Sfoglia per Correlatore  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 1 a 20 di 41
Titolo Anno Autore file(s)
Analysis of Cryptographic Vulnerabilities in Docker Images 21-lug-2022 Camoli, Filippo
Analysis of the EU Digital COVID Certificate system and proposal of design improvements 8-giu-2022 Arrigo, Giacomo
An Area of Trust - Trusted Execution Environment 20-ott-2022 Regonda, Brahmashwini
Assessing Organisations' Cyber Attack Exposure through Cyber Threat Intelligence 16-ott-2023 Salvagnin, Alessandro
Attack graph modeling for web application vulnerability representation and analysis 21-lug-2023 Serani, Hernest
Automated usability analysis of secure QR codes 16-mar-2023 Cester, Andrea
Blockchain based log manager 21-mar-2022 Benetollo, Lorenzo
Client-side security through JavaScript API wrapping 23-mar-2017 Baesso, Andrea
Client-Side Security Using CORS 9-mar-2016 Abdelhamied, Mohamed Abdelhamied Hassan
Cookie Protection Through Browser Extensions 30-giu-2016 Carotti, Alberto
Cross Platform Web based Fuzzing 27-mar-2024 Khan, Muhammad Jalil
CSP Synthesis 10-lug-2019 Chiarot, Giacomo
Cyber data intelligence tool: from raw data breaches to structured storing, performant searching and user-friendly visualisation 16-lug-2021 Moruzzi, Davide
Development of a MS CryptoAPI CNG tracer 30-giu-2016 Bustreo, Paolo
Digital Forensic,overview and real scenarious 30-ott-2013 Gastaldon, Davide
Digital Right Management 26-giu-2014 Stocco, Alessandro
Efficient Black-box JTAG Discovery 21-mar-2018 Francescato, Riccardo
Enforcing Session Integrity in the World "Wild" Web 12-mar-2015 Tempesta, Mauro
Evaluating the Effectiveness of Password Policies and Password Meters Using Hashcat 27-mar-2024 Tubia, Marco
Extending the pwntools library with known cryptographic attacks on RSA 7-mar-2019 Venuto, Loris
Mostrati risultati da 1 a 20 di 41
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile