Search

Your search keyword '"Gabriele Oligeri"' showing total 35 results

Search Constraints

Start Over You searched for: Author "Gabriele Oligeri" Remove constraint Author: "Gabriele Oligeri" Topic business Remove constraint Topic: business
35 results on '"Gabriele Oligeri"'

Search Results

1. MAGNETO

2. The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services

3. KaFHCa: Key-establishment via Frequency Hopping Collisions

4. BrokenStrokes

5. EXCHANge: Securing IoT via channel anonymity

6. GopJam: Key-less jamming mitigation via gossiping

7. Enabling broadcast communications in presence of jamming via probabilistic pairing

8. Drive me not: GPS spoofing detection via cellular network

9. Detecting Drones Status via Encrypted Traffic Analysis

10. N-Guard: a Solution to Secure Access to NFC tags

11. Shooting to the Stars: Secure Location Verification via Meteor Burst Communications

12. SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points

13. LAKE

14. United We Stand: Intrusion Resilience in Mobile Unattended WSNs

15. Jamming mitigation in cognitive radio networks

16. COKE Crypto-Less Over-the-Air Key Establishment

17. A survey of architectures and scenarios in satellite-based wireless sensor networks: system design aspects

18. Strength of Crowd (SOC)—Defeating a Reactive Jammer in IoT with Decoy Messages

19. Communications and networking over satellites: SatNEx experimental activities and testbeds

20. Freedom of speech: thwarting jammers via a probabilistic approach

21. Intrusion-resilience in mobile unattended WSNs

22. ESC: An efficient, scalable, and crypto-less solution to secure wireless networks

23. A cyber-physical approach to secret key generation in smart environments

24. SHAKE: Single HAsh Key Establishment for resource constrained devices

25. Loss Tolerant Video Streaming Authentication in Heterogeneous Wireless Networks

26. Robust and Efficient Authentication of Video Stream Broadcasting

27. Quality of experience in multicast hybrid networks: avoiding bandwidth wasting with a double-stage FEC Scheme

28. AmbiSec: securing smart spaces using entropy harvesting

29. Securing mobile unattended WSNs against a mobile adversary

30. Real-Time Loss Tolerant Video Streaming Authentication for Satellite Links

31. Measurement-based frame error model for simulating outdoor Wi-Fi networks

32. A novel approach for multicast video streaming in hybrid networks

33. Embedding source signature in multicast wireless video streams

34. Frame error model in rural (Wi-Fi) networks

35. Mobile application security for video streaming authentication and data integrity combining digital signature and watermarking techniques

Catalog

Books, media, physical & digital resources