-Secure One-Message Unilateral Entity Authentication Schemes | 1-gen-2023 | De Santis, A.; Ferrara, A. L.; Flores, M.; Masucci, B. | |
New Results on Distributed Secret Sharing Protocols | 1-gen-2023 | DE SANTIS, Alfredo; Masucci, Barbara | |
Continuous Entity Authentication in the Internet of Things Scenario | 1-gen-2023 | De Santis, Alfredo; Ferrara, Anna Lisa; Flores, Manuela; Masucci, Barbara | |
Hierarchical Key Assignment Schemes with Key Rotation | 1-gen-2024 | Cimorelli Belfiore, Roberta; DE SANTIS, Alfredo; Lisa Ferrara, Anna; Masucci, Barbara | |
An Information-Theoretic Approach to Anonymous Access Control | 1-gen-2024 | DE SANTIS, Alfredo; Lisa Ferrara, Anna; Masucci, Barbara; Venditti, Giorgio |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile