Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Alberto Caponi"'
Publikováno v:
Information, Vol 10, Iss 7, p 242 (2019)
Cyber risk management is a very important problem for every company connected to the internet. Usually, risk management is done considering only Risk Analysis without connecting it with Vulnerability Assessment, using external and expensive tools. In
Externí odkaz:
https://doaj.org/article/13aafe14dcff4f2aba20b18b34b22e67
Publikováno v:
Future Internet, Vol 10, Iss 2, p 13 (2018)
Popular mobile apps use push notifications extensively to offer an “always connected” experience to their users. Social networking apps use them as a real-time channel to notify users about new private messages or new social interactions (e.g., f
Externí odkaz:
https://doaj.org/article/9c54968e833f4ad5adb80a284453ae84
Autor:
Claudio Pisa, Bogdan Chifor, Kostantinos Papadamou, Savvas Zannettou, Michael Sirivianos, Steven Gevers, George Gugulea, Alberto Caponi, Annamaria Recupero, Giuseppe Bianchi, Christos Xenakis, Sorin Teican
Publikováno v:
IEEE Transactions on Information Forensics and Security
Current authentication methods on the Web have serious weaknesses. First, services heavily rely on the traditional password paradigm, which diminishes the end-users' security and usability. Second, the lack of attribute-based authentication does not
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a49963824b3f6f299c3883bc9e460a54
http://arxiv.org/abs/1811.08360
http://arxiv.org/abs/1811.08360
Autor:
Alberto Caponi, Giuseppe Bianchi, Giampaolo Rossini, Julio Cesar Carrasquel Gamez, Patrizio Pisani, Antonio Maurizio, Laura Scipione, Francesca Cuomo, Manuel Campo
Publikováno v:
2018 17th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)
Med-Hoc-Net
Med-Hoc-Net
To exploit the LoRaWAN (Long-Range Wide Area Network), it is essential to design suitable allocation schemes for the wireless resources. To this aim, strategies for a fair allocation of Spreading Factors (SF) among the network devices have been prese
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5aca3de59c5eeb8d7edf1c897086e3be
Publikováno v:
Future Internet, Vol 10, Iss 2, p 13 (2018)
Future Internet; Volume 10; Issue 2; Pages: 13
Future Internet; Volume 10; Issue 2; Pages: 13
Popular mobile apps use push notifications extensively to offer an “always connected” experience to their users. Social networking apps use them as a real-time channel to notify users about new private messages or new social interactions (e.g., f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8bff2d317272035db13facd4d14f0c11
http://hdl.handle.net/2108/200557
http://hdl.handle.net/2108/200557
Autor:
Davide Palmisano, Pier Luigi Ventre, Giuseppe Bianchi, Stefano Salsano, Marco Bonola, Alberto Caponi, Giuseppe Siracusano
Publikováno v:
LANMAN
2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)
2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)
Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. On the other side, the network threats ten
Publikováno v:
2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
WiMob
WiMob
User authentication at Wi-Fi Access Points (APs) is becoming an important issue. Wi-Fi APs are indeed ubiquitous, but existing authentication methods such as WPA/WPA2 static pre-shared secret key (PSK), or 802.1X-based online authentication services
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::be2badf19498ec3016270446a0cb221c
http://hdl.handle.net/2108/199627
http://hdl.handle.net/2108/199627
Autor:
Patrizio Pisani, Francesca Cuomo, Alberto Caponi, Giampaolo Rossini, Giuseppe Bianchi, Manuel Campo
Publikováno v:
WiMob
LoRaWAN is emerging as an attractive network infrastructure for ultra low power Internet of Thing devices. Albeit the technology itself is quite mature and specified, how to effectively allocate wireless resources so as to support a large amount of d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d406af7060ff4e12d7dd3c1634a2db9c
http://hdl.handle.net/2108/200553
http://hdl.handle.net/2108/200553
Publikováno v:
Information
Volume 10
Issue 7
Information, Vol 10, Iss 7, p 242 (2019)
Volume 10
Issue 7
Information, Vol 10, Iss 7, p 242 (2019)
Cyber risk management is a very important problem for every company connected to the internet. Usually, risk management is done considering only Risk Analysis without connecting it with Vulnerability Assessment, using external and expensive tools. In
Publikováno v:
ACM SIGCOMM Computer Communication Review. 43:59-67
In some network and application scenarios, it is useful to cache content in network nodes on the fly, at line rate. Resilience of in-network caches can be improved by guaranteeing that all content therein stored is valid. Digital signatures could be