Hi! My name is Andrea Bissoli and this is my personal web page where I will post my blog articles, notes and my personal career path.
I am passionate about computer science and prone to fully understand how things work by asking myself “why?” and “how?”. I like to expand my knowledge both theoretically and through practical activities. I find creative solutions to problems and write code to implement them. My work experience includes:
October 2023 - Present
Rome (Italy)
The ZTE Cybersecurity Lab in Italy focuses on security testing and support for the regional markets. It serves as a collaborative platform between ZTE and various institutions, universities, and stakeholders for capacity building and knowledge transfer, including a partnership with the CNIT (National Interuniversity Consortium for Telecommunications) for technical research and testing supervision.
October 2023 - Present
February 2021 - July 2023
Rome (Italy)
The Cyber Security R&D team performs applied security research and prototyping, as well as shaping the adoption of best practices and new technologies.
February 2021 - July 2023
November 2019 - February 2021
Verona (Italy)
UniCredit Services provides ICT applications aimed at developing, implementing and managing the solutions for different core areas
November 2019 - February 2021
August 2018 - September 2021
Rome (Italy)
Cyber Security Analyst at the Security Operations Center TIM. Collaboration in the Incident Handling Backbone Team.
August 2018 - September 2021
September 2016 - June 2017
Rome (Italy)
Teacher in an extracurricular course of “programming techniques” addressed to students of the scientific high school biennium.
September 2016 - June 2017
The paper presents a solution for securing password-based authentication using Shamir’s $(k,n)$ threshold scheme, where $n$ password-derived secrets (shares) are created, and $k\leq n$ shares are necessary and sufficient for reconstructing the password. The solution is information-theoretically secure, with each share stored on a different host (Shareholder), requiring an attacker to compromise $k$ Shareholders to reconstruct the secret. To resist compromising the coordinating server (Dealer), the authors define a variant of Shamir’s scheme where the abscissas are unknown to the Dealer and Shareholders, making reconstruction impossible even if they are compromised. The authors have designed protocols for registration and authentication, analyzed scenarios with partially/totally compromised Dealer and/or Shareholders, and developed a prototype demonstrating the correct, effective, and efficient operation of the proposed method, providing a feasibility study for future cloud-based “authentication-as-a-service” implementations.
Oct 2012 - May 2018 B.Sc. and M.Sc. in Computer Science, Cyber securityCGPA (VL): 4 (110 cum laude) out of 4 (110) |