63 results on '"Dini, Gianluca"'
Search Results
2. Assessing the Cost of Quantum Security for Automotive Over -The-Air Updates
3. On Improving SimBlock Blockchain Simulator
4. An Analysis of Routing Attacks Against IOTA Cryptocurrency
5. Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment
6. Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia
7. On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
8. BRUSCHETTA: An IoT Blockchain-Based Framework for Certifying Extra Virgin Olive Oil Supply Chain
9. fABElous: An Attribute-Based Scheme for Industrial Internet of Things
10. Virtual private ledgers
11. ABE-Cities: An Attribute-Based Encryption System for Smart Cities
12. Implementation of a wormhole attack against a rpl network: Challenges and effects
13. Virtual private ledgers: embedding private distributed ledgers over a public blockchain by cryptography.
14. A Low-Cost UAV-Based Secure Location Verification Method
15. Sensing the cities with social-aware unmanned aerial vehicles
16. Modeling and generation of secure component communications in AUTOSAR
17. Verifying Data Secure Flow in AUTOSAR Models by Static Analysis
18. Localization with Guaranteed Bound on the Position Error using a Drone
19. Data-Sluice: Fine-grained traffic control for Android application
20. GREP: A group rekeying protocol based on member join history
21. A Low-Cost UAV-Based Secure Location Verification Method.
22. A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications
23. Secure positioning with non-ideal distance bounding protocols
24. The verifier bee: A path planner for drone-based secure location verification
25. A performance evaluation method for WSNs security
26. On simulative analysis of attack impact in Wireless Sensor Networks
27. Probabilistic Contract Compliance for Mobile Applications
28. SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks
29. Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach
30. ASF: An attack simulation framework for wireless sensor networks
31. MOOS middleware and node adaptivity in underwater sensor networks: results from the UAN11 sea trial
32. A cryptographic suite for underwater cooperative applications
33. AUVs as mobile nodes in acoustic communication networks: Field experience at the UAN10 experiment
34. On experimentally evaluating the impact of security on IEEE 802.15.4 networks
35. SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks
36. A new neighborhood monitoring protocol for co-ordination of multi-AGVs
37. RiSeG: A logical ring based secure group communication protocol for Wireless Sensor Networks
38. A reputation-based approach to tolerate misbehaving carriers in Delay Tolerant Networks
39. Scalable rekeying in dynamic multi-groups
40. Considerations on Security in ZigBee Networks
41. BLOBOT: BLOcking BOTs at the Doorstep
42. On securing publish-subscribe systems with security groups
43. Bloumail: an interactive tool for blocking spam at the originator
44. Tolerating, Malicious Monitors in Detecting Misbehaving Robots
45. Consensus-based Distributed Intrusion Detection for Multi-Robot Systems
46. Repairing network partitions in Wireless Sensor Networks
47. Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems
48. Effects of Increasing Users' Attention on Cost in Software Download Interfaces on the Internet
49. Decentralized intrusion detection for secure cooperative multi-agent systems
50. S2RP: a Secure and Scalable Rekeying Protocol for Wireless Sensor Networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.