Browsing Università Ca' Foscari Venezia by Author "Focardi, Riccardo"

DSpace/Manakin Repository

Browsing Università Ca' Foscari Venezia by Author "Focardi, Riccardo"

Sort by: Order: Results:

  • Stocco, Alessandro <1976> (Università Ca' Foscari Venezia, 2014-06-26)
    Con l'avvento delle tecnologie digitali, copiare un file multimediale (audio o video) è diventato semplice e non comporta, a differenza dei supporti analogici, una diminuzione della qualità. Grazie alla diffusione di ...
  • Tempesta, Mauro <1990> (Università Ca' Foscari Venezia, 2019-03-20)
    In the last years most of our daily activities have moved to the digital world, including sensitive operations related to health data management and financial processes. Security flaws in the systems running these critical ...
  • Maffei, Matteo <1978> (Università Ca' Foscari Venezia, 2006-03-21)
  • Francescato, Riccardo <1993> (Università Ca' Foscari Venezia, 2018-03-21)
    Embedded devices represents the most widespread form of computing device in the world. Almost every consumer product manufactured in the last decades contains an embedded system, e.g., refrigerators, smart bulbs, activity ...
  • Tempesta, Mauro <1990> (Università Ca' Foscari Venezia, 2015-03-12)
    Over the last years, client-side attacks against web sessions covered a relevant subset of web security incidents. Existing solutions proposed in the literature and by web standards, though interesting, typically address ...
  • Tubia, Marco <1998> (Università Ca' Foscari Venezia, 2024-03-27)
    When we authenticate on online web sites, passwords are the only thing that separates attackers from getting into our account. When we have to register on web sites, we are asked to generate a password, that we have to ...
  • Venuto, Loris <1992> (Università Ca' Foscari Venezia, 2019-03-07)
  • Benvenuto, Francesco <1996> (Università Ca' Foscari Venezia, 2021-05-10)
    In the past few years the growth of Internet of Things (IoT) devices, made the embedded security field more interesting for potential attackers. Indeed, the embedded devices spread from pacemakers to smart wallets and other ...
  • Squarcina, Marco <1984> (Università Ca' Foscari Venezia, 2014-06-26)
    Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy specifications arising from system administrators' needs, formally verifying that ...
  • Pistolato, Michele <1981> (Università Ca' Foscari Venezia, 2020-03-13)
    Intrusion detection systems represent a fundamental component at the basis of the information security of a computer network. The increasing improvements in the field of data mining, due to the capabilities of the modern ...
  • Bisconcin, Filippo <1995> (Università Ca' Foscari Venezia, 2021-07-16)
    End-to-end verifiable voting systems are commonly based on the security offered by cryptographic operations. Popular voting systems make use of cryptosystems like ElGamal which allows to anonymize votes both through Mix ...
  • Acerbi, Gabriele <1996> (Università Ca' Foscari Venezia, 2020-11-04)
    In this thesis, we focus on helping the process of finding vulnerabilities in software. Even though it is a widely addressed topic, insecure code is still one of the main causes of security issues in in software because a ...
  • Sedláček, Vladimír <1992> (Università Ca' Foscari Venezia, 2022-02-09)
    Thissis esplora la sicurezza dei sistemi crittografici relativi alle curve ellittiche da varie angolazioni. Discutiamo di un modo per sfruttare uno speciale metodo di fattorizzazione basato su curve ellittiche per inserire ...
  • Siviero, Enrico <1995> (Università Ca' Foscari Venezia, 2023-03-16)
    Password are stored in the form of one-way hashes, some password cracking tools such as hashcat can be used to crack efficiently the password using dictionaries and appropriate rules. Recent work show how the tools can be ...
  • Noalettin, Marco <1992> (Università Ca' Foscari Venezia, 2018-03-21)
    With the increasing growth of the Internet of Things (IoT), more and more devices are connected to the Internet to exchange data. These devices are used in many different fields and most of them are powered with battery ...
  • Salce, Licia <1973> (Università Ca' Foscari Venezia, 2014-06-26)
    Si effettua un'analisi dell'efficacia delle regole di un Intrusion Detection System per il rilevamento di attacchi informatici rivolti a servizi web. Si studia l'elaborazione di un insieme di regole per scoprire i tentativi ...
  • Veronese, Leonardo <1995> (Università Ca' Foscari Venezia, 2021-05-10)
    Time/memory trade-offs are general techniques used in the cryptanalysis of hash functions, block ciphers and stream ciphers that aim to reduce the computational effort at the cost of memory usage. Among these techniques ...
  • Carfizzi, Marco <1994> (Università Ca' Foscari Venezia, 2022-03-21)
    Between the beginning and the first half of 2021, countries from the European Union have developed a system in an effort to return a normal life to its citizens. The approved and final solution is what is called the "Digital ...
  • Lazzarotto, Andrea <1991> (Università Ca' Foscari Venezia, 2016-03-09)
    File system analysis is an important process in the fields of data recovery and computer forensics. The file system is formed by metadata describing how files and directories are organized in a hard drive. File system ...
  • Palmarini, Francesco <1986> (Università Ca' Foscari Venezia, 2015-03-12)
    There exists multiple definitions of embedded device and architecture: generally speaking, an embedded device is an object that contains a special-purpose computing system. These devices can be found in many security ...