Gianluca Lax

According to our database1, Gianluca Lax authored at least 105 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
A Privacy-Preserving Localization Service for Assisted Living Facilities.
IEEE Trans. Serv. Comput., 2020

Improving Opinion Spam Detection by Cumulative Relative Frequency Distribution.
CoRR, 2020

2019
The Challenge of Privacy in the Cloud.
Proceedings of the Encyclopedia of Bioinformatics and Computational Biology - Volume 1, 2019

A System for Privacy-Preserving Access Accountability in Critical Environments.
IEEE Pervasive Comput., 2019

A Novel Query Language for Data Extraction from Social Networks.
Proceedings of the 15th International Conference on Web Information Systems and Technologies, 2019

Ethereum Transactions and Smart Contracts among Secure Identities.
Proceedings of the Second Distributed Ledger Technology Workshop, 2019

Exploiting Digital Identity for Mobility in Fog Computing.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

A system to enforce user's preference in OSN advertising.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Contrasting Fake Reviews in TripAdvisor.
Proceedings of the 26th Italian Symposium on Advanced Database Systems, 2018

Privacy-preserving access to e-health systems.
Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, 2018

Integrating Digital Identity and Blockchain.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018

Not Only Databases: Social Data and Cybersecurity Perspective.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
Discovering Good Links Between Objects in the Internet of Things.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A Model for Handling Multiple Social Networks, its Implementation.
Proceedings of the 25th Italian Symposium on Advanced Database Systems, 2017

A System for Privacy-Preserving Analysis of Vehicle Movements.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

Tweetchain: An Alternative to Blockchain for Crowd-Based Applications.
Proceedings of the Web Engineering - 17th International Conference, 2017

Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement.
Proceedings of the 2017 International Conference on Cyberworlds, 2017

Overcoming Limits of Blockchain for IoT Applications.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A model to support design and development of multiple-social-network applications.
Inf. Sci., 2016

Analysis-preserving protection of user privacy against information leakage of social-network Likes.
Inf. Sci., 2016

Experimenting with Certified Reputation in a Competitive Multi-Agent Scenario.
IEEE Intell. Syst., 2016

Interest Assortativity in Twitter.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016

Completeness, Correctness and Freshness of Cloud-Managed Data Streams.
Proceedings of the 24th Italian Symposium on Advanced Database Systems, 2016

A Middleware to Allow Fine-Grained Access Control of Twitter Applications.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

Range query integrity in the cloud: the case of video surveillance.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

A New Approach for Electronic Signature.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Implementing Advanced Electronic Signature by Public Digital Identity System (SPID).
Proceedings of the Electronic Government and the Information Systems Perspective, 2016

Range Query Integrity in Cloud Data Streams with Efficient Insertion.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

A Threat to Friendship Privacy in Facebook.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
A system for extracting structural information from Social Network accounts.
Softw. Pract. Exp., 2015

Digital Document Signing: Vulnerabilities and Solutions.
Inf. Secur. J. A Glob. Perspect., 2015

Discovering missing me edges across social networks.
Inf. Sci., 2015

A new form of assortativity in online social networks.
Int. J. Hum. Comput. Stud., 2015

A privacy-preserving e-participation framework allowing citizen opinion analysis.
Electron. Gov. an Int. J., 2015

Comparing Twitter and Facebook user behavior: Privacy and other aspects.
Comput. Hum. Behav., 2015

Accountability-Preserving Anonymous Delivery of Cloud Services.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Practical and Secure Integrated PKE+PEKS with Keyword Privacy.
Proceedings of the SECRYPT 2015, 2015

A lightweight electronic signature scheme using Twitter.
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015

Enhancing Public Digital Identity System (SPID) to Prevent Information Leakage.
Proceedings of the Electronic Government and the Information Systems Perspective, 2015

A Model Implementing Certified Reputation and Its Application to TripAdvisor.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Experiences Using BDS: A Crawler for Social Internetworking Scenarios.
Proceedings of the Social Networks: Analysis and Case Studies, 2014

Moving from social networks to social internetworking scenarios: The crawling perspective.
Inf. Sci., 2014

Fortifying TripAdvisor against reputation-system attacks.
Proceedings of the 2014 World Congress on Internet Security, 2014

A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme.
Proceedings of the SECRYPT 2014, 2014

Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments.
Proceedings of the 22nd Italian Symposium on Advanced Database Systems, 2014

Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Computer Safety, Reliability, and Security, 2014

A Model to Support Multi-Social-Network Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

A Trust-Based Approach to Clustering Agents on the Basis of Their Expertise.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2014

Driving Global Team Formation in Social Networks to Obtain Diversity.
Proceedings of the Web Engineering, 14th International Conference, 2014

Social Signature: Signing by Tweeting.
Proceedings of the Electronic Government and the Information Systems Perspective, 2014

A Privacy-Preserving Solution for Tracking People in Critical Environments.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Bridge analysis in a Social Internetworking Scenario.
Inf. Sci., 2013

Attacks on Confidentiality of Communications Between Stranger Organizations.
Int. J. Knowl. Based Organ., 2013

Bridge-Driven Search in Social Internetworking Scenarios.
Proceedings of the 21st Italian Symposium on Advanced Database Systems, 2013

