Luigi Catuogno
Luigi Catuogno
Dipartimento di Informatica, Università degli Studi di Salerno, ITALY
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
G Cattaneo, L Catuogno, A Del Sorbo, P Persiano
USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001
Trusted Virtual Domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010
A honeypot system with honeyword-driven fake interactive sessions
L Catuogno, A Castiglione, F Palmieri
2015 International Conference on High Performance Computing & Simulation …, 2015
Transparent mobile storage protection in trusted virtual domains
L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy
23rd USENIX Large Installation Systems Administration Conference (LISA 2009 …, 2009
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
L Catuogno, I Visconti
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
A trusted versioning file system for passive mobile storage devices
L Catuogno, H Löhr, M Winandy, AR Sadeghi
Journal of Network and Computer Applications 38, 65-75, 2014
Analysis of a two-factor graphical password scheme
L Catuogno, C Galdi
International journal of information security 13, 421-437, 2014
An internet role-game for the laboratory of network security course
L Catuogno, A De Santis
ACM SIGCSE Bulletin 40 (3), 240-244, 2008
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
L Catuogno, C Galdi
Information Security Theory and Practices. Smart Devices, Convergence and …, 2008
On the security of a two-factor authentication scheme
L Catuogno, C Galdi
Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010
The dark side of the interconnection: security and privacy in the Web of Things
L Catuogno, S Turchi
2015 9th International Conference on Innovative Mobile and Internet Services …, 2015
Trusted virtual domains: Color your network
L Catuogno, H Löhr, M Manulis, AR Sadeghi, C Stüble, M Winandy
Datenschutz und Datensicherheit-DuD 34 (5), 289-294, 2010
An architecture for kernel-level verification of executables at run time
L Catuogno, I Visconti
The Computer Journal 47 (5), 511-526, 2004
On the evaluation of security properties of containerized systems
L Catuogno, C Galdi
2016 15th International Conference on Ubiquitous Computing and …, 2016
A secure file sharing service for distributed computing environments
A Castiglione, L Catuogno, A Del Sorbo, U Fiore, F Palmieri
The Journal of Supercomputing 67, 691-710, 2014
An effective methodology for measuring software resource usage
L Catuogno, C Galdi, N Pasquino
IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018
Off-line enterprise rights management leveraging biometric key binding and secure hardware
L Catuogno, C Galdi, D Riccio
Journal of Ambient Intelligence and Humanized Computing 10, 2883-2894, 2019
On user authentication by means of video events recognition
L Catuogno, C Galdi
Journal of Ambient Intelligence and Humanized Computing 5, 909-918, 2014
Achieving interoperability between federated identity management systems: A case of study
L Catuogno, C Galdi
Journal of High Speed Networks 20 (4), 209-221, 2014
On asynchronous enforcement of security policies in “Nomadic” storage facilities
I You, L Catuogno, A Castiglione, G Cattaneo
2013 IEEE International Symposium on Industrial Electronics, 1-6, 2013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20