Sfoglia per Serie CEUR WORKSHOP PROCEEDINGS
Mostrati risultati da 1 a 7 di 7
A brief tour of formally secure compilation
2019-01-01 Busi, Matteo; Galletta, Letterio
Control-flow flattening preserves the constant-time policy
2020-01-01 Busi, M.; Degano, P.; Galletta, L.
Enhancing malware classification with symbolic features
2021-01-01 Siwach, C.; Costa, G.; de Nicola, R.
Is the Road to Hell Paved with Good Intentions? A Criminological and Criminal Law Analysis of Prospective Regulation for Ethical Hacking in Italy and the EU
2024-01-01 Fiorinelli, Gaia; Zucca, Maria Vittoria
MUAC: Access control language for mutual benefits
2020-01-01 Ceragioli, L.; Degano, P.; Galletta, L.
Pattern-preserving k-anonymization of sequences and its application to mobility data mining
2008-01-01 Pensa, R. G.; Monreale, A.; Pinelli, F.; Pedreschi, D.
Toward Dynamic Epistemic Verification of Zero-Knowledge Protocols
2024-01-01 Costa, Gabriele; Perini Brogi, Cosimo
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A brief tour of formally secure compilation | 1-gen-2019 | Busi, Matteo; Galletta, Letterio | |
Control-flow flattening preserves the constant-time policy | 1-gen-2020 | Busi, M.; Degano, P.; Galletta, L. | |
Enhancing malware classification with symbolic features | 1-gen-2021 | Siwach, C.; Costa, G.; de Nicola, R. | |
Is the Road to Hell Paved with Good Intentions? A Criminological and Criminal Law Analysis of Prospective Regulation for Ethical Hacking in Italy and the EU | 1-gen-2024 | Fiorinelli, Gaia; Zucca, Maria Vittoria | |
MUAC: Access control language for mutual benefits | 1-gen-2020 | Ceragioli, L.; Degano, P.; Galletta, L. | |
Pattern-preserving k-anonymization of sequences and its application to mobility data mining | 1-gen-2008 | Pensa, R. G.; Monreale, A.; Pinelli, F.; Pedreschi, D. | |
Toward Dynamic Epistemic Verification of Zero-Knowledge Protocols | 1-gen-2024 | Costa, Gabriele; Perini Brogi, Cosimo |
Mostrati risultati da 1 a 7 di 7
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile