Alessandro Lentini

According to our database1, Alessandro Lentini authored at least 13 papers between 2008 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Security and privacy issues for the network of the future.
Secur. Commun. Networks, 2012

2011
2D Color Barcodes for Mobile Phones.
Int. J. Comput. Sci. Appl., 2011

A Model for the Dynamics of Bidders in the Simulation of Keyword Auctions.
Proceedings of the 13th UKSim-AMSS International Conference on Computer Modelling and Simulation, Cambridge University, Emmanuel College, Cambridge, UK, 30 March, 2011

Shared Backup & Restore: Save, Recover and Share Personal Information into Closed Groups of Smartphones.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

The Competitor Busting Strategy in Keyword Auctions: Who's Worst Hit?
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

2010
SAVED: Secure Android Value addED services.
Proceedings of the Mobile Computing, Applications, and Services, 2010

High Capacity Colored Two Dimensional Codes.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2010

SecureMyDroid: enforcing security in the mobile devices lifecycle.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Penalized Second Price: A New Pricing Algorithm for Advertising in Search Engines.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm.
Int. J. Electron. Secur. Digit. Forensics, 2009

Fast User Classifying to Establish Forensic Analysis Priorities.
Proceedings of the IMF 2009, 2009

2008
Trusted SMS - A Novel Framework for Non-repudiable SMS-based Processes.
Proceedings of the First International Conference on Health Informatics, 2008

Transaction Oriented Text Messaging with Trusted-SMS.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008


  Loading...