Sfoglia per Serie  IFIP ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 1 a 15 di 15
Titolo Anno di pubblicazione Autori Unitn File
Assisted authoring, analysis and enforcement of access control policies in the cloud 1-gen-2017 Ranise S. +
Decoy password vaults: At least as hard as steganography? 1-gen-2017 Pasquini, Cecilia +
Design and security assessment of usable multi-factor authentication and single sign-on solutions for mobile applications: a workshop experience report 1-gen-2019 Ranise S. +
Designing and implementing a web platform to support SMEs in collaborative product development 1-gen-2013 Formentini M. +
Hybrid Heat Pump Systems as a Possible Solution for the Energy Transition Towards Sustainable Heating Systems for Buildings 1-gen-2021 Prada A. +
Information Security and Privacy – Challenges and Outlook 1-gen-2021 Massacci F. +
International Norms and Socio-Technical Systems: Connecting Institutional and Technological Infrastructures in Governance Processes 1-gen-2012 Pavan, Elena +
Investigating the Role of Institutional Frameworks in Food Waste Reduction at the Retailer Interface in the European Union 1-gen-2021 Formentini M. +
Laugh When You’re Winning 1-gen-2014 Niewiadomski Radoslaw +
A Maturity Assessment Model for Cyber Security Education in Europe 1-gen-2022 Vidor S.Budde C. E.
Modeling and Control of Low-Frequency Electromagnetic Fields in Multiply Connected Conductors 1-gen-2016 Valli, A. +
Ontology-based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare 1-gen-2016 Giunchiglia, FaustoHume, AlethiaChenu Ronald +
Optimal security configuration for cyber insurance 1-gen-2018 Uuganbayar G.Yautsiukhin A. +
Quality Criteria for Cyber Security MOOCs 1-gen-2020 Sterlini, Pierantonia +
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials 1-gen-2021 Hariri, AliCrispo, Bruno +
Mostrati risultati da 1 a 15 di 15
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile