The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Germano Caronni: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Germano Caronni, S. Kumar, Christoph L. Schuba, G. Scott
    Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:42-51 [Conf]
  2. Germano Caronni, Christoph L. Schuba
    Enabling Hierarchical and Bulk-Distribution for Watermarked Content. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:277-285 [Conf]
  3. Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni
    A Trust-Aware, P2P-Based Overlay for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2006, pp:692-697 [Conf]
  4. Claudiu Duma, Nahid Shahmehri, Germano Caronni
    Dynamic Trust Metrics for Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:776-781 [Conf]
  5. Germano Caronni
    Firewalls in a P2P World. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2001, pp:29- [Conf]
  6. Germano Caronni, Marcel Waldvogel
    Establishing Trust in Distributed Storage Providers. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2003, pp:128-133 [Conf]
  7. Diana Senn, David A. Basin, Germano Caronni
    Firewall Conformance Testing. [Citation Graph (0, 0)][DBLP]
    TestCom, 2005, pp:226-241 [Conf]
  8. Gal Badishi, Germano Caronni, Idit Keidar, Raphael Rom, Glenn Scott
    Deleting Files in the Celeste Peer-to-Peer Storage System. [Citation Graph (0, 0)][DBLP]
    SRDS, 2006, pp:29-38 [Conf]
  9. Germano Caronni
    Assuring Ownership Rights for Digital Images. [Citation Graph (0, 0)][DBLP]
    VIS, 1995, pp:251-0 [Conf]
  10. Germano Caronni, Hannes Lubich, Ashar Aziz, Tom Markson, Rich Skrenta
    SKIP-securing the Internet. [Citation Graph (0, 0)][DBLP]
    WETICE, 1996, pp:62-67 [Conf]
  11. Germano Caronni, Marcel Waldvogel, Dan Sun, Bernhard Plattner
    Efficient Security for Large and Dynamic Multicast Groups. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:376-383 [Conf]
  12. Germano Caronni
    Walking the Web of Trust. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:153-158 [Conf]
  13. Wu Wen, Germano Caronni, Yahya Y. Al-Salqan
    Summary Report on Enterprise Security Workshop. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:129-131 [Conf]
  14. Thomas Gutekunst, Daniel Bauer, Germano Caronni, Hasan, Bernhard Plattner
    A distributed and policy-free general-purpose shared window system. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1995, v:3, n:1, pp:51-62 [Journal]
  15. Diana von Bidder, David A. Basin, Germano Caronni
    Midpoints Versus Endpoints: From Protocols to Firewalls. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:46-64 [Conf]

  16. Maintaining Object Ordering in a Shared P2P Storage Environment. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002