Search


Current filters:
Start a new search
Add filters:

Use filters to refine the search results.


Risultati: 1 - 10 di 12
Documenti rinvenuti:
Data di edizioneTitoloAutore/i
23-giu-2017Cyber security and ubiquity: an human-centric approachColella, Antonio; De Santis, Alfredo; De Santis, Alfredo
3-mar-2018Round and computational efficiency of two-party protocolsCiampi, Michele; Chiacchio, Pasquale; Persiano, Giuseppe
8-mar-2018Fuzzy models for group decision making and applications to e-learning and recommender systemsCapuano, Nicola; Chiacchio, Pasquale; Loia, Vincenzo
12-mar-2018Delayed-Input and Non-Malleable Cryptographic ProtocolsSiniscalchi, Luisa; Chiacchio, Pasquale; Visconti, Ivan
5-set-2017Teamwork collaboration around CAE models in an industrial contextGargiulo, Claudio; De Santis, Alfredo; Scarano, Vittorio
6-mar-2019On Provable Security of Entity Authentication SchemesFlores, Manuela; Chiacchio, Pasquale; Masucci, Barbara
7-mar-2019Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification AuthorityMannetta, Marco; Chiacchio, Pasquale; De Prisco, Roberto
12-mar-2019Model Checking Cyber-Physical SystemsDriouich, Youssef; Chiacchio, Pasquale; Parente, Domenico
24-mag-2021Empowering computational science through extreme scalabilityD'Auria, Matteo; Chiacchio, Pasquale; Scarano, Vittorio
12-apr-2021Soft biometrics: emerging traits and applicationsBisogni, Carmen; Chiacchio, Pasquale; Nappi, Michele