Deliverables
Update documents reporting on dissemination actions carried out according to dissemination plan
D8.5.3: Dissemination ReportUpdate documents reporting on dissemination actions carried out according to dissemination plan
D8.5.1: Dissemination ReportUpdate documents reporting on dissemination actions carried out according to dissemination plan
D8.8: Exploitation and Standardization ReportA document reporting against the expected exploitation actions detailed in D7.6
An event during which project results will be presented to senior stakeholders.
D8.3: Project websiteA website highlighting the achievements of the SUNFISH project.
Publications
Author(s):
Suzic, Bojan; Reiter, Andreas; Marsalek, Alexander
Published in:
2017
Publisher:
2017 IEEE Conference on Communications and Network Security (CNS)
DOI:
10.5281/zenodo.1095647
Author(s):
Paolo Bottoni, Emanuele Gabrielli, Gabriele Gualandi, Luigi Vincenzo Mancini, Franco Stolfi
Published in:
2016, Page(s) 168-182
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-44482-6_11
Author(s):
Zefferer, Thomas; Ziegler, Dominik; Reiter, Andreas
Published in:
2017
Publisher:
Academic Centre of Excellence, University of Southampton
DOI:
10.5281/zenodo.1116684
Author(s):
Andreas Reiter
Published in:
Proceedings of the Symposium on Applied Computing - SAC '17, 2017, Page(s) 516-521, ISBN 9781-450344869
Publisher:
ACM Press
DOI:
10.1145/3019612.3019719
Author(s):
Suzic, Bojan
Published in:
Issue 10, 2016
Publisher:
Spinger
DOI:
10.1007/978-3-319-48472-3_60
Author(s):
Suzic, Bojan; Prünster, Bernd; Ziegler, Dominik
Published in:
2018
Publisher:
Proceedings of SAC 2018
DOI:
10.5281/zenodo.1095641
Author(s):
Bojan Suzic, Andreas Reiter
Published in:
2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 750-759, ISBN 978-1-5090-0990-9
Publisher:
IEEE
DOI:
10.1109/ARES.2016.46
Author(s):
E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, V. Sassone
Published in:
2017
Publisher:
CEUR-WS.org
Author(s):
Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone
Published in:
2017 13th European Dependable Computing Conference (EDCC), 2017, Page(s) 151-154, ISBN 978-1-5386-0602-5
Publisher:
IEEE
DOI:
10.1109/EDCC.2017.31
Author(s):
Md Sadek Ferdous, Andrea Margheri, Federica Paci, Mu Yang, Vladimiro Sassone
Published in:
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, Page(s) 2632-2633, ISBN 978-1-5386-1792-2
Publisher:
IEEE
DOI:
10.1109/ICDCS.2017.178
Author(s):
Andrea Margheri, Md Sadek Ferdous, Mu Yang, Vladimiro Sassone
Published in:
2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017, Page(s) 688-691, ISBN 978-1-5386-1993-3
Publisher:
IEEE
DOI:
10.1109/CLOUD.2017.93
Author(s):
Hu, Runshan; Stalla-Bourdillon, Sophie; Yang, Mu; Schiavo, Valeria; Sassone, Vladimiro
Published in:
2017
Publisher:
Hart Publishing
DOI:
10.5281/zenodo.1116275
Author(s):
De Angelis, Stefano, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro
Published in:
2017
Publisher:
University of Southampton
Author(s):
Nicoletti, Luca, Margheri, Andrea, Lombardi, Federico, Sassone, Vladimiro and Schiavo, Francesco Paolo
Published in:
2017
Publisher:
Research Center of Cyber Intelligence and Information Security
Author(s):
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
Published in:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Page(s) 364-375, ISBN 9781-450338325
Publisher:
ACM Press
DOI:
10.1145/2810103.2813635
Author(s):
Federica Paci, Nicola Zannone
Published in:
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies - SACMAT '15, 2015, Page(s) 87-97, ISBN 9781-450335560
Publisher:
ACM Press
DOI:
10.1145/2752952.2752971
Author(s):
Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi
