no code implementations • 20 Jan 2021 • Massimo Bernaschi, Alessandro Celestini, Marco Cianfriglia, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano
The Tor web is the set of web resources that exist on the Tor network, and Tor websites are part of the so-called dark web.
Social and Information Networks
3 code implementations • 4 Dec 2020 • Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi
We investigate the security of Split Learning -- a novel collaborative machine learning framework that enables peak performance by requiring minimal resources consumption.
1 code implementation • 23 Oct 2020 • Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi
Password security hinges on an in-depth understanding of the techniques adopted by attackers.
1 code implementation • 15 Apr 2020 • Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi
Probabilistic password strength meters have been proved to be the most accurate tools to measure password strength.
1 code implementation • 7 Mar 2019 • Dario Pasquini, Marco Mingione, Massimo Bernaschi
Deep generative models are rapidly becoming a common tool for researchers and developers.
1 code implementation • 4 Jan 2019 • Elena Agostini, Massimo Bernaschi
BitLocker is a full-disk encryption feature available in recent Windows versions.
Cryptography and Security
no code implementations • 2 Feb 2016 • Flavio Vella, Giancarlo Carbone, Massimo Bernaschi
Betweenness Centrality (BC) is steadily growing in popularity as a metrics of the influence of a vertex in a graph.
Distributed, Parallel, and Cluster Computing Data Structures and Algorithms Social and Information Networks