Luigi Catuogno
Luigi Catuogno
Dipartimento di Informatica, Università degli Studi di Salerno, ITALY
Verified email at dia.unisa.it
Title
Cited by
Cited by
Year
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
G Cattaneo, L Catuogno, A Del Sorbo, P Persiano
USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001
2722001
Trusted virtual domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
International Conference on Trusted Systems, 156-179, 2009
472009
Transparent mobile storage protection in trusted virtual domains
L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy
23rd USENIX Large Installation Systems Administration Conference (LISA 2009 …, 2009
232009
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
L Catuogno, I Visconti
International Conference on Security in Communication Networks, 219-233, 2002
232002
An internet role-game for the laboratory of network security course
L Catuogno, A De Santis
ACM SIGCSE Bulletin 40 (3), 240-244, 2008
212008
A trusted versioning file system for passive mobile storage devices
L Catuogno, H Löhr, M Winandy, AR Sadeghi
Journal of Network and Computer Applications 38, 65-75, 2014
202014
A honeypot system with honeyword-driven fake interactive sessions
L Catuogno, A Castiglione, F Palmieri
2015 International Conference on High Performance Computing & Simulation …, 2015
182015
Analysis of a two-factor graphical password scheme
L Catuogno, C Galdi
International journal of information security 13 (5), 421-437, 2014
182014
Trusted virtual domains: Color your network
L Catuogno, H Löhr, M Manulis, AR Sadeghi, C Stüble, M Winandy
Datenschutz und Datensicherheit-DuD 34 (5), 289-294, 2010
182010
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008
182008
On the security of a two-factor authentication scheme
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices …, 2010
172010
An architecture for kernel-level verification of executables at run time
L Catuogno, I Visconti
The Computer Journal 47 (5), 511-526, 2004
172004
A secure file sharing service for distributed computing environments
A Castiglione, L Catuogno, A Del Sorbo, U Fiore, F Palmieri
The Journal of Supercomputing 67 (3), 691-710, 2014
162014
On the evaluation of security properties of containerized systems
L Catuogno, C Galdi
2016 15th International Conference on Ubiquitous Computing and …, 2016
152016
The dark side of the interconnection: security and privacy in the Web of Things
L Catuogno, S Turchi
2015 9th International Conference on Innovative Mobile and Internet Services …, 2015
152015
On user authentication by means of video events recognition
L Catuogno, C Galdi
Journal of Ambient Intelligence and Humanized Computing 5 (6), 909-918, 2014
102014
On asynchronous enforcement of security policies in “Nomadic” storage facilities
I You, L Catuogno, A Castiglione, G Cattaneo
2013 IEEE International Symposium on Industrial Electronics, 1-6, 2013
92013
An effective methodology for measuring software resource usage
L Catuogno, C Galdi, N Pasquino
IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018
82018
Smartk: Smart cards in operating systems at kernel level
L Catuogno, R Gassirà, M Masullo, I Visconti
Information Security Technical Report 17 (3), 93-104, 2013
82013
Off-line enterprise rights management leveraging biometric key binding and secure hardware
L Catuogno, C Galdi, D Riccio
Journal of Ambient Intelligence and Humanized Computing 10 (7), 2883-2894, 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20