The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Antonio Lioy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gianpiero Cabodi, Paolo Camurati, Antonio Lioy, Massimo Poncino, Stefano Quer
    A parallel approach to symbolic traversal based on set partitioning. [Citation Graph (0, 0)][DBLP]
    CHARME, 1997, pp:167-184 [Conf]
  2. Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno
    Decentralised Access Control in 802.11 Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:180-190 [Conf]
  3. Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala
    Motivations for a Theoretical Approach to WYSIWYS. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:289-290 [Conf]
  4. Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino
    Computational Kernels and their Application to Sequential Power Optimization. [Citation Graph (0, 0)][DBLP]
    DAC, 1998, pp:764-769 [Conf]
  5. Antonio Lioy, Gianluca Ramunno
    Multiple electronic signatures on multiple documents. [Citation Graph (0, 0)][DBLP]
    EGCDMAS, 2004, pp:24-34 [Conf]
  6. Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala
    The EuroPKI Experience. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:14-27 [Conf]
  7. Massimiliano Pala, Antonio Lioy
    Fighting E-Mail Abuses: The EMPE Approach. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:130-144 [Conf]
  8. Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino
    Timed Supersetting and the Synthesis of Telescopic Units. [Citation Graph (0, 0)][DBLP]
    Great Lakes Symposium on VLSI, 1998, pp:331-337 [Conf]
  9. Antonio Lioy, Enrico Macii, Massimo Poncino, Massimo Rossello
    Accurate Entropy Calculation for Large Logic Circuits Based on Output Clustering. [Citation Graph (0, 0)][DBLP]
    Great Lakes Symposium on VLSI, 1997, pp:70-0 [Conf]
  10. Diana Berbecaru, Antonio Lioy
    Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI. [Citation Graph (0, 0)][DBLP]
    ICWI, 2004, pp:317-324 [Conf]
  11. Diana Berbecaru, Antonio Lioy, Marius Marian, Diana Marano
    Secure Digital Administration in Medical Environment. [Citation Graph (0, 0)][DBLP]
    ICWI, 2002, pp:299-306 [Conf]
  12. Antonio Lioy, Fabio Maino, Marco Mezzalama
    Secure document management and distribution in an open network environment. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:109-117 [Conf]
  13. Antonio Lioy, Massimo Poncino
    On the Resetability of Synchronous Sequential Circuits. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:1507-1510 [Conf]
  14. Diana Berbecaru, Antonio Lioy, Marius Marian
    Security aspects in standard certificate revocation mechanisms: a case study for OCSP. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:484-489 [Conf]
  15. Marco Domenico Aime, Giorgio Calandriello, Antonio Lioy
    A Wireless Distributed Intrusion Detection System and a New Attack Model. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:35-40 [Conf]
  16. Diana Berbecaru, Antonio Lioy, Marius Marian
    On the Complexity of Public-Key Certificate Validation. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:183-203 [Conf]
  17. Antonio Lioy
    Looking for Functional Fault Equivalence. [Citation Graph (0, 0)][DBLP]
    ITC, 1991, pp:858-863 [Conf]
  18. Bogdan Costinescu, Dan Dragomirescu, Antonio Lioy, Cristian Marinescu
    A Component-based Infrastructure for Building Cluster Management and Monitoring Tools. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:2041-2047 [Conf]
  19. Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino
    A Flexible Management Framework for Certificate Status Validation. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:481-490 [Conf]
  20. Daniel Alberto Galliano, Antonio Lioy, Fabio Maino
    Non-intrusive authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:440-451 [Conf]
  21. Marco Domenico Aime, Andrea S. Atzeni, Antonio Lioy
    The Wireless Opaque Channel to Contrast Information Leakage. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2005, pp:570-575 [Conf]
  22. Marco Domenico Aime, Antonio Lioy
    Incremental Trust: Building Trust from Past Experience. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2005, pp:603-608 [Conf]
  23. Madalina Baltatu, Antonio Lioy, Fabio Maino, Daniele Mazzocchi
    Security issues in control, management and routing protocols. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:6, pp:881-894 [Journal]
  24. Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala
    PKI past, present and future. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:1, pp:18-29 [Journal]
  25. Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino
    Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1999, v:48, n:8, pp:769-779 [Journal]
  26. Antonio Lioy
    On the Equivalence of Fanout-Point Faults. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1993, v:42, n:3, pp:268-271 [Journal]
  27. Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino
    Synthesis of power-managed sequential components based oncomputational kernel extraction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2001, v:20, n:9, pp:1118-1131 [Journal]
  28. Diana Berbecaru, Antonio Lioy
    On the Robustness of Applications Based on the SSL and TLS Security Protocols. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:248-264 [Conf]
  29. Cataldo Basile, Antonio Lioy, Gregorio Martínez Pérez, Félix J. García Clemente, Antonio F. Gómez-Skarmeta
    POSITIF: A Policy-Based Security Management System. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:280- [Conf]

  30. Testing redundant asynchronous circuits by variable phase splitting. [Citation Graph (, )][DBLP]


  31. Diagnosis oriented test pattern generation. [Citation Graph (, )][DBLP]


  32. An Estimation of Attack Surface to Evaluate Network (in)security. [Citation Graph (, )][DBLP]


  33. Efficient and robust pseudonymous authentication in VANET. [Citation Graph (, )][DBLP]


  34. Towards a Network-Independent Policy Specification. [Citation Graph (, )][DBLP]


  35. Geometric Interpretation of Policy Specification. [Citation Graph (, )][DBLP]


  36. Test generation in a distributed environment. [Citation Graph (, )][DBLP]


  37. Security Analysis and Configuration of Large Networks. [Citation Graph (, )][DBLP]


  38. MagicNET: Security System for Development, Validation and Adoption of Mobile Agents. [Citation Graph (, )][DBLP]


  39. Impact of Vehicular Communications Security on Transportation Safety [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002