A survey on energy-aware security mechanisms
A Merlo, M Migliardi, L Caviglione - Pervasive and Mobile Computing, 2015 - Elsevier
The increasing adoption of mobile devices as the preferred tool to access the Internet
imposes to deepen the investigation of security aspects. In parallel, their power constrained …
imposes to deepen the investigation of security aspects. In parallel, their power constrained …
[PDF][PDF] Security Issues and Attacks on the GSM Standard: a Review.
The Global Systems for Mobile communications (GSM) is actually the most widespread
mobile communication technology existing nowadays. Despite being a mature technology …
mobile communication technology existing nowadays. Despite being a mature technology …
Towards a systemic framework for digital forensic readiness
Although digital forensics has traditionally been associated with law enforcement, the impact
of new regulations, industry standards and cyber-attacks, combined with a heavy reliance on …
of new regulations, industry standards and cyber-attacks, combined with a heavy reliance on …
[HTML][HTML] Resource efficiency, privacy and security by design: a first experience on enterprise servers and data storage products triggered by a policy process
D Polverini, F Ardente, I Sánchez, F Mathieux… - computers & …, 2018 - Elsevier
Decreasing the environmental impacts of Information and Communication Technologies
(ICT) devices, whilst at the same time contributing to ensure the data protection and …
(ICT) devices, whilst at the same time contributing to ensure the data protection and …
Text compression and encryption through smart devices for mobile communication
R Pizzolante, B Carpentieri… - … on Innovative Mobile …, 2013 - ieeexplore.ieee.org
Today's life of e-citizens relies more and more on the" always-on" paradigm. This
transformed our lives in a way that it is difficult, and sometimes impossible, to deal with day …
transformed our lives in a way that it is difficult, and sometimes impossible, to deal with day …
A novel steganography approach for voice over IP
In homeland defense and security, secure data transfer is still critical challenging due to the
open nature of Internet. One of the solutions which came to the rescue is the VoIP (Voice …
open nature of Internet. One of the solutions which came to the rescue is the VoIP (Voice …
Model driven design and evaluation of security level in orchestrated cloud services
Cloud-based architectures, services and resources are growing up in complexity day by day.
Composition and Orchestration deal with the problem of creating complex services …
Composition and Orchestration deal with the problem of creating complex services …
An energy-aware framework for reliable and secure end-to-end ubiquitous data communications
A Castiglione, A De Santis… - 2013 5th …, 2013 - ieeexplore.ieee.org
Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi
coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile …
coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile …
BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users
Short Message Service (SMS) is a widely used communication medium for mobile
applications, such as banking, social networking, and e-commerce. Applications of SMS …
applications, such as banking, social networking, and e-commerce. Applications of SMS …
Secure and distributed video surveillance via portable devices
P Albano, A Bruno, B Carpentieri, A Castiglione… - Journal of Ambient …, 2014 - Springer
In this work we present a system for distributed video surveillance based on the Client-
Server model. The system we present can be accessed via portable devices. In many real …
Server model. The system we present can be accessed via portable devices. In many real …