Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Caponi, Alberto"'
Autor:
Papadamou, Kostantinos, Zannettou, Savvas, Chifor, Bogdan, Teican, Sorin, Gugulea, George, Recupero, Annamaria, Caponi, Alberto, Pisa, Claudio, Bianchi, Giuseppe, Gevers, Steven, Xenakis, Christos, Sirivianos, Michael
Current authentication methods on the Web have serious weaknesses. First, services heavily rely on the traditional password paradigm, which diminishes the end-users' security and usability. Second, the lack of attribute-based authentication does not
Externí odkaz:
http://arxiv.org/abs/1811.08360
Autor:
Ventre, Pier Luigi, Caponi, Alberto, Siracusano, Giuseppe, Palmisano, Davide, Salsano, Stefano, Bonola, Marco, Bianchi, Giuseppe
Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. On the other side, the network threats ten
Externí odkaz:
http://arxiv.org/abs/1706.07696
Autor:
Ventre, Pier Luigi, Caponi, Alberto, Palmisano, Davide, Salsano, Stefano, Siracusano, Giuseppe, Bonola, Marco, Bianchi, Giuseppe
Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. At the same time, the network threats tend
Externí odkaz:
http://arxiv.org/abs/1608.01377
Publikováno v:
In Future Generation Computer Systems July 2019 96:1-10
Autor:
Papadamou, Kostantinos, Zannettou, Savvas, Bianchi, Giuseppe, Caponi, Alberto, Recupero, Annamaria, Gevers, Steven, Gugulea, George, Teican, Sorin, Chifor, Bogdan, Xenakis, Christos, Sirivianos, Michael
Publikováno v:
IEEE Transactions on Information Forensics and Security
Current authentication methods on the Web have serious weaknesses. First, services heavily rely on the traditional password paradigm, which diminishes the end-users' security and usability. Second, the lack of attribute-based authentication does not
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e6dbc78839557645c05e4148ca7acea4
Autor:
Cuomo, Francesca, César, Julio, Gámez, Carrasquel, Maurizio, Antonio, Scipione, Laura, Campo, Manuel, Caponi, Alberto, Bianchi, Giuseppe, Rossini, Giampaolo, Pisani, Patrizio
Publikováno v:
17th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2018)
17th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2018), Jun 2018, Capri Island, Italy. pp.55-63
17th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2018), Jun 2018, Capri Island, Italy. pp.55-63
Session D: Access techniques; International audience; —To exploit the LoRaWAN (Long-Range Wide Area Network), it is essential to design suitable allocation schemes for the wireless resources. To this aim, strategies for a fair allocation of Spreadi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b6451788879b7a77438e15f987e69c56
https://hal.inria.fr/hal-01832530/document
https://hal.inria.fr/hal-01832530/document
Publikováno v:
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking-HotPOST 16
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking-HotPOST '16
HOTPOST@MobiHoc
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking-HotPOST '16
HOTPOST@MobiHoc
Two mainstream techniques are traditionally used to authorize access to a WiFi network. Small scale networks usually rely on the offline distribution of a WPA/WPA2 static pre-shared secret key (PSK); security hence relies on the fact that this PSK is
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Loreti, Pierpaolo1 pierpaolo.loreti@uniroma2.it, Bracciale, Lorenzo1 lorenzo.bracciale@uniroma2.it, Caponi, Alberto1
Publikováno v:
Future Internet. Feb2018, Vol. 10 Issue 2, p13. 17p. 2 Color Photographs, 1 Black and White Photograph, 5 Graphs.
Publikováno v:
2016 11th International Conference on Availability, Reliability & Security (ARES); 2016, p715-724, 10p