Seuraa
Luigi Catuogno
Luigi Catuogno
Dipartimento di Informatica, Università degli Studi di Salerno, ITALY
Vahvistettu sähköpostiosoite verkkotunnuksessa dia.unisa.it
Nimike
Viittaukset
Viittaukset
Vuosi
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
G Cattaneo, L Catuogno, A Del Sorbo, P Persiano
USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001
2972001
Trusted Virtual Domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010
562010
A honeypot system with honeyword-driven fake interactive sessions
L Catuogno, A Castiglione, F Palmieri
2015 International Conference on High Performance Computing & Simulation …, 2015
302015
A trusted versioning file system for passive mobile storage devices
L Catuogno, H Löhr, M Winandy, AR Sadeghi
Journal of Network and Computer Applications 38, 65-75, 2014
262014
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
L Catuogno, I Visconti
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
262003
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008
252008
Transparent mobile storage protection in trusted virtual domains
L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy
23rd USENIX Large Installation Systems Administration Conference (LISA 2009 …, 2009
242009
An internet role-game for the laboratory of network security course
L Catuogno, A De Santis
ACM SIGCSE Bulletin 40 (3), 240-244, 2008
242008
Analysis of a two-factor graphical password scheme
L Catuogno, C Galdi
International journal of information security 13, 421-437, 2014
232014
The dark side of the interconnection: Security and privacy in the web of things
L Catuogno, S Turchi
2015 9th International Conference on Innovative Mobile and Internet Services …, 2015
222015
An effective methodology for measuring software resource usage
L Catuogno, C Galdi, N Pasquino
IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018
202018
On the evaluation of security properties of containerized systems
L Catuogno, C Galdi
2016 15th International Conference on Ubiquitous Computing and …, 2016
192016
A secure file sharing service for distributed computing environments
A Castiglione, L Catuogno, A Del Sorbo, U Fiore, F Palmieri
The Journal of Supercomputing 67, 691-710, 2014
192014
Trusted virtual domains: Color your network
L Catuogno, H Löhr, M Manulis, AR Sadeghi, C Stüble, M Winandy
Datenschutz und Datensicherheit-DuD 34 (5), 289-294, 2010
192010
On the security of a two-factor authentication scheme
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices …, 2010
192010
An architecture for kernel-level verification of executables at run time
L Catuogno, I Visconti
The Computer Journal 47 (5), 511-526, 2004
172004
Off-line enterprise rights management leveraging biometric key binding and secure hardware
L Catuogno, C Galdi, D Riccio
Journal of Ambient Intelligence and Humanized Computing 10, 2883-2894, 2019
122019
Secure dependency enforcement in package management systems
L Catuogno, C Galdi, G Persiano
IEEE Transactions on Dependable and Secure Computing 17 (2), 377-390, 2017
122017
On user authentication by means of video events recognition
L Catuogno, C Galdi
Journal of Ambient Intelligence and Humanized Computing 5, 909-918, 2014
112014
Achieving interoperability between federated identity management systems: A case of study
L Catuogno, C Galdi
Journal of High Speed Networks 20 (4), 209-221, 2014
112014
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20