Sfoglia per Autore
Are all firewall systems equally powerful?
2019-01-01 Ceragioli, L.; Degano, P.; Galletta, L.
Robust Declassification by Incremental Typing
2019-01-01 Busi, M.; Degano, P.; Galletta, L.
Using standard typing algorithms incrementally
2019-01-01 Busi, M.; Degano, P.; Galletta, L.
Tracking data trajectories in IoT
2019-01-01 Bodei, C.; Galletta, L.
Private-Yet-Verifiable Contact Tracing
2020-01-01 Canidio, Andrea; Costa, Gabriele; Galletta, Letterio
Analysing the Provenance of IoT Data
2020-01-01 Bodei, Chiara; Galletta, Letterio
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors
2020-01-01 Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Tobias Mühlberg, Jan; Piessens, Frank
A True Concurrent Model of Smart Contracts Executions
2020-01-01 Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio
MUAC: Access control language for mutual benefits
2020-01-01 Ceragioli, L.; Degano, P.; Galletta, L.
Control-flow flattening preserves the constant-time policy
2020-01-01 Busi, M.; Degano, P.; Galletta, L.
Security Metrics at Work on the Things in IoT Systems
2020-01-01 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
A type language for message passing component-based systems
2020-01-01 Savanovic, Zorica; Vieira, Hugo; Galletta, Letterio
Mechanical incrementalization of typing algorithms
2021-01-01 Busi, M.; Degano, P.; Galletta, L.
Modelling and analysing IoT systems
2021-01-01 Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio
Framework, Tools and Good Practices for Cybersecurity Curricula
2021-01-01 Hajny, J.; Ricci, S.; Piesarskas, E.; Levillain, O.; Galletta, L.; De Nicola, R.
A theory of transaction parallelism in blockchains
2021-01-01 Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty
2021-01-01 Degano, P.; Galletta, L.; Gerali, S.
IT-Covid19-IT: la risposta della comunità informatica italiana alla pandemia
2021-01-01 Bonnici, Vincenzo; Cicceri, Giovanni; Distefano, Salvatore; Galletta, Letterio; Polignano, Marco; Scaffidi, Carlo
Stochastic modeling and analysis of the bitcoin protocol in the presence of block communication delays
2021-01-01 Bistarelli, S.; De Nicola, R.; Galletta, L.; Laneve, C.; Mercanti, I.; Veschetti, A.
FWS: Analyzing, maintaining and transcompiling firewalls
2021-01-01 Bodei, C.; Ceragioli, L.; Degano, P.; Focardi, R.; Galletta, L.; Luccio, F.; Tempesta, M.; Veronese, L.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Are all firewall systems equally powerful? | 1-gen-2019 | Ceragioli, L.; Degano, P.; Galletta, L. | |
Robust Declassification by Incremental Typing | 1-gen-2019 | Busi, M.; Degano, P.; Galletta, L. | |
Using standard typing algorithms incrementally | 1-gen-2019 | Busi, M.; Degano, P.; Galletta, L. | |
Tracking data trajectories in IoT | 1-gen-2019 | Bodei, C.; Galletta, L. | |
Private-Yet-Verifiable Contact Tracing | 1-gen-2020 | Canidio, Andrea; Costa, Gabriele; Galletta, Letterio | |
Analysing the Provenance of IoT Data | 1-gen-2020 | Bodei, Chiara; Galletta, Letterio | |
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors | 1-gen-2020 | Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Tobias Mühlberg, Jan; Piessens, Frank | |
A True Concurrent Model of Smart Contracts Executions | 1-gen-2020 | Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio | |
MUAC: Access control language for mutual benefits | 1-gen-2020 | Ceragioli, L.; Degano, P.; Galletta, L. | |
Control-flow flattening preserves the constant-time policy | 1-gen-2020 | Busi, M.; Degano, P.; Galletta, L. | |
Security Metrics at Work on the Things in IoT Systems | 1-gen-2020 | Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L. | |
A type language for message passing component-based systems | 1-gen-2020 | Savanovic, Zorica; Vieira, Hugo; Galletta, Letterio | |
Mechanical incrementalization of typing algorithms | 1-gen-2021 | Busi, M.; Degano, P.; Galletta, L. | |
Modelling and analysing IoT systems | 1-gen-2021 | Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio | |
Framework, Tools and Good Practices for Cybersecurity Curricula | 1-gen-2021 | Hajny, J.; Ricci, S.; Piesarskas, E.; Levillain, O.; Galletta, L.; De Nicola, R. | |
A theory of transaction parallelism in blockchains | 1-gen-2021 | Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio | |
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty | 1-gen-2021 | Degano, P.; Galletta, L.; Gerali, S. | |
IT-Covid19-IT: la risposta della comunità informatica italiana alla pandemia | 1-gen-2021 | Bonnici, Vincenzo; Cicceri, Giovanni; Distefano, Salvatore; Galletta, Letterio; Polignano, Marco; Scaffidi, Carlo | |
Stochastic modeling and analysis of the bitcoin protocol in the presence of block communication delays | 1-gen-2021 | Bistarelli, S.; De Nicola, R.; Galletta, L.; Laneve, C.; Mercanti, I.; Veschetti, A. | |
FWS: Analyzing, maintaining and transcompiling firewalls | 1-gen-2021 | Bodei, C.; Ceragioli, L.; Degano, P.; Focardi, R.; Galletta, L.; Luccio, F.; Tempesta, M.; Veronese, L. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile