Introduction and
Security Projects
Distributed Applications
Security Projects

The interests of the Security Group are oriented to applied research, without disregarding the exploration of new methodologies and the scientific analysis of the most innovative theoretical proposals.

This approach has given us the opportunity to both establish important collaboration initiatives with the industry and to publish security papers in the following Journals and Conference Proceedings: ACM Transactions on Information and System Security, Journal of Computer Security, ACM Conference on Computer and Communication Security, Cambridge International Workshop on Security Protocols, Intern. Conference on Information and Computer Security, and so on.

Proactive Password Checking  

A proactive password checking technique against Dictionary based attack, implemented upon Decision Trees, is presented here.

User identification within biometric analysis  

Users can be indentified by a set of their biometric behaviors. The focus is on keystroke analysis, and a practical approach is proposed (patent pending).

Delegation of accountability protocols  

A framework to analyse how accountability is transferred or kept is proposed here.

Multicast streams authentication  

The objective of this work is to add security features to applications used to multicast data on the Internet

Lightweight Security for Internet Polls  

We have investigated the security of Internet polls and we have developed a method that is not based on IP-locking and yet is secure against automated attacks, which massively change the result of the poll.

Peer-to-Peer Market Place  

A p2p market place should be fair, i.e., intellectual properties should be protected as well as uploaders should be accounted as distributors. We proposed a scalable distributed domain on the top of a micro-payment scheme.

Preventing massive automated access to Web resources  

Automated web tools are often used to attack the security of online services. We have developed MosaHIP, a Mosaic-based Human Interactive Proof, which can prevent bots from massively access Web resources.

Dept. of
Computer Science
University of