default search action
Alberto Caponi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j7]Kostantinos Papadamou, Steven Gevers, Christos Xenakis, Michael Sirivianos, Savvas Zannettou, Bogdan Chifor, Sorin Teican, George Gugulea, Alberto Caponi, Annamaria Recupero, Claudio Pisa, Giuseppe Bianchi:
Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication. IEEE Trans. Inf. Forensics Secur. 15: 2183-2193 (2020)
2010 – 2019
- 2019
- [j6]Giuseppe Bianchi, Tooska Dargahi, Alberto Caponi, Mauro Conti:
Intelligent conditional collaborative private data sharing. Future Gener. Comput. Syst. 96: 1-10 (2019) - [j5]Pietro Russo, Alberto Caponi, Marco Leuti, Giuseppe Bianchi:
A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management. Inf. 10(7): 242 (2019) - 2018
- [j4]Pierpaolo Loreti, Lorenzo Bracciale, Alberto Caponi:
Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications. Future Internet 10(2): 13 (2018) - [c11]Francesca Cuomo, Julio Cesar Carrasquel Gamez, Antonio Maurizio, Laura Scipione, Manuel Campo, Alberto Caponi, Giuseppe Bianchi, Giampaolo Rossini, Patrizio Pisani:
Towards traffic-oriented spreading factor allocations in LoRaWAN systems. Med-Hoc-Net 2018: 1-8 - [i4]Kostantinos Papadamou, Savvas Zannettou, Giuseppe Bianchi, Alberto Caponi, Annamaria Recupero, Steven Gevers, George Gugulea, Sorin Teican, Bogdan Chifor, Christos Xenakis, Michael Sirivianos:
Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication. CoRR abs/1811.08360 (2018) - 2017
- [j3]Tooska Dargahi, Alberto Caponi, Moreno Ambrosin, Giuseppe Bianchi, Mauro Conti:
A Survey on the Security of Stateful SDN Data Planes. IEEE Commun. Surv. Tutorials 19(3): 1701-1725 (2017) - [c10]Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Davide Palmisano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi:
D-StreaMon: From middlebox to distributed NFV framework for network monitoring. LANMAN 2017: 1-2 - [c9]Davide Palmisano, Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi:
D-STREAMON - NFV-Capable Distributed Framework for Network Monitoring. SOFT5@ITC 2017: 30-35 - [c8]Francesca Cuomo, Manuel Campo, Alberto Caponi, Giuseppe Bianchi, Giampaolo Rossini, Patrizio Pisani:
EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations. WiMob 2017: 1-8 - [c7]Claudio Pisa, Tooska Dargahi, Alberto Caponi, Giuseppe Bianchi, Nicola Blefari-Melazzi:
On the feasibility of attribute-based encryption for WLAN access control. WiMob 2017: 1-8 - [i3]Pier Luigi Ventre, Alberto Caponi, Giuseppe Siracusano, Davide Palmisano, Stefano Salsano, Marco Bonola, Giuseppe Bianchi:
D-STREAMON: from middlebox to distributed NFV framework for network monitoring. CoRR abs/1706.07696 (2017) - 2016
- [c6]Luigi Stammati, Claudio Pisa, Tooska Dargahi, Alberto Caponi, Giuseppe Bianchi:
FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication. ARES 2016: 715-724 - [c5]Alessandro Greco, Alberto Caponi, Giuseppe Bianchi:
Facing lateral movements using widespread behavioral probes. ICITST 2016: 159-160 - [c4]Claudio Pisa, Alberto Caponi, Tooska Dargahi, Giuseppe Bianchi, Nicola Blefari-Melazzi:
WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures. HOTPOST@MobiHoc 2016: 31-36 - [i2]Pier Luigi Ventre, Alberto Caponi, Davide Palmisano, Stefano Salsano, Giuseppe Siracusano, Marco Bonola, Giuseppe Bianchi:
D-STREAMON - a NFV-capable distributed framework for network monitoring. CoRR abs/1608.01377 (2016) - 2015
- [c3]Alberto Caponi, Andrea Detti, Michele Luglio, Cesare Roseti, Francesco Zampognaro:
Mobile-PEP: Satellite terminal handover preserving service continuity. ISWCS 2015: 221-225 - 2014
- [j2]Nicola Blefari-Melazzi, Giuseppe Bianchi, Alberto Caponi, Andrea Detti:
A General, Tractable and Accurate Model for a Cascade of LRU Caches. IEEE Commun. Lett. 18(5): 877-880 (2014) - 2013
- [j1]Giuseppe Bianchi, Andrea Detti, Alberto Caponi, Nicola Blefari-Melazzi:
Check before storing: what is the performance price of content integrity verification in LRU caching? Comput. Commun. Rev. 43(3): 59-67 (2013) - [c2]Giuseppe Bianchi, Hanieh Rajabi, Alberto Caponi, Giulio Picierro:
Conditional disclosure of encrypted whitelists for DDoS attack mitigation. GLOBECOM Workshops 2013: 200-206 - [c1]Andrea Detti, Alberto Caponi, Giuseppe Tropea, Giuseppe Bianchi, Nicola Blefari-Melazzi:
On the interplay among naming, content validity and caching in Information Centric Networks. GLOBECOM 2013: 2108-2113 - [i1]Giuseppe Bianchi, Nicola Blefari-Melazzi, Alberto Caponi, Andrea Detti:
A General, Tractable and Accurate Model for a Cascade of Caches. CoRR abs/1309.0718 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint