CATUOGNO, Luigi
CATUOGNO, Luigi
Dipartimento di Scienze Economiche, Giuridiche, Informatiche e Motorie
"iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security"
2007-01-01 Cattaneo, G; Catuogno, L; Petagna, F; Di Matteo, G; Romano, L
A Fine-grained general purpose secure storage facility for trusted execution environment
2019-01-01 Catuogno, Luigi; Galdi, Clemente
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
2003-01-01 Catuogno, Luigi; Visconti, Ivan
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
2008-01-01 Catuogno, Luigi; Galdi, Clemente
A honeypot system with honeyword-driven fake interactive sessions
2015-01-01 Catuogno, Luigi; Castiglione, Aniello; Palmieri, Francesco
A Lightweight Security Model for WBEM
2003-01-01 Cattaneo, Giuseppe; Catuogno, Luigi; Umberto Ferraro, Petrillo; Visconti, Ivan
A secure file sharing service for distributed computing environments
2014-01-01 Castiglione, Aniello; Catuogno, Luigi; Del Sorbo, Aniello; Fiore, Ugo; Palmieri, Francesco
A trusted versioning file system for passive mobile storage devices
2014-01-01 Catuogno, Luigi; Loḧr, Hans; Winandy, Marcel; Sadeghi, Ahmad Reza
Achieving interoperability between federated identity management systems: A case of study
2014-01-01 Catuogno, Luigi; Galdi, Clemente
An Architecture for Kernel-Level Verification of Executables at Run Time
2004-01-01 Catuogno, Luigi; Visconti, Ivan
An Effective Methodology for Measuring Software Resource Usage
2018-01-01 Catuogno, Luigi; Galdi, Clemente; Pasquino, Nicola
An Enterprise Rights Management System for On-the-Field Maintenance Facilities
2020-01-01 Catuogno, Luigi; Galdi, Clemente; Riccio, Daniel
An internet role-game for the laboratory of a network security course
2008-01-01 Catuogno, Luigi; DE SANTIS, Alfredo
Analysis of a two-factor graphical password scheme
2014-01-01 Catuogno, Luigi; Galdi, Clemente
Applying WBEM to heterogeneous TLC Network Management: an evaluation
2003-01-01 Castiglione, Aniello; Cattaneo, Giuseppe; Catuogno, Luigi; Ferraro Petrillo, Umberto; Parente, Domenico; Fresa, Antonio; Casella, Raffaele; Auletta, Luigi; De Gregorio, Antonio
Ensuring Application Integrity: A Survey on Techniques and Tools
2015-01-01 Catuogno, Luigi; Galdi, Clemente
Ensuring non-repudiation in human conversations over VoIP communications
2016-01-01 Cattaneo, Giuseppe; Catuogno, Luigi; Petagna, Fabio; Roscigno, Gianluca
Flexible and robust Enterprise Right Management
2016-01-01 Catuogno, Luigi; Galdi, Clemente; Riccio, Daniel
Graphical Passwords
2012-01-01 Catuogno, Luigi; Galdi, Clemente
Guaranteeing dependency enforcement in software updates
2015-01-01 Catuogno, Luigi; Galdi, Clemente; Persiano, Giuseppe
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
"iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security" | 1-gen-2007 | Cattaneo, G; Catuogno, L; Petagna, F; Di Matteo, G; Romano, L | |
A Fine-grained general purpose secure storage facility for trusted execution environment | 1-gen-2019 | Catuogno, Luigi; Galdi, Clemente | |
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code | 1-gen-2003 | Catuogno, Luigi; Visconti, Ivan | |
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices | 1-gen-2008 | Catuogno, Luigi; Galdi, Clemente | |
A honeypot system with honeyword-driven fake interactive sessions | 1-gen-2015 | Catuogno, Luigi; Castiglione, Aniello; Palmieri, Francesco | |
A Lightweight Security Model for WBEM | 1-gen-2003 | Cattaneo, Giuseppe; Catuogno, Luigi; Umberto Ferraro, Petrillo; Visconti, Ivan | |
A secure file sharing service for distributed computing environments | 1-gen-2014 | Castiglione, Aniello; Catuogno, Luigi; Del Sorbo, Aniello; Fiore, Ugo; Palmieri, Francesco | |
A trusted versioning file system for passive mobile storage devices | 1-gen-2014 | Catuogno, Luigi; Loḧr, Hans; Winandy, Marcel; Sadeghi, Ahmad Reza | |
Achieving interoperability between federated identity management systems: A case of study | 1-gen-2014 | Catuogno, Luigi; Galdi, Clemente | |
An Architecture for Kernel-Level Verification of Executables at Run Time | 1-gen-2004 | Catuogno, Luigi; Visconti, Ivan | |
An Effective Methodology for Measuring Software Resource Usage | 1-gen-2018 | Catuogno, Luigi; Galdi, Clemente; Pasquino, Nicola | |
An Enterprise Rights Management System for On-the-Field Maintenance Facilities | 1-gen-2020 | Catuogno, Luigi; Galdi, Clemente; Riccio, Daniel | |
An internet role-game for the laboratory of a network security course | 1-gen-2008 | Catuogno, Luigi; DE SANTIS, Alfredo | |
Analysis of a two-factor graphical password scheme | 1-gen-2014 | Catuogno, Luigi; Galdi, Clemente | |
Applying WBEM to heterogeneous TLC Network Management: an evaluation | 1-gen-2003 | Castiglione, Aniello; Cattaneo, Giuseppe; Catuogno, Luigi; Ferraro Petrillo, Umberto; Parente, Domenico; Fresa, Antonio; Casella, Raffaele; Auletta, Luigi; De Gregorio, Antonio | |
Ensuring Application Integrity: A Survey on Techniques and Tools | 1-gen-2015 | Catuogno, Luigi; Galdi, Clemente | |
Ensuring non-repudiation in human conversations over VoIP communications | 1-gen-2016 | Cattaneo, Giuseppe; Catuogno, Luigi; Petagna, Fabio; Roscigno, Gianluca | |
Flexible and robust Enterprise Right Management | 1-gen-2016 | Catuogno, Luigi; Galdi, Clemente; Riccio, Daniel | |
Graphical Passwords | 1-gen-2012 | Catuogno, Luigi; Galdi, Clemente | |
Guaranteeing dependency enforcement in software updates | 1-gen-2015 | Catuogno, Luigi; Galdi, Clemente; Persiano, Giuseppe |