Sfoglia per Relatore
A data pseudonymization protocol for smart grids
2011/2012 MAURI, GIULIA
A Framework for Routing Optimization for SD-WAN using Reinforcement Learning
2022/2023 BELLINI, MARTINA
A Middlebox for Intrusion Detection Using Zero-Knowledge Proofs
2022/2023 Andreotti, Davide
A privacy friendly framework for vehicle to grid interactions
2013/2014 FONTANA, SIMONE
A study of Internet behavioral patterns in a real access network
2014/2015 MARETTI, ALESSANDRO
A study of TCP performance in presence of degradation attacks in Ethernet passive optical network
2017/2018 TATSINKOUNDE, CHRISTIAN
Abuso delle content centric networks per distribuire contenuto indesiderato
2012/2013 RASPADORI, RICCARDO
Agent based social interaction in distributed demand side management
2015/2016 EL KHOURY, HANI
Allocazione ottima di contenuti in reti ICN veicolari
2013/2014 BRUNO, FEDERICO
An algorithm for detection and mitigation of degradation attack in Ethernet passive optical networks
2009/2010 DRAKULIC, SANDA
Analisi delle prestazioni su reti CCN con autenticazione hop-by-hop dei contenuti
2013/2014 FANTIN, ALESSANDRO
Analysis of security issues in information centric networking
MAURI, GIULIA
Architetture privacy friendly per l'aggregazione di misure in smart grid
2011/2012 SAVI, MARCO
L'attacco Eclipse al protocollo Chord
2009/2010 MANGIONI, STEFANO
Authorizing access to edge resources using 5G device authentication
2022/2023 GIACOMETTI, LUCA
BLAST. Blockchain assisted transparency
2016/2017 GATTOLIN, ALESSANDRO
Blockchain-based authentication and access control for IoT solutions at the edge
2020/2021 TESTONI, DAVIDE
Classificazione del traffico Internet con attributi per-source
2009/2010 ROTTONDI, CRISTINA EMMA MARGHERITA
Comparison of the serverless platforms for different use cases
2018/2019 COSKUN, ERCAN
Confidential computing : comparison of solutions based on SGX enclave
2020/2021 Dibra, Erind
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili