Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Paolo Modesti"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 3, Pp 464-492 (2023)
Network emulation offers a flexible solution for network deployment and operations, leveraging software to consolidate all nodes in a topology and utilizing the resources of a single host system server. This research paper investigated the state of c
Externí odkaz:
https://doaj.org/article/8e38ee951c144c6099f4410e6156fefd
Autor:
Paolo MODESTI
Publikováno v:
Informatics in Education, Vol 19, Iss 3, Pp 425-454 (2020)
As the number of software vulnerabilities discovered increases, the industry is facing difficulties to find specialists to cover the vacancies for security software developers. Considering relevant teaching and learning theories, along with existing
Externí odkaz:
https://doaj.org/article/7a29cad2cd9f4f5c8670f20232889540
Autor:
Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, Anna Kobusińska
Publikováno v:
Future Internet, Vol 14, Iss 3, p 89 (2022)
The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructur
Externí odkaz:
https://doaj.org/article/0f6d1c91ca4246f6931e2b1fd1b08697
Autor:
Paolo Modesti
Publikováno v:
ACM Transactions on Computing Education. 21:1-24
Mobile applications are extremely popular with many higher education institutions offering courses to prepare new developers sought by the software industry. However, teaching and assessing mobile application development poses specific challenges due
Publikováno v:
Rigorous State-Based Methods ISBN: 9783030480769
ABZ
ABZ
To counteract the lack of competition and innovation in the financial services industry, the EU has issued the Second Payment Services Directive (PSD2) encouraging account servicing payment service providers to share data. The UK, similarly to other
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cbc29050019201a660801fa75302b5be
https://doi.org/10.1007/978-3-030-48077-6_16
https://doi.org/10.1007/978-3-030-48077-6_16
Publikováno v:
Computers & Security. 107:102279
The Payment Protocol standard BIP70, specifying how payments in Bitcoin are performed by merchants and customers, is supported by the largest payment processors and most widely-used wallets. The protocol has been shown to be vulnerable to refund atta
Publikováno v:
Bugliesi, M, Calzavara, S, Mödersheim, S A & Modesti, P 2016, ' Security protocol specification and verification with AnBx ', Journal of Information Security and Applications, vol. 30, pp. 46-63 . https://doi.org/10.1016/j.jisa.2016.05.004
Designing distributed protocols is complex and requires actions at very different levels: from the design of an interaction flow supporting the desired application-specific guarantees, to the selection of the most appropriate network-level protection
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030030438
SBMF
SBMF
The EMVCo (EMV® is a registered trademark or trademark of EMVCo, LLC in the US and other countries.) organisation (i.e. MasterCard, Visa, etc.) protocols facilitate worldwide interoperability of secure electronic payments. Despite recent advances, i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6a9fa8a1cbe6657d4f860651ec3448cd
https://doi.org/10.1007/978-3-030-03044-5_12
https://doi.org/10.1007/978-3-030-03044-5_12
Autor:
Paolo Modesti, Remi Garcia
Publikováno v:
The 28th International Symposium on Software Reliability Engineering Workshops (ISSREW)
ISSRE Workshops
ISSRE Workshops
Security protocols are critical components for the construction of secure and dependable distributed applications, but their implementation is challenging and error prone. Therefore, tools for formal modelling and analysis of security protocols can b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8d3d3d1e7955519d2a7b395f727abab9
http://sure.sunderland.ac.uk/id/eprint/8485/1/main.pdf
http://sure.sunderland.ac.uk/id/eprint/8485/1/main.pdf
Autor:
Paolo Modesti
Publikováno v:
Foundations and Practice of Security ISBN: 9783319303024
FPS
8th International Symposium, FPS 2015
FPS
8th International Symposium, FPS 2015
The AnBx compiler is a tool for automatic generation of Java implementations of security protocols specified in a simple and abstract model that can be formally verified. In our model-driven development approach, protocols are described in AnBx, an e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6debb2528b318e0d253f4efeda10e5e6
https://doi.org/10.1007/978-3-319-30303-1_10
https://doi.org/10.1007/978-3-319-30303-1_10