The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Luigi Lo Iacono: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Luigi Lo Iacono, Christoph Ruland
    Vertrauliche Video-Konferenzen im Internet. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2003, pp:167-181 [Conf]
  2. Jochen Fingberg, Marit Hansen, Markus Hansen, Henry Krasemann, Luigi Lo Iacono, Thomas Probst, Jessica Wright
    Integrating Data Custodians in eHealth Grids - A Digest of Security and Privacy Aspects. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2006, pp:695-701 [Conf]
  3. Lars Dietze, Bernd Holznagel, Luigi Lo Iacono, Christoph Ruland
    Qualifizierte Signatur im eletronischeen Messdatenaustausch. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:335-348 [Conf]
  4. Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland
    Impacts of Security Protocols on Real-Time Multimedia Communications. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:1-13 [Conf]
  5. Gregory Allen Kohring, Luigi Lo Iacono
    Non-Blocking Signature of very large SOAP Messages [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  6. A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages. [Citation Graph (, )][DBLP]


  7. @neurIST - Towards a System Architecture for Advanced Disease Management through Integration of Heterogeneous Data, Computing, and Complex Processing Services. [Citation Graph (, )][DBLP]


  8. Security for XML Data Binding. [Citation Graph (, )][DBLP]


  9. Security in OpenSocial-Instrumented Social Networking Services. [Citation Graph (, )][DBLP]


  10. Session-Based SOAP Transmission and Processing. [Citation Graph (, )][DBLP]


  11. Non-Blocking Signature of very large SOAP Messages. [Citation Graph (, )][DBLP]


  12. Security Architecture for Distributed Medical Information Systems. [Citation Graph (, )][DBLP]


  13. Secure Browser-Based Access to Web Services. [Citation Graph (, )][DBLP]


  14. Vulnerable Cloud: SOAP Message Security Validation Revisited. [Citation Graph (, )][DBLP]


  15. Elliptic Curve Cryptography in x.509-based PKI. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002