UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 59
1.
  • Security and Privacy of IP-... Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey
    Bardhi, Enkeleda; Conti, Mauro; Lazzeretti, Riccardo ... IEEE Communications surveys and tutorials, 10/2023, Letnik: 25, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Today's Internet is experiencing a massive number of users with a continuously increasing need for data, which is the leading cause of introduced limitations among security and privacy issues. To ...
Celotno besedilo
2.
  • A survey on security and pr... A survey on security and privacy issues of UAVs
    Mekdad, Yassine; Aris, Ahmet; Babun, Leonardo ... Computer networks (Amsterdam, Netherlands : 1999), April 2023, 2023-04-00, Letnik: 224
    Journal Article
    Recenzirano
    Odprti dostop

    In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this ...
Celotno besedilo
3.
  • Collective Remote Attestati... Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges
    Ambrosin, Moreno; Conti, Mauro; Lazzeretti, Riccardo ... IEEE Communications surveys and tutorials, 01/2020, Letnik: 22, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    In recent years, the booming of Internet of Things (IoT) has populated the world with billions of smart devices that implement novel services and applications. The potential for cyberattacks on IoT ...
Celotno besedilo
4.
  • Learning With Privacy in Co... Learning With Privacy in Consensus + Obfuscation
    Braca, Paolo; Lazzeretti, Riccardo; Marano, Stefano ... IEEE signal processing letters, 09/2016, Letnik: 23, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    We examine the interplay between learning and privacy over multiagent consensus networks. The learning objective of each individual agent consists of computing some global network statistic, and is ...
Celotno besedilo
5.
  • Anonymous Federated Learnin... Anonymous Federated Learning via Named-Data Networking
    Agiollo, Andrea; Bardhi, Enkeleda; Conti, Mauro ... Future generation computer systems, March 2024, 2024-03-00, Letnik: 152
    Journal Article
    Recenzirano
    Odprti dostop

    Federated Learning (FL) represents the de facto approach for distributed training of machine learning models. Nevertheless, researchers have identified several security and privacy FL issues. Among ...
Celotno besedilo
6.
  • Privacy-Preserving ECG Clas... Privacy-Preserving ECG Classification With Branching Programs and Neural Networks
    Barni, Mauro; Failla, Pierluigi; Lazzeretti, Riccardo ... IEEE transactions on information forensics and security, 2011-June, 2011-06-00, 20110601, Letnik: 6, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Privacy protection is a crucial problem in many biomedical signal processing applications. For this reason, particular attention has been given to the use of secure multiparty computation techniques ...
Celotno besedilo

PDF
7.
Celotno besedilo

PDF
8.
  • SEMBA: secure multi-biometr... SEMBA: secure multi-biometric authentication
    Barni, Mauro; Droandi, Giulia; Lazzeretti, Riccardo ... IET biometrics, 11/2019, Letnik: 8, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Biometrics security is a dynamic research area spurred by the need to protect personal traits from threats like theft, non-authorised distribution, reuse and so on. A widely investigated solution to ...
Celotno besedilo

PDF
9.
  • Piecewise Function Approxim... Piecewise Function Approximation With Private Data
    Lazzeretti, Riccardo; Pignata, Tommaso; Barni, Mauro IEEE transactions on information forensics and security, 2016-March, 2016-3-00, 20160301, Letnik: 11, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    We present two secure two party computation (STPC) protocols for piecewise function approximation on private data. The protocols rely on a piecewise approximation of the to-be-computed function ...
Celotno besedilo

PDF
10.
  • A comprehensive security an... A comprehensive security and performance assessment of UAV authentication schemes
    Mekdad, Yassine; Aris, Ahmet; Acar, Abbas ... Security and privacy, January/February 2024, 2024-01-00, Letnik: 7, Številka: 1
    Journal Article
    Recenzirano

    In the past few years, unmanned aerial vehicles (UAVs) have significantly gained attention and popularity from industry, government, and academia. With their rapid development and deployment into the ...
Celotno besedilo
1 2 3 4 5
zadetkov: 59

Nalaganje filtrov