Published in:
Proceedings of the 3rd International Workshop on Security in Cloud Computing - SCC '15, 2015, Page(s) 3-12, ISBN 9781-450334471
Publisher:
ACM Press
DOI:
10.1145/2732516.2732524
Author(s):
Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini
Published in:
2015 IEEE Conference on Communications and Network Security (CNS), 2015, Page(s) 74-82, ISBN 978-1-4673-7876-5
Publisher:
IEEE
DOI:
10.1109/CNS.2015.7346813
Author(s):
Bojan Suzic
Published in:
Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16, 2016, Page(s) 398-405, ISBN 9781-450337397
Publisher:
ACM Press
DOI:
10.1145/2851613.2851622
Author(s):
Bojan Suzic
Published in:
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016, Page(s) 1233-1238, ISBN 978-1-5090-0223-8
Publisher:
IEEE
DOI:
10.1109/NOMS.2016.7502993
Author(s):
Talviste, Riivo
Published in:
2016
Publisher:
University of Tartu Press
DOI:
10.5281/zenodo.1116316
Author(s):
Andreas Reiter
Published in:
2017
Publisher:
Graz University of Technology
Author(s):
Bojan Suzic
Published in:
2018
Publisher:
Graz University of Technology
Author(s):
A. Pasic, B. Gallego, B. Zwattendorfer, B. Suzic, E. Prieto et. al.
Published in:
2017
Publisher:
EU DPSP Cluster
DOI:
10.5281/zenodo.1116267
Author(s):
E. Rios, B. Prunster, B. Suzic, E. Prieto, et. al.
Published in:
2016
Publisher:
EU DPSP Cluster
DOI:
10.5281/zenodo.1116269
Author(s):
Schiavo, Francesco Paolo; Sassone, Vladimiro; Nicoletti, Luca; Margheri, Andrea
Published in:
2016
Publisher:
Cornel University Library
DOI:
10.5281/zenodo.204811
Author(s):
Bojan Suzic, Andreas Reiter, Florian Reimair, Daniele Venturi, Baldur Kubo
Published in:
Procedia Computer Science, Issue 68, 2015, Page(s) 116-126, ISSN 1877-0509
Publisher:
Elsevier B.V.
DOI:
10.1016/j.procs.2015.09.228
Author(s):
Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde
Published in:
IEEE Transactions on Information Forensics and Security, Issue 11/1, 2016, Page(s) 114-125, ISSN 1556-6013
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TIFS.2015.2478741
Author(s):
Gabriel Ciobanu, Ross Horne, Vladimiro Sassone
Published in:
Journal of Logical and Algebraic Methods in Programming, 2016, ISSN 2352-2208
Publisher:
Journal of Nanoscience and Nanotechnology
DOI:
10.1016/j.jlamp.2016.02.006
Author(s):
Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Published in:
Automata, Languages, and Programming, 2015, Page(s) 456-468, ISBN 978-3-662-47672-7
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-47672-7_37
Author(s):
Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani
Published in:
Network and System Security, 2015, Page(s) 46-59, ISBN 978-3-319-25645-0
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-25645-0_4
Author(s):
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
Published in:
Progress in Cryptology -- INDOCRYPT 2015, 2015, Page(s) 85-102, ISBN 978-3-319-26617-6
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-26617-6_5
Author(s):
Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
Published in:
Theory of Cryptography, 2016, Page(s) 306-335, ISBN 978-3-662-49096-9
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49096-9_13
Author(s):
Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
Published in:
Applied Cryptography and Network Security, 2015, Page(s) 243-262, ISBN 978-3-319-28166-7
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-28166-7_12
Author(s):
Sebastian Faust, Daniel Masny, Daniele Venturi
Published in:
Public-Key Cryptography – PKC 2016, 2016, Page(s) 35-46, ISBN 978-3-662-49384-7
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-49384-7_2
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available