Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
In this paper we present a prototype for parental control that detects images with adult content received on a mobile device. More specifically, the application that we developed...
Giuseppe Amato, Paolo Bolettieri, Gabriele Costa, ...
This paper presents an exploratory study of jihadi extremist groups' videos using content analysis and a multimedia coding tool to explore the types of videos, groups' mo...
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...