RANISE, SILVIO

RANISE, SILVIO  

Mostra records
Risultati 1 - 18 di 18 (tempo di esecuzione: 0.032 secondi).
Titolo Data di pubblicazione Autore(i) File
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments 1-gen-2021 Pernpruner, Marco; Sciarretta, Giada; Ranise, Silvio
A Modular and Extensible Framework for Securing TLS 1-gen-2022 Rizzi, Matteo; Manfredi, Salvatore; Sciarretta, Giada; Ranise, Silvio
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols 1-gen-2024 Pernpruner, Marco; Carbone, Roberto; Sciarretta, Giada; Ranise, Silvio
Automated assistance to the security assessment of API for financial services 1-gen-2021 Bisegna, Andrea; Carbone, Roberto; Ceccato, Mariano; Manfredi, Salvatore; Ranise, Silvio; Sciarretta, Giada; Tomasi, Alessandro; Viglianisi, Emanuele
Blockchain Based RAN Data Sharing 1-gen-2021 Heider-Aviet, A; Ollik, Dr; Berlato, S; Ranise, S; Carbone, R; Le, Vt; El Ioini, N; Pahl, C; Barzegar, Hr
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment 1-gen-2021 Berlato, S; Carbone, R; Ranise, S
Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS 1-gen-2022 Rizzi, Matteo; Manfredi, Salvatore; Sciarretta, Giada; Ranise, Silvio
Do Security Reports Meet Usability?: Lessons Learned from Using Actionable Mitigations for Patching TLS Misconfigurations 1-gen-2021 Manfredi, S.; Ceccato, M.; Sciarretta, G.; Ranise, S.
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations 1-gen-2022 Manfredi, Salvatore; Ceccato, Mariano; Sciarretta, Giada; Ranise, Silvio
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies 1-gen-2022 Berlato, S; Morelli, U; Carbone, R; Ranise, S
Finsec 2019 preface 1-gen-2020 Abie, H.; Ranise, S.; Verderame, L.; Siena, A.
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 1-gen-2022 Berlato, S; Carbone, R; Lee, Aj; Ranise, S
Lost in TLS? no more! assisted deployment of secure TLS configurations 1-gen-2019 Manfredi, Salvatore; Ranise, Silvio; Sciarretta, Giada
Security Considerations on 5G-Enabled Back-Situation Awareness for CCAM 1-gen-2020 Centenaro, M; Berlato, S; Carbone, R; Burzio, G; Cordella, Gf; Ranise, S; Riggio, R
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 1-gen-2016 Ranise, Silvio; Carbone, Roberto; Armando, Alessandro; Sciarretta, Giada
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review 1-gen-2022 Berlato, S; Centenaro, M; Ranise, S
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 1-gen-2020 Pernpruner, Marco; Carbone, Roberto; Ranise, Silvio; Sciarretta, Giada
TLSAssistant Goes FINSEC A Security Platform Integration Extending Threat Intelligence Language 1-gen-2021 Manfredi, Salvatore; Ranise, Silvio; Sciarretta, Giada; Tomasi, Alessandro