|
Search the dblp DataBase
Antonio Lioy:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Gianpiero Cabodi, Paolo Camurati, Antonio Lioy, Massimo Poncino, Stefano Quer
A parallel approach to symbolic traversal based on set partitioning. [Citation Graph (0, 0)][DBLP] CHARME, 1997, pp:167-184 [Conf]
- Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno
Decentralised Access Control in 802.11 Networks. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:180-190 [Conf]
- Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala
Motivations for a Theoretical Approach to WYSIWYS. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:289-290 [Conf]
- Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino
Computational Kernels and their Application to Sequential Power Optimization. [Citation Graph (0, 0)][DBLP] DAC, 1998, pp:764-769 [Conf]
- Antonio Lioy, Gianluca Ramunno
Multiple electronic signatures on multiple documents. [Citation Graph (0, 0)][DBLP] EGCDMAS, 2004, pp:24-34 [Conf]
- Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala
The EuroPKI Experience. [Citation Graph (0, 0)][DBLP] EuroPKI, 2004, pp:14-27 [Conf]
- Massimiliano Pala, Antonio Lioy
Fighting E-Mail Abuses: The EMPE Approach. [Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:130-144 [Conf]
- Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino
Timed Supersetting and the Synthesis of Telescopic Units. [Citation Graph (0, 0)][DBLP] Great Lakes Symposium on VLSI, 1998, pp:331-337 [Conf]
- Antonio Lioy, Enrico Macii, Massimo Poncino, Massimo Rossello
Accurate Entropy Calculation for Large Logic Circuits Based on Output Clustering. [Citation Graph (0, 0)][DBLP] Great Lakes Symposium on VLSI, 1997, pp:70-0 [Conf]
- Diana Berbecaru, Antonio Lioy
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI. [Citation Graph (0, 0)][DBLP] ICWI, 2004, pp:317-324 [Conf]
- Diana Berbecaru, Antonio Lioy, Marius Marian, Diana Marano
Secure Digital Administration in Medical Environment. [Citation Graph (0, 0)][DBLP] ICWI, 2002, pp:299-306 [Conf]
- Antonio Lioy, Fabio Maino, Marco Mezzalama
Secure document management and distribution in an open network environment. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:109-117 [Conf]
- Antonio Lioy, Massimo Poncino
On the Resetability of Synchronous Sequential Circuits. [Citation Graph (0, 0)][DBLP] ISCAS, 1993, pp:1507-1510 [Conf]
- Diana Berbecaru, Antonio Lioy, Marius Marian
Security aspects in standard certificate revocation mechanisms: a case study for OCSP. [Citation Graph (0, 0)][DBLP] ISCC, 2002, pp:484-489 [Conf]
- Marco Domenico Aime, Giorgio Calandriello, Antonio Lioy
A Wireless Distributed Intrusion Detection System and a New Attack Model. [Citation Graph (0, 0)][DBLP] ISCC, 2006, pp:35-40 [Conf]
- Diana Berbecaru, Antonio Lioy, Marius Marian
On the Complexity of Public-Key Certificate Validation. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:183-203 [Conf]
- Antonio Lioy
Looking for Functional Fault Equivalence. [Citation Graph (0, 0)][DBLP] ITC, 1991, pp:858-863 [Conf]
- Bogdan Costinescu, Dan Dragomirescu, Antonio Lioy, Cristian Marinescu
A Component-based Infrastructure for Building Cluster Management and Monitoring Tools. [Citation Graph (0, 0)][DBLP] PDPTA, 1999, pp:2041-2047 [Conf]
- Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino
A Flexible Management Framework for Certificate Status Validation. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:481-490 [Conf]
- Daniel Alberto Galliano, Antonio Lioy, Fabio Maino
Non-intrusive authentication. [Citation Graph (0, 0)][DBLP] SEC, 1997, pp:440-451 [Conf]
- Marco Domenico Aime, Andrea S. Atzeni, Antonio Lioy
The Wireless Opaque Channel to Contrast Information Leakage. [Citation Graph (0, 0)][DBLP] WOWMOM, 2005, pp:570-575 [Conf]
- Marco Domenico Aime, Antonio Lioy
Incremental Trust: Building Trust from Past Experience. [Citation Graph (0, 0)][DBLP] WOWMOM, 2005, pp:603-608 [Conf]
- Madalina Baltatu, Antonio Lioy, Fabio Maino, Daniele Mazzocchi
Security issues in control, management and routing protocols. [Citation Graph (0, 0)][DBLP] Computer Networks, 2000, v:34, n:6, pp:881-894 [Journal]
- Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala
PKI past, present and future. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:18-29 [Journal]
- Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino
Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1999, v:48, n:8, pp:769-779 [Journal]
- Antonio Lioy
On the Equivalence of Fanout-Point Faults. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1993, v:42, n:3, pp:268-271 [Journal]
- Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino
Synthesis of power-managed sequential components based oncomputational kernel extraction. [Citation Graph (0, 0)][DBLP] IEEE Trans. on CAD of Integrated Circuits and Systems, 2001, v:20, n:9, pp:1118-1131 [Journal]
- Diana Berbecaru, Antonio Lioy
On the Robustness of Applications Based on the SSL and TLS Security Protocols. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:248-264 [Conf]
- Cataldo Basile, Antonio Lioy, Gregorio Martínez Pérez, Félix J. García Clemente, Antonio F. Gómez-Skarmeta
POSITIF: A Policy-Based Security Management System. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:280- [Conf]
Testing redundant asynchronous circuits by variable phase splitting. [Citation Graph (, )][DBLP]
Diagnosis oriented test pattern generation. [Citation Graph (, )][DBLP]
An Estimation of Attack Surface to Evaluate Network (in)security. [Citation Graph (, )][DBLP]
Efficient and robust pseudonymous authentication in VANET. [Citation Graph (, )][DBLP]
Towards a Network-Independent Policy Specification. [Citation Graph (, )][DBLP]
Geometric Interpretation of Policy Specification. [Citation Graph (, )][DBLP]
Test generation in a distributed environment. [Citation Graph (, )][DBLP]
Security Analysis and Configuration of Large Networks. [Citation Graph (, )][DBLP]
MagicNET: Security System for Development, Validation and Adoption of Mobile Agents. [Citation Graph (, )][DBLP]
Impact of Vehicular Communications Security on Transportation Safety [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|