Arcangelo Castiglione

According to our database1, Arcangelo Castiglione authored at least 36 papers between 2012 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
One-pass lossless data hiding and compression of remote sensing data.
Future Generation Comp. Syst., 2019

2018
Quantum technique for access control in cloud computing II: Encryption and key distribution.
J. Network and Computer Applications, 2018

Building a network embedded FEC protocol by using game theory.
Inf. Sci., 2018

On the protection of consumer genomic data in the Internet of Living Things.
Computers & Security, 2018

Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications.
IEEE Cloud Computing, 2018

Data hiding using compressed archives.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

2017
On-Board Format-Independent Security of Functional Magnetic Resonance Images.
ACM Trans. Embedded Comput. Syst., 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Generation Comp. Syst., 2017

Secure group communication schemes for dynamic heterogeneous distributed computing.
Future Generation Comp. Syst., 2017

2016
Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Information Forensics and Security, 2016

Hierarchical and Shared Access Control.
IEEE Trans. Information Forensics and Security, 2016

Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IEEE Trans. Dependable Sec. Comput., 2016

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Secure and reliable data communication in developing regions and rural areas.
Pervasive and Mobile Computing, 2015

Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015

Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Generation Comp. Syst., 2015

Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

On the Protection of fMRI Images in Multi-domain Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Format-Independent Protection of DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

Reversible Copyright Protection for DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

2014
Secure and distributed video surveillance via portable devices.
J. Ambient Intelligence and Humanized Computing, 2014

Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IACR Cryptology ePrint Archive, 2014

Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Hierarchical and Shared Key Assignment.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Protection of Microscopy Images through Digital Watermarking Techniques.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Collaborative Decision-Support System for Secure Analysis of Cranial Disorders.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

An Efficient Protocol for Reliable Data Communication on Dataless Devices.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A fuzzy logic based reputation system for E-markets.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014

An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Text Compression and Encryption through Smart Devices for Mobile Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

On Secure Data Management in Health-Care Environment.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
A Secure Distributed Video Surveillance System Based on Portable Devices.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012


  Loading...