Graph data represents relationships, connections, or affinities. Innocent relationships produce repeated, and so common, substructures in graph data. We present techniques for dis...
Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show ...
Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service (DAS), where an organization’s database is stored at an external s...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...