In our modern society the reliance on fast and reliable delivery of large amounts of data is steadily growing as more and more companies and public bodies use data analytics to support their decision processes. At the same time, the rise of the Internet of Things introduces into the public cyberspace a multitude of devices that are often...
-
2017 (v1)PublicationUploaded on: April 14, 2023
-
2017 (v1)Publication
Pattern lock is a very popular mechanism to secure authenticated access to mobile terminals; this is mainly due to its ease of use and the fact that muscle memory endows it with an extreme memorability. Nonetheless, pattern lock is also very vulnerable to smudge and side channels attacks, thus its actual level of security has been often...
Uploaded on: April 14, 2023 -
2018 (v1)Publication
A very common approach adopted to fight the increasing sophistication and dangerousness of malware and hacking is to introduce more complex authentication mechanisms. This approach, however, introduces additional cognitive burdens for users and lowers the whole authentication mechanism acceptability to the point of making it unusable. On the...
Uploaded on: April 14, 2023 -
2016 (v1)Publication
We are witnessing a growing interest around the cost of security in terms of energy consumption. For instance, in wired networking, some proposals have been put forward to try to balance the efficacy of intrusion detection with the need to save energy dynamically, by changing the amount of resources dedicated to security analysis and routing on...
Uploaded on: March 27, 2023 -
2018 (v1)Publication
Smartphone devices are often assuming the role of edge systems in mobile IoT scenarios and the access to cloud-based services through smartphones, for transmitting multiple sensory data related to human activities, often implying some lawful evidence, has become increasingly common. Thus the need for protecting such transactions from abuses and...
Uploaded on: April 14, 2023 -
2018 (v1)Publication
In an always connected world, cyber-attacks and computer security breaches can produce significant financial damages as well as introduce new risks and menaces in everyday's life. As a consequence, more and more sophisticated packet screening/filtering solutions are deployed everywhere, typically on network border devices, in order to sanitize...
Uploaded on: April 14, 2023