Sfoglia per Serie
Simulation-based secure functional encryption in the random oracle model
2015-01-01 Iovino, V.; Zebroski, K.
Sinc-Based Convolutional Neural Networks for EEG-BCI-Based Motor Imagery Classification
2021-01-01 Bria, A.; Marrocco, C.; Tortorella, F.
A SLAM Integrated Approach for Digital Heritage Documentation
2021-01-01 Barba, S.; Ferreyra, C.; Cotella, V. A.; di Filippo, A.; Amalfitano, S.
Social signature: Signing by tweeting
2014-01-01 Buccafurri, F.; Fotia, L.; Lax, G.
Supporting Interaction in a Virtual Chorus: Results from a Focus Group
2021-01-01 Francese, R.; Bruno, P.; Tortora, G.
SYCL-bench: A versatile cross-platform benchmark suite for heterogeneous computing
2020-01-01 Lal, S.; Alpay, A.; Salzmann, P.; Cosenza, B.; Hirsch, A.; Stawinoga, N.; Thoman, P.; Fahringer, T.; Heuveline, V.
Symmetric searchable encryption with sharing and unsharing
2018-01-01 Patel, S.; Persiano, G.; Yeo, K.
A System for Controlling How Carefully Surgeons Are Cleaning Their Hands
2019-01-01 Greco, Luca; Percannella, Gennaro; Ritrovato, Pierluigi; Saggese, Alessia; Vento, Mario
TactCube: Designing Mobile Interactions with Ambient Intelligence
2021-01-01 Battistoni, Pietro; di Gregorio, Marianna; Romano, Marco; Sebillo, Monica; Vitiello, Giuliana
A Tactile User Device to Interact with Smart Environments
2021-01-01 Battistoni, Pietro; Sebillo, Monica
Tanger MED SEZs: A Logistic and Industrial Hub in the Western Mediterranean
2020-01-01 Bencardino, Massimiliano; Esposito, Vincenzo
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
2021-01-01 Avitabile, G.; Friolo, D.; Visconti, I.
Tightly-secure PAK(E)
2018-01-01 Becerra, J.; Iovino, V.; Ostrev, D.; Sala, P.; Skrobot, M.
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks
2020-01-01 Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F.
Two-Way Greedy: Algorithms for Imperfect Rationality
2022-01-01 Ferraioli, D.; Penna, P.; Ventre, C.
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens
2019-01-01 Badrinarayanan, S.; Jain, A.; Ostrovsky, R.; Visconti, I.
Universally Composable Secure Computation with Corrupted Tokens
2019-01-01 Chandran, N.; Chongchitmate, W.; Ostrovsky, R.; Visconti, I.
Updatable functional encryption
2017-01-01 Arriaga, A.; Iovino, V.; Tang, Q.
Using selene to verify your vote in JCJ
2017-01-01 Iovino, V.; Rial, A.; Ronne, P. B.; Ryan, P. Y. A.
Using trust and “utility” for group formation in the cloud of things
2019-01-01 Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarne, G. M. L.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Simulation-based secure functional encryption in the random oracle model | 1-gen-2015 | Iovino, V.; Zebroski, K. | |
Sinc-Based Convolutional Neural Networks for EEG-BCI-Based Motor Imagery Classification | 1-gen-2021 | Bria, A.; Marrocco, C.; Tortorella, F. | |
A SLAM Integrated Approach for Digital Heritage Documentation | 1-gen-2021 | Barba, S.; Ferreyra, C.; Cotella, V. A.; di Filippo, A.; Amalfitano, S. | |
Social signature: Signing by tweeting | 1-gen-2014 | Buccafurri, F.; Fotia, L.; Lax, G. | |
Supporting Interaction in a Virtual Chorus: Results from a Focus Group | 1-gen-2021 | Francese, R.; Bruno, P.; Tortora, G. | |
SYCL-bench: A versatile cross-platform benchmark suite for heterogeneous computing | 1-gen-2020 | Lal, S.; Alpay, A.; Salzmann, P.; Cosenza, B.; Hirsch, A.; Stawinoga, N.; Thoman, P.; Fahringer, T.; Heuveline, V. | |
Symmetric searchable encryption with sharing and unsharing | 1-gen-2018 | Patel, S.; Persiano, G.; Yeo, K. | |
A System for Controlling How Carefully Surgeons Are Cleaning Their Hands | 1-gen-2019 | Greco, Luca; Percannella, Gennaro; Ritrovato, Pierluigi; Saggese, Alessia; Vento, Mario | |
TactCube: Designing Mobile Interactions with Ambient Intelligence | 1-gen-2021 | Battistoni, Pietro; di Gregorio, Marianna; Romano, Marco; Sebillo, Monica; Vitiello, Giuliana | |
A Tactile User Device to Interact with Smart Environments | 1-gen-2021 | Battistoni, Pietro; Sebillo, Monica | |
Tanger MED SEZs: A Logistic and Industrial Hub in the Western Mediterranean | 1-gen-2020 | Bencardino, Massimiliano; Esposito, Vincenzo | |
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems | 1-gen-2021 | Avitabile, G.; Friolo, D.; Visconti, I. | |
Tightly-secure PAK(E) | 1-gen-2018 | Becerra, J.; Iovino, V.; Ostrev, D.; Sala, P.; Skrobot, M. | |
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks | 1-gen-2020 | Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F. | |
Two-Way Greedy: Algorithms for Imperfect Rationality | 1-gen-2022 | Ferraioli, D.; Penna, P.; Ventre, C. | |
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens | 1-gen-2019 | Badrinarayanan, S.; Jain, A.; Ostrovsky, R.; Visconti, I. | |
Universally Composable Secure Computation with Corrupted Tokens | 1-gen-2019 | Chandran, N.; Chongchitmate, W.; Ostrovsky, R.; Visconti, I. | |
Updatable functional encryption | 1-gen-2017 | Arriaga, A.; Iovino, V.; Tang, Q. | |
Using selene to verify your vote in JCJ | 1-gen-2017 | Iovino, V.; Rial, A.; Ronne, P. B.; Ryan, P. Y. A. | |
Using trust and “utility” for group formation in the cloud of things | 1-gen-2019 | Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarne, G. M. L. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile