Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 46
Titolo Data di pubblicazione Autore(i) File
The Design and Implementation of a Transparent Cryptographic File System for UNIX 1-gen-2001 Cattaneo, Giuseppe; Catuogno, Luigi; Del Sorbo, Aniello; Persiano, Giuseppe
Applying WBEM to heterogeneous TLC Network Management: an evaluation 1-gen-2003 Castiglione, Aniello; Cattaneo, Giuseppe; Catuogno, Luigi; Ferraro Petrillo, Umberto; Parente, Domenico; Fresa, Antonio; Casella, Raffaele; Auletta, Luigi; De Gregorio, Antonio
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code 1-gen-2003 Catuogno, Luigi; Visconti, Ivan
A Lightweight Security Model for WBEM 1-gen-2003 Cattaneo, Giuseppe; Catuogno, Luigi; Umberto Ferraro, Petrillo; Visconti, Ivan
An Architecture for Kernel-Level Verification of Executables at Run Time 1-gen-2004 Catuogno, Luigi; Visconti, Ivan
Reliable Accounting in Grid Economic Transactions 1-gen-2004 Catuogno, Luigi; Pompeo, Faruolo; Umberto Ferraro, Petrillo; Visconti, Ivan
Securing Operating System Services Based on Smart Cards 1-gen-2005 Catuogno, Luigi; Roberto, Gassirà; Michele, Masullo; Visconti, Ivan
iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security 1-gen-2007 Cattaneo, Giuseppe; Catuogno, Luigi; Di Matteo, G; Petagna, Fabio; Romano, Luigi
Implementation of Interoperable Security Features for a Smart Card enabled VoIP Softphone 1-gen-2008 Cattaneo, Giuseppe; Catuogno, Luigi; Petagna, F.
An Implementation of Interoperable Security Features for a Smart Card enabled VoIP Softphone 1-gen-2008 Cattaneo, Giuseppe; Catuogno, Luigi; Petagna, Fabio
PITO: A children-friendly interface for security tools 1-gen-2008 Catuogno, Luigi
An internet role-game for the laboratory of a network security course 1-gen-2008 Catuogno, Luigi; DE SANTIS, Alfredo
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices 1-gen-2008 Catuogno, Luigi; Galdi, Clemente
Transparent Mobile Storage Protection in Trusted Virtual Domains 1-gen-2009 Catuogno, Luigi; Loehr, Hans; Manulis, Mark; Sadeghi, Ahmad Reza; Winandy, Marcel
Trusted virtual domains: Color your network 1-gen-2010 Catuogno, Luigi; Löhr, Hans; Manulis, Mark; Sadeghi, Ahmad Reza; Stüble, Christian; Winandy, Marcel
Trusted virtual domains - Design, implementation and lessons learned 1-gen-2010 Catuogno, Luigi; Dmitrienko, Alexandra; Eriksson, Konrad; Kuhlmann, Dirk; Ramunno, Gianluca; Sadeghi, Ahmad Reza; Schulz, Steffen; Schunter, Matthias; Winandy, Marcel; Zhan, Jing
On the security of a two-factor authentication scheme 1-gen-2010 Catuogno, Luigi; Galdi, Clemente
Graphical Passwords 1-gen-2012 Catuogno, Luigi; Galdi, Clemente
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education 1-gen-2012 Castiglione, Aniello; Cattaneo, Giuseppe; Catuogno, Luigi; Cerrelli, Ezio; DI GIAMPAOLO, Carlo; Marino, Fulvio; Rotondo, Rodolfo
On asynchronous enforcement of security policies in 'Nomadic' storage facilities 1-gen-2013 You, Ilsun; Catuogno, Luigi; Castiglione, Aniello; Cattaneo, Giuseppe
Mostrati risultati da 1 a 20 di 46
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile