Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Chiara Braghin"'
Autor:
George Hatzivasilis, George Spanoudakis, Fulvio Frati, Torsten Hildebrandt, Robert Bordianu, Oleg Blinder, Vito Petrarolo, Sebastian Pape, Chiara Braghin, Sotiris Ioannidis, Ernesto Damiani, George Leftheriotis, Hristo Koshutanski, Martin Kunc, Fotis Oikonomou, Giovanni Magilo, Ludger Goeke, Antonio Chieti, Michael Vinov, Michail Smyrlis, George Tsakirakis
Publikováno v:
CSR
Emerging technologies are facilitating our daily activities and drive the digital transformation. The Internet of Things (IoT) and 5G communications will provide a wide range of new applications and business opportunities, but with a wide and quite c
Publikováno v:
Rigorous State-Based Methods ISBN: 9783030775421
ABZ
ABZ
In the security protocols domain, formal verification is more and more highly demanded to guarantee security assurance: humans increasingly depend on the use of connected devices in their daily life, so they must be protected against possible threats
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::482051df7fc1ecb2859c4a44716bdafe
https://doi.org/10.1007/978-3-030-77543-8_2
https://doi.org/10.1007/978-3-030-77543-8_2
Publikováno v:
SECRYPT
Autor:
Ernesto Damiani, Chiara Braghin, Sadegh M. Astaneh, Stelvio Cimato, Elvinia Riccobene, Fulvio Frati
Publikováno v:
Model-driven Simulation and Training Environments for Cybersecurity-Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Model-driven Simulation and Training Environments for Cybersecurity
Model-driven Simulation and Training Environments for Cybersecurity ISBN: 9783030624323
MSTEC
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Model-driven Simulation and Training Environments for Cybersecurity
Model-driven Simulation and Training Environments for Cybersecurity ISBN: 9783030624323
MSTEC
Cyber ranges are virtual environments used in several contexts to enhance the awareness and preparedness of users to cybersecurity threats. Effectiveness of cyber ranges strongly depends on how much realistic are the training scenarios provided to tr
Publikováno v:
Computer Security-ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers
Computer Security ISBN: 9783030420505
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Security
Computer Security ISBN: 9783030420505
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Security
Cyber ranges for training in threat scenarios are nowadays highly demanded in order to improve people ability to detect vulnerabilities and to react to cyber-threats. Among the other components, scenarios deployment requires a modeling language to ex
Publikováno v:
Security with Intelligent Computing and Big-data Services ISBN: 9783030169459
In this paper, we developed an online auction system based on Ethereum smart contracts. A smart contract is executable code that runs on top of the blockchain to facilitate, execute and enforce an agreement between untrusted parties without the invol
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8cb84a3461c76900e022494f35aa8fd7
https://doi.org/10.1007/978-3-030-16946-6_5
https://doi.org/10.1007/978-3-030-16946-6_5
Publikováno v:
Business Information Systems Workshops ISBN: 9783030366902
BIS (Workshops)
BIS (Workshops)
Electronic voting is one of the most challenging cryptographic problems, since the developed system should guarantee strong and sometimes contrasting security properties. Blockchain technology can be of help providing for free some important guarante
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2cdb268e1991f86f7bf29ee7b6e4c647
https://doi.org/10.1007/978-3-030-36691-9_24
https://doi.org/10.1007/978-3-030-36691-9_24
Publikováno v:
COMPSAC (2)
mHealth applications are becoming increasingly widespread since they have the potential to reduce the cost of health care by favoring self-management of chronic diseases or to improve fitness activities. By their very nature, health applications coll
Autor:
Marilisa Del Vecchio, Chiara Braghin
Publikováno v:
COMPSAC (2)
After the NSA surveillance revelations in 2013, people became aware of the lack of privacy with respect to the US government. But are users aware that also apps may spy them, collect and even sell their personal data? From their common behavior durin