Allowing privacy-preserving analysis of social network likes.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Measuring Betweenness Centrality in Social Internetworking Scenarios.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Workshops, 2013

A Trust-Based Approach for Detecting Compromised Nodes in SCADA Systems.
Proceedings of the Multiagent System Technologies - 11th German Conference, 2013

Allowing Non-identifying Information Disclosure in Citizen Opinion Evaluation.
Proceedings of the Technology-Enabled Innovation for Democracy, Government and Governance, 2013

Internetworking Assortativity in Facebook.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
A warning on how to implement anonymous credential protocols into the information card framework.
Int. J. Inf. Sec., 2012

Discovering Hidden me Edges in a Social Internetworking Scenario.
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012

Privacy-preserving resource evaluation in social networks.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Supporting Information Spread in a Social Internetworking Scenario.
Proceedings of the New Frontiers in Mining Complex Patterns - First International Workshop, 2012

Discovering Links among Social Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012

Enhancing Trust-Based Competitive Multi Agent Systems by Certified Reputation.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

Allowing Continuous Evaluation of Citizen Opinions through Social Networks.
Proceedings of the Advancing Democracy, Government and Governance, 2012

Crawling Social Internetworking Systems.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Implementing disposable credit card numbers by mobile phones.
Electron. Commer. Res., 2011

Preserving Unlikability against Covert Channels in Multi-Party Security Protocols.
Proceedings of the Sistemi Evoluti per Basi di Dati, 2011

Threats to Legal Electronic Storage: Analysis and Countermeasures.
Proceedings of the Electronic Government and the Information Systems Perspective, 2011

2010
A Lightweight Authentication Protocol for Web Applications in Mobile Environments.
Proceedings of the Emergent Web Intelligence: Advanced Information Retrieval, 2010

Approximating sliding windows by cyclic tree-like histograms for efficient range queries.
Data Knowl. Eng., 2010

Archiving Digital Documents: Issues in Dematerialization (Extended Abstract).
Proceedings of the Eighteenth Italian Symposium on Advanced Database Systems, 2010

Improving Similarity-Based Methods for Information Propagation on Social Networks.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

2009
Signing Digital Documents in Hostile Environments.
J. Digit. Inf. Manag., 2009

A Framework for Using Web Services to Enhance QoS for Content Delivery.
IEEE Multim., 2009

Fortifying the dalì attack on digital signature.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A Probabilistic Framework for Localizing People with K-anonymity.
Proceedings of the Seventeenth Italian Symposium on Advanced Database Systems, 2009

An efficient k-anonymous localization technique for assistive environments.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Approximate Range Querying over Sliding Windows.
Proceedings of the Database Technologies: Concepts, 2009

2008
Enhancing histograms by tree-like bucket indices.
VLDB J., 2008

CellTrust: a reputation model for C2C commerce.
Electron. Commer. Res., 2008

Analysis of QoS in cooperative services for real time applications.
Data Knowl. Eng., 2008

Generating One-Time Passwords by Cheap and Fast Devices.
Proceedings of the Sixteenth Italian Symposium on Advanced Database Systems, 2008

A pervasive identification service for physical access control.
Proceedings of the 5th international conference on Pervasive services, 2008

A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions.
Proceedings of the E-Commerce and Web Technologies, 9th International Conference, 2008

2007
Un Protocollo di Sicurezza contro le Vulnerabilitè derivanti da Software di Firma non Trusted.
Proceedings of the Fifteenth Italian Symposium on Advanced Database Systems, 2007

Modellazione della QoS in Ambienti Web-Service con Applicazioni di Video Streaming.
Proceedings of the Fifteenth Italian Symposium on Advanced Database Systems, 2007

Enabling Selective Flooding to Reduce P2P Traffic.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Hardening digital signatures against untrusted signature software.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

2006
Dealing with semantic heterogeneity for improving Web usage.
Data Knowl. Eng., 2006

Progresses on Tree-Based Approaches to Improving Histogram Accuracy.
Proceedings of the Fourteenth Italian Symposium on Advanced Database Systems, 2006

Blue: A Reputation-Based Multi-Agent System to Support C2C in P2P Bluetooth Networks.
Proceedings of the ICE-B 2006, 2006

2004
Fast range query estimation by N-level tree histograms.
Data Knowl. Eng., 2004

Riduzione del traffico nei sistemi P2P: un approccio semantico.
Proceedings of the Twelfth Italian Symposium on Advanced Database Systems, 2004

Rappresentazioni compresse di Data Stream attraverso istogrammi.
Proceedings of the Twelfth Italian Symposium on Advanced Database Systems, 2004

Reducing Data Stream Sliding Windows by Cyclic Tree-Like Histograms.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

TLS: A Tree-Based DHT Lookup Service for Highly Dynamic Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2004: CoopIS, 2004

2003
L'Istogramma nLT: una Codifica Approssimata di Range Query Gerarchiche.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003

Pre-computing Approximate Hierarchical Range Queries in a Tree-Like Histogram.
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003

2002
Modellazione del comportamento degli utenti per supportarne l'accesso a sorgenti informative eterogenee.
Proceedings of the Decimo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2002

Binary-Tree Histograms with Tree Indices.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

A User Behavior-Based Agent for Improving Web Usage.
Proceedings of the On the Move to Meaningful Internet Systems, 2002, 2002


  Loading...