Zobrazeno 1 - 10
of 46
pro vyhledávání: '"Barbara Masucci"'
Publikováno v:
Applied Sciences, Vol 13, Iss 10, p 5945 (2023)
In the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has led to the need for the constant entity verification of devices. Recently, a formal framework has been proposed to study resistance to impersonation at
Externí odkaz:
https://doaj.org/article/6a900b4d342943949aed0db7eac3c458
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811548246
SSCC
SSCC
The computational effort required to guarantee the security of a communication, due to the complexity of the cryptographic algorithms, heavily influences the energy consumption and consequently the energy demand of the involved parties. This energy r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::18cbc86f1e66126ece41c1294c149ec5
http://hdl.handle.net/11367/87822
http://hdl.handle.net/11367/87822
Autor:
Arcangelo Castiglione, Alfredo De Santis, Xinyi Huang, Barbara Masucci, Aniello Castiglione, Francesco Palmieri
Publikováno v:
IEEE Transactions on Information Forensics and Security. 11:2349-2364
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys
Autor:
Barbara Masucci, Bruno Carpentieri, Arcangelo Castiglione, Raffaele Pizzolante, Aniello Castiglione, Francesco Palmieri, Alfredo De Santis
Functional magnetic resonance imaging (fMRI) provides an effective and noninvasive tool for researchers to understand cerebral functions and correlate them with brain activities. In addition, with the ever-increasing diffusion of the Internet, such i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::854ca5457436df2f79eb5b72561a1032
http://hdl.handle.net/11367/72852
http://hdl.handle.net/11367/72852
Autor:
Xinyi Huang, Arcangelo Castiglione, Alfredo De Santis, Aniello Castiglione, Barbara Masucci, Francesco Palmieri
With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is moved on centralized network-based repository services, providing elastic outsourced storage capacity, available through remote access. This introduces new
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1f5786bb89e3dda934e0417bd59ad9f4
http://hdl.handle.net/11367/72878
http://hdl.handle.net/11367/72878
Publikováno v:
ARES
A one-message unilateral entity authentication scheme allows one party, called the prover, to authenticate himself, i.e., to prove his identity, to another party, called the verifier, by sending a single authentication message.In this paper we consid
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f8a2c988ece9770949497c26d55a06be
http://hdl.handle.net/11386/4711056
http://hdl.handle.net/11386/4711056
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme , where each class is assigned an encryption key and some private information. A formal security analysis for hierarchical key assignment schemes ha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0cf3781e34834b932849f88f17edb0bb
http://hdl.handle.net/11386/4663136
http://hdl.handle.net/11386/4663136
Autor:
Aniello Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Arcangelo Castiglione
Publikováno v:
Information Security and Privacy ISBN: 9783319403663
ACISP (2)
ACISP (2)
A hierarchical key assignment scheme distribute some private information and encryption keys to a set of classes in a partially ordered hierarchy, so that the private information of higher classes can be employed to derive the keys of classes lower d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a70b634189b25eafbf9bdfe8052fe727
https://doi.org/10.1007/978-3-319-40367-0_3
https://doi.org/10.1007/978-3-319-40367-0_3
Autor:
Xinyi Huang, Arcangelo Castiglione, Barbara Masucci, Jin Li, Aniello Castiglione, Francesco Palmieri, Alfredo De Santis
Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their roles and responsibilities, users are organized in hierarchies formed by a certain number of disjoint clas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::03811e5224f1bec96d99cb02da388b2b
http://hdl.handle.net/11386/4661463
http://hdl.handle.net/11386/4661463
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f0cc8ebcdcc174fd43793cf6e5009e89
http://hdl.handle.net/11386/4673368
http://hdl.handle.net/11386/4673368