Sfoglia per Autore
Validating Orchestration of Web Services with BPEL and Aggregate Signatures
2008-01-01 Blundo, C.; DE CRISTOFARO, E; Galdi, C.; Persiano, G
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
2008-01-01 Catuogno, Luigi; Galdi, Clemente
Hypergraph Decomposition and Secret Sharing Schemes
2009-01-01 G., DI CRESCENZO; Galdi, Clemente
On the security of a two-factor authentication scheme
2010-01-01 Catuogno, Luigi; Galdi, Clemente
Towards a mechanism for incentivating privacy
2011-01-01 Bonatti, PIERO ANDREA; Faella, Marco; Galdi, Clemente; Sauro, Luigi
Graphical Passwords
2012-01-01 Catuogno, Luigi; Galdi, Clemente
Certified Information Access
2013-01-01 Blundo, Carlo; DE CARO, Angelo; Galdi, Clemente; Persiano, Giuseppe
An Integrated Formal Approach to Usage Control
2013-01-01 Bonatti, P. A.; Sauro, L.; Faella, M.; Galdi, C.
Auctions for Partial Heterogeneous Preferences
2013-01-01 Bonatti, Piero A.; Faella, Marco; Galdi, Clemente; Sauro, Luigi
Towards the design of a film-based graphical password scheme
2013-01-01 Catuogno, Luigi; Galdi, Clemente
ERBAC: event-driven RBAC
2013-01-01 Bonatti, PIERO ANDREA; Galdi, Clemente; Davide, Torres
On user authentication by means of video events recognition
2014-01-01 Catuogno, Luigi; Galdi, Clemente
Optimality and Complexity of Inference-Proof Data Filtering and CQE
2014-01-01 J., Biskup; Bonatti, PIERO ANDREA; Galdi, Clemente; Sauro, Luigi
e-Auctions for Multi-Cloud Service Provisioning
2014-01-01 M., Anisetti; C., Ardagna; Bonatti, PIERO ANDREA; E., Damiani; Faella, Marco; Galdi, Clemente; Sauro, Luigi
Analysis of a two-factor graphical password scheme
2014-01-01 Catuogno, Luigi; Galdi, Clemente
Achieving interoperability between federated identity management systems: A case of study
2014-01-01 Catuogno, Luigi; Galdi, Clemente
Interoperability between federated authentication systems
2014-01-01 Catuogno, Luigi; Galdi, Clemente
Event-driven RBAC
2015-01-01 Bonatti, Piero; Galdi, Clemente; Torres, Davide
Guaranteeing dependency enforcement in software updates
2015-01-01 Catuogno, Luigi; Galdi, Clemente; Persiano, Giuseppe
Ensuring Application Integrity: A Survey on Techniques and Tools
2015-01-01 Catuogno, Luigi; Galdi, Clemente
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Validating Orchestration of Web Services with BPEL and Aggregate Signatures | 1-gen-2008 | Blundo, C.; DE CRISTOFARO, E; Galdi, C.; Persiano, G | |
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices | 1-gen-2008 | Catuogno, Luigi; Galdi, Clemente | |
Hypergraph Decomposition and Secret Sharing Schemes | 1-gen-2009 | G., DI CRESCENZO; Galdi, Clemente | |
On the security of a two-factor authentication scheme | 1-gen-2010 | Catuogno, Luigi; Galdi, Clemente | |
Towards a mechanism for incentivating privacy | 1-gen-2011 | Bonatti, PIERO ANDREA; Faella, Marco; Galdi, Clemente; Sauro, Luigi | |
Graphical Passwords | 1-gen-2012 | Catuogno, Luigi; Galdi, Clemente | |
Certified Information Access | 1-gen-2013 | Blundo, Carlo; DE CARO, Angelo; Galdi, Clemente; Persiano, Giuseppe | |
An Integrated Formal Approach to Usage Control | 1-gen-2013 | Bonatti, P. A.; Sauro, L.; Faella, M.; Galdi, C. | |
Auctions for Partial Heterogeneous Preferences | 1-gen-2013 | Bonatti, Piero A.; Faella, Marco; Galdi, Clemente; Sauro, Luigi | |
Towards the design of a film-based graphical password scheme | 1-gen-2013 | Catuogno, Luigi; Galdi, Clemente | |
ERBAC: event-driven RBAC | 1-gen-2013 | Bonatti, PIERO ANDREA; Galdi, Clemente; Davide, Torres | |
On user authentication by means of video events recognition | 1-gen-2014 | Catuogno, Luigi; Galdi, Clemente | |
Optimality and Complexity of Inference-Proof Data Filtering and CQE | 1-gen-2014 | J., Biskup; Bonatti, PIERO ANDREA; Galdi, Clemente; Sauro, Luigi | |
e-Auctions for Multi-Cloud Service Provisioning | 1-gen-2014 | M., Anisetti; C., Ardagna; Bonatti, PIERO ANDREA; E., Damiani; Faella, Marco; Galdi, Clemente; Sauro, Luigi | |
Analysis of a two-factor graphical password scheme | 1-gen-2014 | Catuogno, Luigi; Galdi, Clemente | |
Achieving interoperability between federated identity management systems: A case of study | 1-gen-2014 | Catuogno, Luigi; Galdi, Clemente | |
Interoperability between federated authentication systems | 1-gen-2014 | Catuogno, Luigi; Galdi, Clemente | |
Event-driven RBAC | 1-gen-2015 | Bonatti, Piero; Galdi, Clemente; Torres, Davide | |
Guaranteeing dependency enforcement in software updates | 1-gen-2015 | Catuogno, Luigi; Galdi, Clemente; Persiano, Giuseppe | |
Ensuring Application Integrity: A Survey on Techniques and Tools | 1-gen-2015 | Catuogno, Luigi; Galdi, Clemente |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile