Seguir
Luigi Catuogno
Luigi Catuogno
Dipartimento di Informatica, Università degli Studi di Salerno, ITALY
Dirección de correo verificada de dia.unisa.it
Título
Citado por
Citado por
Año
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
G Cattaneo, L Catuogno, A Del Sorbo, P Persiano
USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001
2962001
Trusted Virtual Domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010
562010
A honeypot system with honeyword-driven fake interactive sessions
L Catuogno, A Castiglione, F Palmieri
2015 International Conference on High Performance Computing & Simulation …, 2015
302015
A trusted versioning file system for passive mobile storage devices
L Catuogno, H Löhr, M Winandy, AR Sadeghi
Journal of Network and Computer Applications 38, 65-75, 2014
262014
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008
252008
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
L Catuogno, I Visconti
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
252003
Transparent Mobile Storage Protection in Trusted Virtual Domains.
L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy
LISA, 159-172, 2009
242009
An internet role-game for the laboratory of network security course
L Catuogno, A De Santis
ACM SIGCSE Bulletin 40 (3), 240-244, 2008
242008
Analysis of a two-factor graphical password scheme
L Catuogno, C Galdi
International journal of information security 13, 421-437, 2014
232014
The dark side of the interconnection: security and privacy in the Web of Things
L Catuogno, S Turchi
2015 9th International Conference on Innovative Mobile and Internet Services …, 2015
222015
An effective methodology for measuring software resource usage
L Catuogno, C Galdi, N Pasquino
IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018
202018
On the evaluation of security properties of containerized systems
L Catuogno, C Galdi
2016 15th International Conference on Ubiquitous Computing and …, 2016
202016
Trusted virtual domains: Color your network
L Catuogno, H Löhr, M Manulis, AR Sadeghi, C Stüble, M Winandy
Datenschutz und Datensicherheit-DuD 34 (5), 289-294, 2010
202010
A secure file sharing service for distributed computing environments
A Castiglione, L Catuogno, A Del Sorbo, U Fiore, F Palmieri
The Journal of Supercomputing 67, 691-710, 2014
192014
On the security of a two-factor authentication scheme
L Catuogno, C Galdi
Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010
192010
An architecture for kernel-level verification of executables at run time
L Catuogno, I Visconti
The Computer Journal 47 (5), 511-526, 2004
182004
Secure dependency enforcement in package management systems
L Catuogno, C Galdi, G Persiano
IEEE Transactions on Dependable and Secure Computing 17 (2), 377-390, 2017
132017
Off-line enterprise rights management leveraging biometric key binding and secure hardware
L Catuogno, C Galdi, D Riccio
Journal of Ambient Intelligence and Humanized Computing 10, 2883-2894, 2019
122019
On user authentication by means of video events recognition
L Catuogno, C Galdi
Journal of Ambient Intelligence and Humanized Computing 5, 909-918, 2014
112014
Achieving interoperability between federated identity management systems: A case of study
L Catuogno, C Galdi
Journal of High Speed Networks 20 (4), 209-221, 2014
112014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20