Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Pierluigi Failla"'
Publikováno v:
Proceedings of the Fourth Italian Conference on Computational Linguistics CLiC-it 2017 ISBN: 9788899982942
CLiC-it
CLiC-it
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c89f65dddae8ebb8c1c31674de17512c
https://doi.org/10.4000/books.aaccademia.2444
https://doi.org/10.4000/books.aaccademia.2444
Publikováno v:
Security and Privacy in Biometrics ISBN: 9781447152293
Security and Privacy in Biometrics
Security and Privacy in Biometrics
The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raisi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::528d3f425f87b79393d9273d9e360917
https://doi.org/10.1007/978-1-4471-5230-9_7
https://doi.org/10.1007/978-1-4471-5230-9_7
Publikováno v:
WIFS
In this paper we consider the problem of Radar Specific Emitter Identification (SEI) with the aim of distinguishing among several transmitting sources of the same kind which is a very hot topic in the device forensic field. At the design stage, we in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7b1829da94ae94f08b22975752798819
http://hdl.handle.net/11588/651834
http://hdl.handle.net/11588/651834
Autor:
Pierluigi Failla, Mauro Barni
Publikováno v:
Trustworthy Internet ISBN: 9788847018174
In this paper we address a privacy preserving version of the well known Gram-Schmidt orthogonalization procedure. Specifically, we propose a building block for secure multiparty computation, that is able to orthogonalize a set of componentwise encryp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4b8e298b2c4940833809db6bbbd8a44b
https://doi.org/10.1007/978-88-470-1818-1_7
https://doi.org/10.1007/978-88-470-1818-1_7
Publikováno v:
MM&Sec
The fuzzy commitment approach has gained popularity as away to protect biometric data used for identity verification of authentication. As it has been show recently, though, the use of fuzzy commitment is unavoidably linked to some leakage of informa
Autor:
Pierluigi Failla
Publikováno v:
SECURWARE
In this paper, we consider a scenario in which two parties are interested to find, in secure multiparty computation, the shortest path in a public graph. In particular, we consider the case in which, Alice knows the weights on the edges of the graph,
Autor:
Pierluigi Failla, Alessandro Piva, Ruggero Donida Labati, Fabio Scotti, Riccardo Lazzeretti, Mario Di Raimondo, Vincenzo Piuri, Dario Fiore, Dario Catalano, Tiziano Bianchi, Mauro Barni
Publikováno v:
MM&Sec
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learning if the acquired fingerprint belongs to the database of authorized enti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::12aa16944ea48a3a6b97015ff1f54143
http://hdl.handle.net/20.500.11769/81229
http://hdl.handle.net/20.500.11769/81229
Autor:
Fabio Scotti, Riccardo Lazzeretti, Tiziano Bianchi, Vincenzo Piuri, Dario Catalano, Dario Fiore, Alessandro Piva, Mauro Barni, Pierluigi Failla, Ruggero Donida Labati, Mario Di Raimondo
Publikováno v:
BTAS
The privacy protection of the biometric data is an important research topic, especially in the case of distributed biometric systems. In this scenario, it is very important to guarantee that biometric data cannot be steeled by anyone, and that the bi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::404cd7d2135d9c64fa29c40341ed66cf
http://hdl.handle.net/11365/36797
http://hdl.handle.net/11365/36797
Autor:
Pierluigi Failla, Ahmad-Reza Sadeghi, Mauro Barni, Thomas Schneider, Riccardo Lazzeretti, Vladimir Kolesnikov
Publikováno v:
Computer Security – ESORICS 2009 ISBN: 9783642044434
ESORICS
ESORICS
Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Branching programs (BP) is a popular representation model for describing the underly
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1a76f7d468da9f950dff18431fa9f569
http://hdl.handle.net/11573/967142
http://hdl.handle.net/11573/967142
Autor:
Thomas Schneider, Pierluigi Failla, Annika Paus, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Mauro Barni, Riccardo Lazzeretti
Publikováno v:
WIFS
We describe a privacy-preserving system where a server can classify an ElectroCardioGram (ECG) signal without learning any information about the ECG signal and the client is prevented from gaining knowledge about the classification algorithm used by
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::08cc5695f209e74b4c69a50f9b537267
http://hdl.handle.net/11573/967138
http://hdl.handle.net/11573/967138