Skip to content

Commit

Permalink
Minor fixes on destinations, people and publications
Browse files Browse the repository at this point in the history
  • Loading branch information
marcopernpruner committed Sep 26, 2024
1 parent bbe8bdd commit d5e1ef2
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 13 deletions.
8 changes: 4 additions & 4 deletions _data/destinations.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1031,7 +1031,7 @@
- id: ARES2023
name: 18th International Conference on Availability, Reliability and Security
acronym: ARES 2023
url: https://www.ares-conference.eu
url: https://2023.ares-conference.eu/
type: conference
location: Benevento, Italy
startDate: "2023-08-29"
Expand All @@ -1047,8 +1047,8 @@
startDate: "2022-07-19"
endDate: "2022-07-21"

- id: ECML/PKDD2023_PP
name: ECML/PKDD 2023 Post-Workshops and Tutorials Proceedings
- id: ECML/PKDD2023_WP
name: Machine Learning and Principles and Practice of Knowledge Discovery in Databases
url: https://2023.ecmlpkdd.org/
type: post-proceedings

Expand Down Expand Up @@ -1121,7 +1121,7 @@
acronym: Ital-IA 2024
url: https://ital-ia2024.it/
type: conference
location: Napoli, Italy
location: Naples, Italy
startDate: "2024-05-29"
endDate: "2024-05-30"

Expand Down
6 changes: 1 addition & 5 deletions _data/people.yml
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@
institution: University of Genoa
place: Genoa, Italy
email: [email protected]
image: https://rubrica.unige.it/static/foto/VUZDXlxu.jpg?1688135377.3747
image: https://rubrica.unige.it/static/foto/VUZDXlxu.jpg

- id: AlessandroBiasi
name: Alessandro
Expand Down Expand Up @@ -193,7 +193,6 @@
- id: CarlottaTagliaro
name: Carlotta
surname: Tagliaro
image: https://media-exp1.licdn.com/dms/image/C4E03AQEPRt71VVgABw/profile-displayphoto-shrink_200_200/0?e=1611187200&v=beta&t=mmnzNewMBhrMwqgAbd0ne8RA6kTdqBtvnn8YCCpbkq4

- id: CeciliaPasquini
name: Cecilia
Expand Down Expand Up @@ -467,7 +466,6 @@
- id: GiovanniFerronato
name: Giovanni
surname: Ferronato
image: https://media-exp1.licdn.com/dms/image/C5603AQEcwxof36633Q/profile-displayphoto-shrink_200_200/0?e=1611187200&v=beta&t=h5fI2ngKcl-4rahGVBf4cRWY9ZzhGnKSDqRsz5fwo6s

- id: GiovanniMagoga
name: Giovanni
Expand Down Expand Up @@ -528,7 +526,6 @@
name: Ivan
surname: Vaccari
email: [email protected]
image: https://www.cnr.it/peoplepublic/peoplepublic/index/profileimage/login/ivanvaccari

- id: IvanValentini
name: Ivan
Expand Down Expand Up @@ -698,7 +695,6 @@
name: Massimo
surname: Merro
email: [email protected]
image: https://www.di.univr.it/documenti//Persona/foto/foto450272.jpg

- id: MatildeSalaorni
name: Matilde
Expand Down
12 changes: 8 additions & 4 deletions _data/publications.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1996,6 +1996,7 @@
doi: 10.1007/978-3-031-37586-6_7

- id: ECML/PKDD2023_W
#id_iris:
title: Towards a Fine-Grained Threat Model for Video-Based Remote Identity Proofing
authors:
- CeciliaPasquini
Expand All @@ -2004,8 +2005,10 @@
- SilvioRanise
abstract: >
The attack landscape against video-based face verification is rapidly evolving, thus leading to increased opportunities of impersonation and identity theft within remote identity proofing processes. To support reliable security and risk analyses, we provide an extended threat model composed of threats and security controls for the face acquisition phase. Special emphasis is devoted to recent advancements in video synthesis and physical rendering, as well as diversified approaches for liveness detection.
destination: ECML/PKDD2023_PP
year: 2023
destination: ECML/PKDD2023_WP
destinationAddon: International Workshops of ECML PKDD 2023, Revised Selected Papers, Part II
year: 2024
#doi:
urlNews: /news/2023/11/20/paper-accepted-at-ecml-pkdd-post-workshop-proceedings/

- id: EVOTEID2023
Expand All @@ -2023,7 +2026,7 @@
abstract: >
This paper presents an architecture for an OAuth 2.0-based i-voting solution using a mobile native client in a variant of the Araújo-Traoré protocol. We follow a systematic approach by identifying relevant OAuth 2.0 specifications and best practices. Having defined our framework, we identify threats applicable to our proposed methodology and detail how our design mitigates them to provide a safer i-voting process.
destination: EVOTEID2023
#doi: 10.
#doi:
tags:
- ThresholdCryptography
- ZKP
Expand Down Expand Up @@ -2144,6 +2147,7 @@
urlNews: /news/2024/09/26/paper-accepted-at-ieee-sp/

- id: iMETA2024
#id_iris:
title: "Beyond Screens: Investigating Identity Proofing for the Metaverse Through Cross-Device Flows"
authors:
- MarcoPernpruner
Expand All @@ -2155,7 +2159,7 @@
To this end, a cross-device flow is proposed where users first interact with their mobile device to get securely identified by presenting a valid identity evidence, and successively wear the headset to set their access credentials by presenting a suitably designed identity transfer code. According to best practices for cross-device flows, the proposed approach incorporates a number of both known and newly introduced security measures, which are thoroughly discussed in relation to possible impersonation attacks against the cross-device transfer phase.
destination: iMETA2024
year: 2024
doi:
#doi:
urlNews: /news/2024/09/02/paper-accepted-at-imeta-2024/

- id: Ital-IA2024
Expand Down

0 comments on commit d5e1ef2

Please sign in to comment.