Luigi Catuogno
Luigi Catuogno
Dipartimento di Informatica, UniversitÓ degli Studi di Salerno, ITALY
Email verificata su
Citata da
Citata da
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
G Cattaneo, L Catuogno, A Del Sorbo, P Persiano
USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001
Trusted virtual domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
International Conference on Trusted Systems, 156-179, 2009
Transparent mobile storage protection in trusted virtual domains
L Catuogno, H L÷hr, M Manulis, AR Sadeghi, M Winandy
23rd USENIX Large Installation Systems Administration Conference (LISA 2009á…, 2009
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
L Catuogno, I Visconti
International Conference on Security in Communication Networks, 219-233, 2002
An internet role-game for the laboratory of network security course
L Catuogno, A De Santis
ACM SIGCSE Bulletin 40 (3), 240-244, 2008
A trusted versioning file system for passive mobile storage devices
L Catuogno, H L÷hr, M Winandy, AR Sadeghi
Journal of Network and Computer Applications 38, 65-75, 2014
A honeypot system with honeyword-driven fake interactive sessions
L Catuogno, A Castiglione, F Palmieri
2015 International Conference on High Performance Computing & Simulationá…, 2015
Analysis of a two-factor graphical password scheme
L Catuogno, C Galdi
International journal of information security 13 (5), 421-437, 2014
Trusted virtual domains: Color your network
L Catuogno, H L÷hr, M Manulis, AR Sadeghi, C StŘble, M Winandy
Datenschutz und Datensicherheit-DuD 34 (5), 289-294, 2010
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008
On the security of a two-factor authentication scheme
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practicesá…, 2010
An architecture for kernel-level verification of executables at run time
L Catuogno, I Visconti
The Computer Journal 47 (5), 511-526, 2004
A secure file sharing service for distributed computing environments
A Castiglione, L Catuogno, A Del Sorbo, U Fiore, F Palmieri
The Journal of Supercomputing 67 (3), 691-710, 2014
On the evaluation of security properties of containerized systems
L Catuogno, C Galdi
2016 15th International Conference on Ubiquitous Computing andá…, 2016
The dark side of the interconnection: security and privacy in the Web of Things
L Catuogno, S Turchi
2015 9th International Conference on Innovative Mobile and Internet Servicesá…, 2015
On user authentication by means of video events recognition
L Catuogno, C Galdi
Journal of Ambient Intelligence and Humanized Computing 5 (6), 909-918, 2014
On asynchronous enforcement of security policies in “Nomadic” storage facilities
I You, L Catuogno, A Castiglione, G Cattaneo
2013 IEEE International Symposium on Industrial Electronics, 1-6, 2013
An effective methodology for measuring software resource usage
L Catuogno, C Galdi, N Pasquino
IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018
Smartk: Smart cards in operating systems at kernel level
L Catuogno, R GassirÓ, M Masullo, I Visconti
Information Security Technical Report 17 (3), 93-104, 2013
Off-line enterprise rights management leveraging biometric key binding and secure hardware
L Catuogno, C Galdi, D Riccio
Journal of Ambient Intelligence and Humanized Computing 10 (7), 2883-2894, 2019
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20