Sfoglia per Relatore
I protocolli di consenso nelle differenti implementazioni della tecnologia blockchain
2022/2023 MARSICH, MANUELE
Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario
2021/2022 BIANCHI, TOMMASO
Implementazione dell'algoritmo eMana per la sicurezza della rete IOTA
2021/2022 D'ALBERTON, ENRICO
O-RAN Threats analysis against Near-RT RIC and E2 nodes
2022/2023 ADAMI, NICOLA
Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment
2022/2023 RIZZO, ALESSANDRO
Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction
2021/2022 CASONATO, MATTEO
Profiling drones via wireless power transfer side channel
2023/2024 CORNACCHIA, MATTEO
Prospettive e Sfide dell’Identità Decentralizzata nell’era della Blockchain
2022/2023 LAZZARIN, NICOLA
Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus
2022/2023 STEFANI, CLAUDIO
Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards
2022/2023 KAWAS, MHD NAZEER
RILEVAMENTO DELLE ANOMALIE NELLA FINANZA DECENTRALIZZATA: OPPORTUNITA' E MINACCE NEI PRESTITI ISTANTANEI
2022/2023 BEDEI, EDOARDO
SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN
2022/2023 HASSAN, RAYYAN
Securing ADS-B Communication Systems Against Location Spoofing Attacks
2022/2023 SALAEVA, SITORA
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures
2022/2023 VAISHNAV, HARSHUL
Un futuro senza password: FIDO e gli autenticatori
2022/2023 MENEGUZZO, STEFANO
Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure
2022/2023 CORRADIN, FEDERICO
Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
---|---|---|---|---|---|
Lauree triennali | 2022 | I protocolli di consenso nelle differenti implementazioni della tecnologia blockchain | Consensus protocols in the different implementations of blockchain technology | MARSICH, MANUELE | |
Lauree magistrali | 2021 | Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario | Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario | BIANCHI, TOMMASO | |
Lauree triennali | 2021 | Implementazione dell'algoritmo eMana per la sicurezza della rete IOTA | Implementation of eMana algorithm for IOTA network security | D'ALBERTON, ENRICO | |
Lauree magistrali | 2022 | O-RAN Threats analysis against Near-RT RIC and E2 nodes | O-RAN Threats analysis against Near-RT RIC and E2 nodes | ADAMI, NICOLA | |
Lauree magistrali | 2022 | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | RIZZO, ALESSANDRO | |
Lauree triennali | 2021 | Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction | Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction | CASONATO, MATTEO | |
Lauree magistrali | 2023 | Profiling drones via wireless power transfer side channel | Profiling drones via wireless power transfer side channel | CORNACCHIA, MATTEO | |
Lauree triennali | 2022 | Prospettive e Sfide dell’Identità Decentralizzata nell’era della Blockchain | Perspectives and Challenges of Decentralized Identities in the Blockchain era | LAZZARIN, NICOLA | |
Lauree magistrali | 2022 | Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus | A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions | STEFANI, CLAUDIO | |
Lauree magistrali | 2022 | Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards | Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards | KAWAS, MHD NAZEER | |
Lauree triennali | 2022 | RILEVAMENTO DELLE ANOMALIE NELLA FINANZA DECENTRALIZZATA: OPPORTUNITA' E MINACCE NEI PRESTITI ISTANTANEI | ANOMALY DETECTION IN DECENTRALIZED FINANCE: OPPORTUNITIES AND THREATS IN FLASH LOANS | BEDEI, EDOARDO | |
Lauree magistrali | 2022 | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | HASSAN, RAYYAN | |
Lauree magistrali | 2022 | Securing ADS-B Communication Systems Against Location Spoofing Attacks | Securing ADS-B Communication Systems Against Location Spoofing Attacks | SALAEVA, SITORA | |
Lauree magistrali | 2022 | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | VAISHNAV, HARSHUL | |
Lauree triennali | 2022 | Un futuro senza password: FIDO e gli autenticatori | A passwordless future: FIDO and authenticators | MENEGUZZO, STEFANO | |
Lauree magistrali | 2022 | Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure | Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure | CORRADIN, FEDERICO |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile