Sfoglia per Correlatore
Analysis of Cryptographic Vulnerabilities in Docker Images
2022/2023 Camoli, Filippo
Analysis of the EU Digital COVID Certificate system and proposal of design improvements
2022/2023 Arrigo, Giacomo
An Area of Trust - Trusted Execution Environment
2022/2023 Regonda, Brahmashwini
Assessing Organisations' Cyber Attack Exposure through Cyber Threat Intelligence
2023/2024 Salvagnin, Alessandro
Attack graph modeling for web application vulnerability representation and analysis
2023/2024 Serani, Hernest
Automated usability analysis of secure QR codes
2023/2024 Cester, Andrea
Blockchain based log manager
2022/2023 Benetollo, Lorenzo
Client-side security through JavaScript API wrapping
2017/2018 Baesso, Andrea
Client-Side Security Using CORS
2016/2017 Abdelhamied, Mohamed Abdelhamied Hassan
Cookie Protection Through Browser Extensions
2016/2017 Carotti, Alberto
Cross Platform Web based Fuzzing
2024/2025 Khan, Muhammad Jalil
CSP Synthesis
2019/2020 Chiarot, Giacomo
Cyber data intelligence tool: from raw data breaches to structured storing, performant searching and user-friendly visualisation
2021/2022 Moruzzi, Davide
Development of a MS CryptoAPI CNG tracer
2016/2017 Bustreo, Paolo
Digital Forensic,overview and real scenarious
2013/2014 Gastaldon, Davide
Digital Right Management
2014/2015 Stocco, Alessandro
Efficient Black-box JTAG Discovery
2018/2019 Francescato, Riccardo
Enforcing Session Integrity in the World "Wild" Web
2015/2016 Tempesta, Mauro
Evaluating the Effectiveness of Password Policies and Password Meters Using Hashcat
2024/2025 Tubia, Marco
Extending the pwntools library with known cryptographic attacks on RSA
2019/2020 Venuto, Loris
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile