Francesco Buccafurri
Orcid: 0000-0003-0448-8464Affiliations:
- Mediterranea University of Reggio Calabria, DIMET, Italy
According to our database1,
Francesco Buccafurri
authored at least 183 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
J. Reliab. Intell. Environ., December, 2024
Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System.
Future Internet, July, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Comput. Secur., 2024
A hierarchical distributed trusted location service achieving location k-anonymity against the global observer.
Comput. Networks, 2024
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024
REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2024
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024
Proceedings of the 10th International Conference on Control, 2024
2023
IEEE Internet Things J., September, 2023
J. Inf. Secur. Appl., May, 2023
Digit. Commun. Networks, February, 2023
Allowing privacy-preserving fog computing with digital identity assurance in remote clinical services.
Electron. Gov. an Int. J., 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 9th International Conference on Control, 2023
2022
A protocol for anonymous short communications in social networks and its application to proximity-based services.
Online Soc. Networks Media, 2022
A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees.
Future Internet, 2022
An integrity-preserving technique for range queries over data streams in two-tier sensor networks.
Comput. Networks, 2022
Proceedings of the 18th International Conference on Web Information Systems and Technologies, 2022
2021
Experience: Improving Opinion Spam Detection by Cumulative Relative Frequency Distribution.
ACM J. Data Inf. Qual., 2021
Proceedings of the 22nd IEEE International Symposium on a World of Wireless, 2021
Hardening Trust Models against Slandering Attacks in Relayed Content Delivery Services.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
A Distributed Location Trusted Service Achieving k-Anonymity against the Global Adversary.
Proceedings of the 22nd IEEE International Conference on Mobile Data Management, 2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the Electronic Government and the Information Systems Perspective, 2021
Proceedings of the International Conference on Cyberworlds, 2021
2020
IEEE Trans. Serv. Comput., 2020
CoRR, 2020
Smart-contract Based Access Control on Distributed Information in a Smart-City Scenario.
Proceedings of the 3rd Distributed Ledger Technology Workshop Co-located with ITASEC 2020, 2020
Proceedings of the 12th International Conference on Advanced Infocomm Technology, 2020
Proceedings of the International Conference on Cyberworlds, 2020
2019
Proceedings of the Encyclopedia of Bioinformatics and Computational Biology - Volume 1, 2019
IEEE Pervasive Comput., 2019
Proceedings of the 15th International Conference on Web Information Systems and Technologies, 2019
Proceedings of the 15th International Conference on Web Information Systems and Technologies, 2019
Proceedings of the 2019 Summer Simulation Conference, 2019
Proceedings of the Second Distributed Ledger Technology Workshop, 2019
A Blockchain-Based OTP-Authentication Scheme for Constrainded IoT Devices Using MQTT.
Proceedings of the ISCSIC 2019: 3rd International Symposium on Computer Science and Intelligent Control, 2019
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019
An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the 26th Italian Symposium on Advanced Database Systems, 2018
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018
2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 25th Italian Symposium on Advanced Database Systems, 2017
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017
eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017
Proceedings of the Web Engineering - 17th International Conference, 2017
Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement.
Proceedings of the 2017 International Conference on Cyberworlds, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Inf. Sci., 2016
Analysis-preserving protection of user privacy against information leakage of social-network Likes.
Inf. Sci., 2016
IEEE Intell. Syst., 2016
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Completeness, Correctness and Freshness of Cloud-Managed Data Streams.
Proceedings of the 24th Italian Symposium on Advanced Database Systems, 2016
Proceedings of the Mobile, Secure, and Programmable Networking, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Electronic Government and the Information Systems Perspective, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
2015
Softw. Pract. Exp., 2015
Inf. Secur. J. A Glob. Perspect., 2015
Int. J. Hum. Comput. Stud., 2015
Electron. Gov. an Int. J., 2015
Comput. Hum. Behav., 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
An analytical processing approach to supporting cyber security compliance assessment.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the SECRYPT 2015, 2015
A lightweight electronic signature scheme using Twitter.
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015
Biometric Identification in eHealthcare: Learning from the Cases of Russia and Italy.
Proceedings of the Electronic Government and the Information Systems Perspective, 2015
Proceedings of the Electronic Government and the Information Systems Perspective, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Social Networks: Analysis and Case Studies, 2014
Moving from social networks to social internetworking scenarios: The crawling perspective.
Inf. Sci., 2014
Proceedings of the 2014 World Congress on Internet Security, 2014
Proceedings of the SECRYPT 2014, 2014
Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments.
Proceedings of the 22nd Italian Symposium on Advanced Database Systems, 2014
Proceedings of the Computer Safety, Reliability, and Security, 2014
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2014
Proceedings of the Web Engineering, 14th International Conference, 2014
Breaking the Barriers of e-Participation: The Experience of Russian Digital Office Development.
Proceedings of the Electronic Government and the Information Systems Perspective, 2014
Proceedings of the Electronic Government and the Information Systems Perspective, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Bridge-Driven Search in Social Internetworking Scenarios.
Proceedings of the 21st Italian Symposium on Advanced Database Systems, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Workshops, 2013
Proceedings of the Multiagent System Technologies - 11th German Conference, 2013
Proceedings of the Technology-Enabled Innovation for Democracy, Government and Governance, 2013
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013
2012
A probabilistic framework for estimating the accuracy of aggregate range queries evaluated over histograms.
Inf. Sci., 2012
A warning on how to implement anonymous credential protocols into the information card framework.
Int. J. Inf. Sec., 2012
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the New Frontiers in Mining Complex Patterns - First International Workshop, 2012
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012
Proceedings of the Advancing Democracy, Government and Governance, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
Inf. Syst., 2011
Electron. Commer. Res., 2011
Preserving Unlikability against Covert Channels in Multi-Party Security Protocols.
Proceedings of the Sistemi Evoluti per Basi di Dati, 2011
Proceedings of the Electronic Government and the Information Systems Perspective, 2011
2010
Proceedings of the Emergent Web Intelligence: Advanced Information Retrieval, 2010
Approximating sliding windows by cyclic tree-like histograms for efficient range queries.
Data Knowl. Eng., 2010
Archiving Digital Documents: Issues in Dematerialization (Extended Abstract).
Proceedings of the Eighteenth Italian Symposium on Advanced Database Systems, 2010
Proceedings of the Networked Digital Technologies - Second International Conference, 2010
2009
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
Signing Digital Documents in Hostile Environments.
J. Digit. Inf. Manag., 2009
IEEE Multim., 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
A Probabilistic Framework for Localizing People with K-anonymity.
Proceedings of the Seventeenth Italian Symposium on Advanced Database Systems, 2009
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009
Proceedings of the Database Technologies: Concepts, 2009
2008
Data Knowl. Eng., 2008
Generating One-Time Passwords by Cheap and Fast Devices.
Proceedings of the Sixteenth Italian Symposium on Advanced Database Systems, 2008
Proceedings of the 5th international conference on Pervasive services, 2008
Proceedings of the Logic Programming, 24th International Conference, 2008
A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions.
Proceedings of the E-Commerce and Web Technologies, 9th International Conference, 2008
2007
Un Protocollo di Sicurezza contro le Vulnerabilitè derivanti da Software di Firma non Trusted.
Proceedings of the Fifteenth Italian Symposium on Advanced Database Systems, 2007
Modellazione della QoS in Ambienti Web-Service con Applicazioni di Video Streaming.
Proceedings of the Fifteenth Italian Symposium on Advanced Database Systems, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007
2006
Progresses on Tree-Based Approaches to Improving Histogram Accuracy.
Proceedings of the Fourteenth Italian Symposium on Advanced Database Systems, 2006
Logic Programs with Multiple Chances.
Proceedings of the ECAI 2006, 17th European Conference on Artificial Intelligence, August 29, 2006
2005
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2005
2004
Riduzione del traffico nei sistemi P2P: un approccio semantico.
Proceedings of the Twelfth Italian Symposium on Advanced Database Systems, 2004
Rappresentazioni compresse di Data Stream attraverso istogrammi.
Proceedings of the Twelfth Italian Symposium on Advanced Database Systems, 2004
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004
Proceedings of the On the Move to Meaningful Internet Systems 2004: CoopIS, 2004
2003
Proceedings of the 15th International Conference on Scientific and Statistical Database Management (SSDBM 2003), 2003
L'Istogramma nLT: una Codifica Approssimata di Range Query Gerarchiche.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003
Multiagent Compromises and Joint Fixpoint Semantics.
Proceedings of the 2003 Joint Conference on Declarative Programming, 2003
2002
Modellazione del comportamento degli utenti per supportarne l'accesso a sorgenti informative eterogenee.
Proceedings of the Decimo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2002
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002
Proceedings of the On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30, 2002
Proceedings of the Computational Logic: Logic Programming and Beyond, 2002
2001
A System Implementing Cooperation in Multi-Agent Networks.
Proceedings of the WOA 2001: Dagli Oggetti agli Agenti. 2nd AI*IA/TABOO Joint Workshop "From Objects to Agents": Evolutive Trends of Software Systems, 2001
Estimating Range Queries Using Aggregate Data with Integrity Constraints: A Probabilistic Approach.
Proceedings of the Database Theory, 2001
2000
Estimating range queries using aggregate data.
Proceedings of the Ottavo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2000
1999
Ann. Math. Artif. Intell., 1999
Proceedings of the Data Warehousing and Knowledge Discovery, 1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
1998
Disjunctive Ordered Logic: Semantics and Expressiveness.
Proceedings of the Sixth International Conference on Principles of Knowledge Representation and Reasoning (KR'98), 1998
Proceedings of the Computer Security, 1998
1997
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 1997
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997
Adding Weak Constraints to Disjunctive Datalog.
Proceedings of the 1997 Joint Conf. on Declarative Programming, 1997
1996
Stable Models and Their Computation for Logic Programming with Inheritance and True Negation.
J. Log. Program., 1996
Computing Disjunctive Ordered Logic.
Proceedings of the 1996 Joint Conf. on Declarative Programming, 1996
1995
Proceedings of the Database and Expert Systems Applications, 1995
Ordered Logic and its Relationships to other Logic Programming Formalisms.
Proceedings of the 1995 Joint Conference on Declarative Programming, 1995
1994
Implementazione di Interrogazioni Semplici Concatenate.
Proceedings of the Atti del Secondo Convegno Nazionale "Sistemi Evoluti per Basi di Dati", 1994
A non-deterministic semantics for ordered logic programs.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994