Skip to main content

Showing 1–6 of 6 results for author: Esposito, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.08232  [pdf, other

    cs.NI eess.SP

    Green Operations of SWIPT Networks: The Role of End-User Devices

    Authors: Gianluca Rizzo, Marco Ajmone Marsan, Christian Esposito, Biagio Boi

    Abstract: Internet of Things (IoT) devices often come with batteries of limited capacity that are not easily replaceable or rechargeable, and that constrain significantly the sensing, computing, and communication tasks that they can perform. The Simultaneous Wireless Information and Power Transfer (SWIPT) paradigm addresses this issue by delivering power wirelessly to energy-harvesting IoT devices with the… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

    Comments: The manuscript has already been submitted to Journal on 7-12-2023

  2. arXiv:2210.08270  [pdf, other

    cs.CR cs.SI

    Assessing the Solid Protocol in Relation to Security & Privacy Obligations

    Authors: Christian Esposito, Olaf Hartig, Ross Horne, Chang Sun

    Abstract: The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, security and privacy represent pivotal issues to be addressed. By analyzing the relevant legislation, notably GDPR, and international standards, nam… ▽ More

    Submitted 15 October, 2022; originally announced October 2022.

    Comments: under submission

  3. Venture Capital investments through the lens of Network and Functional Data Analysis

    Authors: Christian Esposito, Marco Gortan, Lorenzo Testa, Francesca Chiaromonte, Giorgio Fagiolo, Andrea Mina, Giulio Rossetti

    Abstract: In this paper we characterize the performance of venture capital-backed firms based on their ability to attract investment. The aim of the study is to identify relevant predictors of success built from the network structure of firms' and investors' relations. Focusing on deal-level data for the health sector, we first create a bipartite network among firms and investors, and then apply functional… ▽ More

    Submitted 10 August, 2022; v1 submitted 25 February, 2022; originally announced February 2022.

    Comments: 17 pages, 9 figures, supplementary material attached

    Journal ref: Applied Network Science 7, 42 (2022)

  4. arXiv:2111.06371  [pdf, ps, other

    cs.SI econ.GN stat.AP

    Can you always reap what you sow? Network and functional data analysis of VC investments in health-tech companies

    Authors: Christian Esposito, Marco Gortan, Lorenzo Testa, Francesca Chiaromonte, Giorgio Fagiolo, Andrea Mina, Giulio Rossetti

    Abstract: "Success" of firms in venture capital markets is hard to define, and its determinants are still poorly understood. We build a bipartite network of investors and firms in the healthcare sector, describing its structure and its communities. Then, we characterize "success" introducing progressively more refined definitions, and we find a positive association between such definitions and the centralit… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

    Comments: 12 pages, 4 figures, accepted for publication in the proceedings of the 10th International Conference on Complex Networks and Their Applications

    Journal ref: Proceedings of 10th International Conference of Complex Networks and their applications 2021

  5. arXiv:1312.6564  [pdf, ps, other

    cs.CR

    A proposal of a faster variant of known provably secure PRBGs

    Authors: Corbo Antonio Esposito, Didone Fabiola

    Abstract: We make a new proposal about how to use in an effective way a CSPRBG (Computationally Secure Pseudo Random Bit Generator) for cryptographic purposes. We introduce the definitions of TCSPRBG (Typical CSPRBG) and SCSPRBG (Special CSPRBG). In particular the definition of SCSPRBG synthetizes in a simple way our proposal of how to modify a CSPRBG in order to achieve a higher throughput rate, while reta… ▽ More

    Submitted 23 December, 2013; originally announced December 2013.

  6. arXiv:1312.6549  [pdf, other

    cs.CR

    Some considerations about Java implementation of two provably secure pseudorandom bit generators

    Authors: Corbo Antonio Esposito, Didone Fabiola

    Abstract: The quest for a cryptographically secure pseudorandom bit generator (PRBG) was initiated long ago, and for a long time the proposed pseudorandom generators were very slow. More recently some "provably secure" PRBG capable to achieve a throughput rate greater than 1Mbit/sec. We noticed, anyway, the absence of Java implementations of such PRBGs, provably due to poor expected values for throughput ra… ▽ More

    Submitted 23 December, 2013; originally announced December 2013.