|
Search the dblp DataBase
Clemente Galdi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
Design and Implementation of an Inline Certified E-mail Service. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:186-199 [Conf]
- Clemente Galdi, Pino Persiano
Private Computation with Shared Randomness over Broadcast Channel. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:244-257 [Conf]
- Carlo Blundo, Clemente Galdi
Steganography Using Modern Arts. [Citation Graph (0, 0)][DBLP] IFIP TCS, 2000, pp:140-151 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
A Novel Approach to Proactive Password Checking. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:30-39 [Conf]
- Ioannis Caragiannis, Clemente Galdi, Christos Kaklamanis
Basic Computations in Wireless Networks. [Citation Graph (0, 0)][DBLP] ISAAC, 2005, pp:533-542 [Conf]
- Ioannis Caragiannis, Clemente Galdi, Christos Kaklamanis
Network Load Games. [Citation Graph (0, 0)][DBLP] ISAAC, 2005, pp:809-818 [Conf]
- Giovanni Di Crescenzo, Clemente Galdi
Hypergraph Decomposition and Secret Sharing. [Citation Graph (0, 0)][DBLP] ISAAC, 2003, pp:645-654 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
Hyppocrates. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:63-80 [Conf]
- Clemente Galdi, Christos Kaklamanis, Manuela Montangero, Pino Persiano
Optimal and Approximate Station Placement in Networks (With Applications to Multicasting and Space Efficient Traversals). [Citation Graph (0, 0)][DBLP] STACS, 2001, pp:271-282 [Conf]
- Clemente Galdi, Raffaella Giordano
Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol. [Citation Graph (0, 0)][DBLP] TrustBus, 2004, pp:181-190 [Conf]
- Carlo Blundo, Clemente Galdi, Pino Persiano
Randomness Recycling in Constant-Round Private Computations (extended Abstract). [Citation Graph (0, 0)][DBLP] DISC, 1999, pp:138-150 [Conf]
- Carlo Blundo, Clemente Galdi
Hiding Information in Image Mosaics. [Citation Graph (0, 0)][DBLP] Comput. J., 2003, v:46, n:2, pp:202-212 [Journal]
- Carlo Blundo, Clemente Galdi, Giuseppe Persiano
Low-randomness constant-round private XOR computations. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:1, pp:15-26 [Journal]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
HYPPOCRATES: a new proactive password checker. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2004, v:71, n:1-2, pp:163-175 [Journal]
- Clemente Galdi, Christos Kaklamanis, Manuela Montangero, Giuseppe Persiano
Station Placement in Networks. [Citation Graph (0, 0)][DBLP] Parallel Processing Letters, 2005, v:15, n:1-2, pp:117-130 [Journal]
- Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri
Neural Network Techniques for Proactive Password Checking. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:327-339 [Journal]
- Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano
Distributed Certified Information Access for Mobile Devices. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:67-79 [Conf]
Validating Orchestration of Web Services with BPEL and Aggregate Signatures. [Citation Graph (, )][DBLP]
A Distributed Implementation of the Certified Information Access Service. [Citation Graph (, )][DBLP]
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices. [Citation Graph (, )][DBLP]
On the Security of a Two-Factor Authentication Scheme. [Citation Graph (, )][DBLP]
Hypergraph decomposition and secret sharing. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|