The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Clemente Galdi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
    Design and Implementation of an Inline Certified E-mail Service. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:186-199 [Conf]
  2. Clemente Galdi, Pino Persiano
    Private Computation with Shared Randomness over Broadcast Channel. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:244-257 [Conf]
  3. Carlo Blundo, Clemente Galdi
    Steganography Using Modern Arts. [Citation Graph (0, 0)][DBLP]
    IFIP TCS, 2000, pp:140-151 [Conf]
  4. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    A Novel Approach to Proactive Password Checking. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:30-39 [Conf]
  5. Ioannis Caragiannis, Clemente Galdi, Christos Kaklamanis
    Basic Computations in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2005, pp:533-542 [Conf]
  6. Ioannis Caragiannis, Clemente Galdi, Christos Kaklamanis
    Network Load Games. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2005, pp:809-818 [Conf]
  7. Giovanni Di Crescenzo, Clemente Galdi
    Hypergraph Decomposition and Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2003, pp:645-654 [Conf]
  8. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    Hyppocrates. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:63-80 [Conf]
  9. Clemente Galdi, Christos Kaklamanis, Manuela Montangero, Pino Persiano
    Optimal and Approximate Station Placement in Networks (With Applications to Multicasting and Space Efficient Traversals). [Citation Graph (0, 0)][DBLP]
    STACS, 2001, pp:271-282 [Conf]
  10. Clemente Galdi, Raffaella Giordano
    Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:181-190 [Conf]
  11. Carlo Blundo, Clemente Galdi, Pino Persiano
    Randomness Recycling in Constant-Round Private Computations (extended Abstract). [Citation Graph (0, 0)][DBLP]
    DISC, 1999, pp:138-150 [Conf]
  12. Carlo Blundo, Clemente Galdi
    Hiding Information in Image Mosaics. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2003, v:46, n:2, pp:202-212 [Journal]
  13. Carlo Blundo, Clemente Galdi, Giuseppe Persiano
    Low-randomness constant-round private XOR computations. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:1, pp:15-26 [Journal]
  14. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    HYPPOCRATES: a new proactive password checker. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:71, n:1-2, pp:163-175 [Journal]
  15. Clemente Galdi, Christos Kaklamanis, Manuela Montangero, Giuseppe Persiano
    Station Placement in Networks. [Citation Graph (0, 0)][DBLP]
    Parallel Processing Letters, 2005, v:15, n:1-2, pp:117-130 [Journal]
  16. Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri
    Neural Network Techniques for Proactive Password Checking. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:327-339 [Journal]
  17. Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano
    Distributed Certified Information Access for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:67-79 [Conf]

  18. Validating Orchestration of Web Services with BPEL and Aggregate Signatures. [Citation Graph (, )][DBLP]


  19. A Distributed Implementation of the Certified Information Access Service. [Citation Graph (, )][DBLP]


  20. A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices. [Citation Graph (, )][DBLP]


  21. On the Security of a Two-Factor Authentication Scheme. [Citation Graph (, )][DBLP]


  22. Hypergraph decomposition and secret sharing. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002