Sfoglia per Serie LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens
2019-01-01 Badrinarayanan, S.; Jain, A.; Ostrovsky, R.; Visconti, I.
Universally Composable Secure Computation with Corrupted Tokens
2019-01-01 Chandran, N.; Chongchitmate, W.; Ostrovsky, R.; Visconti, I.
Updatable functional encryption
2017-01-01 Arriaga, A.; Iovino, V.; Tang, Q.
Using selene to verify your vote in JCJ
2017-01-01 Iovino, V.; Rial, A.; Ronne, P. B.; Ryan, P. Y. A.
Using trust and “utility” for group formation in the cloud of things
2019-01-01 Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarne, G. M. L.
Verifiable Inner Product Encryption Scheme
2020-01-01 Soroush, N.; Iovino, V.; Rial, A.; Roenne, P. B.; Ryan, P. Y. A.
The VF3-light subgraph isomorphism algorithm: When doing less is more effective
2018-01-01 Carletti, V.; Foggia, P.; Greco, A.; Saggese, A.; Vento, M.
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities
2020-01-01 Castiglione, A.; Palmieri, F.; Petraglia, M.; Pizzolante, R.
Water Distribution Network Perspective in RAFAEL Project, A System for Critical Infrastructure Risk Analysis and Forecast
2021-01-01 Longobardi, Antonia; Fattoruso, Grazia; Guarnieri, Guido; Di Pietro, Antonio; La Porta, Luigi; Tofani, Alberto; Pollino, Maurizio
Water Losses and Maintenance Investment. An Econometric Model for the Sustainable Management of Water Services
2021-01-01 Dolores, L.; Macchiaroli, M.; De Mare, G.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens | 1-gen-2019 | Badrinarayanan, S.; Jain, A.; Ostrovsky, R.; Visconti, I. | |
Universally Composable Secure Computation with Corrupted Tokens | 1-gen-2019 | Chandran, N.; Chongchitmate, W.; Ostrovsky, R.; Visconti, I. | |
Updatable functional encryption | 1-gen-2017 | Arriaga, A.; Iovino, V.; Tang, Q. | |
Using selene to verify your vote in JCJ | 1-gen-2017 | Iovino, V.; Rial, A.; Ronne, P. B.; Ryan, P. Y. A. | |
Using trust and “utility” for group formation in the cloud of things | 1-gen-2019 | Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarne, G. M. L. | |
Verifiable Inner Product Encryption Scheme | 1-gen-2020 | Soroush, N.; Iovino, V.; Rial, A.; Roenne, P. B.; Ryan, P. Y. A. | |
The VF3-light subgraph isomorphism algorithm: When doing less is more effective | 1-gen-2018 | Carletti, V.; Foggia, P.; Greco, A.; Saggese, A.; Vento, M. | |
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities | 1-gen-2020 | Castiglione, A.; Palmieri, F.; Petraglia, M.; Pizzolante, R. | |
Water Distribution Network Perspective in RAFAEL Project, A System for Critical Infrastructure Risk Analysis and Forecast | 1-gen-2021 | Longobardi, Antonia; Fattoruso, Grazia; Guarnieri, Guido; Di Pietro, Antonio; La Porta, Luigi; Tofani, Alberto; Pollino, Maurizio | |
Water Losses and Maintenance Investment. An Econometric Model for the Sustainable Management of Water Services | 1-gen-2021 | Dolores, L.; Macchiaroli, M.; De Mare, G. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile