Serena Nicolazzo

According to our database1, Serena Nicolazzo authored at least 31 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Privacy-Preserving Localization Service for Assisted Living Facilities.
IEEE Trans. Serv. Comput., 2020

A privacy-preserving approach to prevent feature disclosure in an IoT scenario.
Future Gener. Comput. Syst., 2020

2019
The Challenge of Privacy in the Cloud.
Proceedings of the Encyclopedia of Bioinformatics and Computational Biology - Volume 1, 2019

A System for Privacy-Preserving Access Accountability in Critical Environments.
IEEE Pervasive Comput., 2019

2018
Is the Sharing Economy About Sharing at All? A Linguistic Analysis of Airbnb Reviews.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Not Only Databases: Social Data and Cybersecurity Perspective.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
Discovering Good Links Between Objects in the Internet of Things.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A Model for Handling Multiple Social Networks, its Implementation.
Proceedings of the 25th Italian Symposium on Advanced Database Systems, 2017

A System for Privacy-Preserving Analysis of Vehicle Movements.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

Tweetchain: An Alternative to Blockchain for Crowd-Based Applications.
Proceedings of the Web Engineering - 17th International Conference, 2017

Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement.
Proceedings of the 2017 International Conference on Cyberworlds, 2017

Overcoming Limits of Blockchain for IoT Applications.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A model to support design and development of multiple-social-network applications.
Inf. Sci., 2016

Interest Assortativity in Twitter.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016

Completeness, Correctness and Freshness of Cloud-Managed Data Streams.
Proceedings of the 24th Italian Symposium on Advanced Database Systems, 2016

A Middleware to Allow Fine-Grained Access Control of Twitter Applications.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

Range query integrity in the cloud: the case of video surveillance.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

A New Approach for Electronic Signature.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Range Query Integrity in Cloud Data Streams with Efficient Insertion.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

A Threat to Friendship Privacy in Facebook.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Comparing Twitter and Facebook user behavior: Privacy and other aspects.
Comput. Hum. Behav., 2015

Accountability-Preserving Anonymous Delivery of Cloud Services.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

A lightweight electronic signature scheme using Twitter.
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015

A Model Implementing Certified Reputation and Its Application to TripAdvisor.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Fortifying TripAdvisor against reputation-system attacks.
Proceedings of the 2014 World Congress on Internet Security, 2014

Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments.
Proceedings of the 22nd Italian Symposium on Advanced Database Systems, 2014

A Model to Support Multi-Social-Network Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

Driving Global Team Formation in Social Networks to Obtain Diversity.
Proceedings of the Web Engineering, 14th International Conference, 2014

A Privacy-Preserving Solution for Tracking People in Critical Environments.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Measuring Betweenness Centrality in Social Internetworking Scenarios.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Workshops, 2013


  Loading...