De Santis, Alfredo.
Alfredo De Santis
De Santis, Alfredo (Computer scientist)
Santis, Alfredo de
Desantis, Alfredo
VIAF ID: 49315311 (Personal)
Permalink: http://viaf.org/viaf/49315311
Preferred Forms
- 100 0 _ ‡a Alfredo De Santis
-
- 100 1 _ ‡a De Santis, Alfredo
- 100 1 _ ‡a De Santis, Alfredo
-
- 100 1 _ ‡a De Santis, Alfredo
-
- 100 1 _ ‡a De Santis, Alfredo ‡c (Computer scientist)
-
-
- 100 1 _ ‡a Santis, Alfredo de
4xx's: Alternate Name Forms (10)
5xx's: Related Names (1)
Works
Title | Sources |
---|---|
Advances in cryptology--EUROCRYPT '94 : Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings | |
Alfazoo | |
Analyzing the Internet Stability in Presence of Disasters | |
An asynchronous covert channel using spam | |
Automatic, Selective and Secure Deletion of Digital Evidence | |
Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? | |
A botnet-based command and control approach relying on swarm intelligence | |
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems | |
Compression and complexity of sequences 1997 : proceedings, Positano, Amalfitan coast, Salerno, Italy, June 11-13, 1997 | |
Device Tracking in Private Networks via NAPT Log Analysis | |
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios | |
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications | |
Engineering a secure mobile messaging framework | |
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats | |
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices | |
An Extensible Framework for Efficient Secure SMS | |
The Forensic Analysis of a False Digital Alibi | |
A Forensic Analysis of Images on Online Social Networks | |
Le grand livre des jeux : 270 jeux pour toutes les saisons | |
How to Forge a Digital Alibi on Mac OS X | |
Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures | |
An intelligent security architecture for distributed firewalling environments | |
Managing key hierarchies for access control enforcement: Heuristic approaches | |
Network anomaly detection with the restricted Boltzmann machine | |
New Steganographic Techniques for the OOXML File Format | |
Noninteractive Zero-Knowledge | |
A Novel Anti-forensics Technique for the Android OS | |
A Novel Methodology to Acquire Live Big Data Evidence from the Cloud | |
On Secure Data Management in Health-Care Environment | |
On the contrast in visual cryptography schemes | |
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines | |
Sequences II methods in communication, security and computer science | |
Sequences two | |
Steganography and Secure Communication on Online Social Networks and Online Photo Sharing | |
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme | |
Theoretical computer science : proceedings | |
Towards a Lawfully Secure and Privacy Preserving Video Surveillance System |