Sfoglia per Serie
Control-flow flattening preserves the constant-time policy
2020-01-01 Busi, M.; Degano, P.; Galletta, L.
Enhancing malware classification with symbolic features
2021-01-01 Siwach, C.; Costa, G.; de Nicola, R.
Is the Road to Hell Paved with Good Intentions? A Criminological and Criminal Law Analysis of Prospective Regulation for Ethical Hacking in Italy and the EU
2024-01-01 Fiorinelli, Gaia; Zucca, Maria Vittoria
MUAC: Access control language for mutual benefits
2020-01-01 Ceragioli, L.; Degano, P.; Galletta, L.
A Netting Protocol for Liquidity-saving Automated Market Makers
2024-01-01 Renieri, M.; Galletta, L.; Lafuente, A. L.; Chiang, J. H. -Y.
Pattern-preserving k-anonymization of sequences and its application to mobility data mining
2008-01-01 Pensa, R. G.; Monreale, A.; Pinelli, F.; Pedreschi, D.
Simpson's Proof Systems for Process Verification: A Fine-tuning (short paper)
2024-01-01 Perini Brogi, Cosimo; DE NICOLA, Rocco; Inverso, Omar
Toward Dynamic Epistemic Verification of Zero-Knowledge Protocols
2024-01-01 Costa, Gabriele; Perini Brogi, Cosimo
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile