Zobrazeno 1 - 10
of 57
pro vyhledávání: '"Claudio Soriente"'
Publikováno v:
Cryptology and Network Security ISBN: 9783031209734
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4158ee077aec200058c12980e8f4e967
https://doi.org/10.1007/978-3-031-20974-1_6
https://doi.org/10.1007/978-3-031-20974-1_6
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3645b60ab5a33b29c9ceb76b1bf6e9d2
https://doi.org/10.1007/978-3-642-27739-9_1745-1
https://doi.org/10.1007/978-3-642-27739-9_1745-1
Publikováno v:
ACM Transactions on the Web. 13:1-22
Free web proxies promise anonymity and censorship circumvention at no cost. Several websites publish lists of free proxies organized by country, anonymity level, and performance. These lists index hundreds of thousands of hosts discovered via automat
Publikováno v:
Proceedings on Privacy Enhancing Technologies
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 1, Pp 21-42 (2021)
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 1, Pp 21-42 (2021)
In a Functional Encryption scheme (FE), a trusted authority enables designated parties to compute specific functions over encrypted data. As such, FE promises to break the tension between industrial interest in the potential of data mining and user c
Autor:
Ghassan Karame, Claudio Soriente, Damian Gruber, Srdjan Capkun, Srdjan Marinovic, Hubert Ritzdorf
Publikováno v:
IEEE Transactions on Information Forensics and Security
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes access control decisions. Existing clouds are, thus, agnostic to the noti
Publikováno v:
The Computer Journal. 60:1912-1922
Publikováno v:
Blockchain
The Internet of Things (IoT) bears unprecedented security and scalability challenges due to the magnitude of data produced and exchanged by IoT devices and platforms. Some of those challenges are currently being addressed by coupling IoT applications
Publikováno v:
2018 IEEE International Conference on Big Data (Big Data)
IEEE BigData
IEEE BigData
With current technology, a number of entities have access to user mobility traces at different levels of spatio-temporal granularity. At the same time, users frequently reveal their location through different means, including geo-tagged social media
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a182feb1bd93942742090def1c0ef181
http://arxiv.org/abs/1806.02701
http://arxiv.org/abs/1806.02701
Autor:
Sasu Tarkoma, Hien Thi Thu Truong, Nadarajah Asokan, Thien Duc Nguyen, Juhani Toivonen, Claudio Soriente
Publikováno v:
PerCom
Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cbf1662dd754c8290ce30227ce10e02a
http://arxiv.org/abs/1803.07211
http://arxiv.org/abs/1803.07211
Publikováno v:
WWW
Free web proxies promise anonymity and censorship circumvention at no cost. Several websites publish lists of free proxies organized by country, anonymity level, and performance. These lists index hundreds of thousand of hosts discovered via automate