|
Search the dblp DataBase
Luigi Catuogno:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Petrillo, Ivan Visconti
Reliable Accounting in Grid Economic Transactions. [Citation Graph (0, 0)][DBLP] GCC Workshops, 2004, pp:514-521 [Conf]
- Giuseppe Cattaneo, Luigi Catuogno, Umberto Ferraro Petrillo, Ivan Visconti
A Lightweight Security Model for WBEM. [Citation Graph (0, 0)][DBLP] OTM Workshops, 2003, pp:975-988 [Conf]
- Luigi Catuogno, Ivan Visconti
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:219-233 [Conf]
- Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti
Securing Operating System Services Based on Smart Cards. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:321-330 [Conf]
- Giuseppe Cattaneo, Luigi Catuogno, Aniello Del Sorbo, Pino Persiano
The Design and Implementation of a Transparent Cryptographic File System for UNIX. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2001, pp:199-212 [Conf]
- Luigi Catuogno, Ivan Visconti
An Architecture for Kernel-Level Verification of Executables at Run Time. [Citation Graph (0, 0)][DBLP] Comput. J., 2004, v:47, n:5, pp:511-526 [Journal]
PITO: A Children-Friendly Interface for Security Tools. [Citation Graph (, )][DBLP]
Transparent Mobile Storage Protection in Trusted Virtual Domains. [Citation Graph (, )][DBLP]
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices. [Citation Graph (, )][DBLP]
On the Security of a Two-Factor Authentication Scheme. [Citation Graph (, )][DBLP]
An internet role-game for the laboratory of network security course. [Citation Graph (, )][DBLP]
Trusted Virtual Domains - Design, Implementation and Lessons Learned. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|