- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- Cryptographic Implementations and Security
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Opportunistic and Delay-Tolerant Networks
- Security in Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Spam and Phishing Detection
- Vehicular Ad Hoc Networks (VANETs)
- Access Control and Trust
- User Authentication and Security Systems
- Internet Traffic Analysis and Secure E-voting
- Digital Media Forensic Detection
- Distributed systems and fault tolerance
- Video Surveillance and Tracking Methods
- Advanced Data Compression Techniques
- Big Data and Business Intelligence
- Cloud Computing and Resource Management
- Advanced Authentication Protocols Security
- Anomaly Detection Techniques and Applications
- Digital and Cyber Forensics
University of Salerno
2015-2024
Providence University
2022
The University of Texas at San Antonio
2018
Parthenope University of Naples
2018
Newcastle University
2018
Cloud Computing Center
2018
University of Cagliari
2018
A hierarchical key assignment scheme is a method to assign some private information and encryption keys set of classes in partially ordered hierarchy, such way that the higher class can be used derive all lower down hierarchy. Sometimes, it necessary make dynamic updates order implement an access control policy which evolves with time. All security models for schemes have been designed cope static hierarchies do not consider issue performing In this paper, we define concept supporting...
Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according their roles and responsibilities, organized in hierarchies formed by number disjoint classes. Such implemented assigning key each class, so keys for descendant classes can be efficiently derived from higher hierarchy. However, pure hierarchical may represent limitation many real-world cases. In fact, sometimes it is necessary ensure resource task considering...
Nowadays, modern vehicles are becoming even more connected, intelligent, and smart. A vehicle encloses several cyber-physical systems, such as actuators sensors, which controlled by electronic control units (ECUs). Such ECUs connected through in-vehicle networks, and, in turn, networks to the Internet of Vehicles (IoV) provide advanced smart features. However, increase connectivity computerization, although it brings clear advantages, introduces serious safety problems that can also endanger...
Due to their open nature and popularity, Android-based devices have attracted several end-users around the World are one of main targets for attackers. Because reasons given above, it is necessary build tools that can reliably detect zero-day malware on these devices. At moment, many frameworks been proposed applications leverage Machine Learning (ML) techniques. However, an essential requirement consists using very large sophisticated datasets model construction training purposes. Their...
A hierarchical key assignment scheme is a method to assign some private information and encryption keys set of classes in partially ordered hierarchy, such way that the higher class can be used derive all lower down hierarchy. In this paper we analyze security schemes according different notions: with respect indistinguishability against recovery, as well two recently proposed notions strong recovery . We first explore relations between and, particular, prove not stronger than one...
Today's life of e-citizens relies more and on the "always-on" paradigm. This transformed our lives in a way that it is difficult, sometimes impossible, to deal with day-by-day activities without being 'connected". The technology enable an individual take advantage, best way, Ubiquitous Computing paradigm Mobile Communication fostered by wide adoption smart devices such as mobile phone, smartphones, tablets so on. In this work we investigate possibility reliably sending small file via Short...
Health-care management systems are of great relevance because they provide an easy and quick all aspects regarding a patient, not necessarily medical. Furthermore, there more cases pathologies in which diagnosis treatment can be only carried out by using medical imaging techniques. With ever-increasing prevalence, images directly acquired or converted into digital form, for their storage as well subsequent retrieval processing. Similarly, text interpreting image with other associated patient...