Clemente Galdi
Clemente Galdi
Assistant Professor of Computer Science, Universita' di Salerno
Verified email at unisa.it
Title
Cited by
Cited by
Year
Neural network techniques for proactive password checking
A Ciaramella, P D'Arco, A De Santis, C Galdi, R Tagliaferri
IEEE Transactions on Dependable and Secure Computing 3 (4), 327-339, 2006
382006
Minority becomes majority in social networks
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
International conference on web and internet economics, 74-88, 2015
332015
Hypergraph decomposition and secret sharing
G Di Crescenzo, C Galdi
Discrete Applied Mathematics 157 (5), 928-946, 2009
332009
Hyppocrates: a new proactive password checker
C Blundo, P D’Arco, A De Santis, C Galdi
Journal of Systems and Software 71 (1-2), 163-175, 2004
322004
ERBAC: event-driven RBAC
P Bonatti, C Galdi, D Torres
Proceedings of the 18th ACM symposium on Access control models andá…, 2013
282013
Generalized Discrete Preference Games.
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
IJCAI 16, 53-59, 2016
242016
Network load games
I Caragiannis, C Galdi, C Kaklamanis
International Symposium on Algorithms and Computation, 809-818, 2005
242005
E-auctions for multi-cloud service provisioning
M Anisetti, CA Ardagna, PA Bonatti, E Damiani, M Faella, C Galdi, ...
2014 IEEE International Conference on Services Computing, 35-42, 2014
212014
Robustness in discrete preference games
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
Proceedings of the 16th Conference on Autonomous Agents and MultiAgentá…, 2017
182017
Analysis of a two-factor graphical password scheme
L Catuogno, C Galdi
International journal of information security 13 (5), 421-437, 2014
182014
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008
182008
Towards a mechanism for incentivating privacy
PA Bonatti, M Faella, C Galdi, L Sauro
European Symposium on Research in Computer Security, 472-488, 2011
172011
On the security of a two-factor authentication scheme
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practicesá…, 2010
172010
On the evaluation of security properties of containerized systems
L Catuogno, C Galdi
2016 15th International Conference on Ubiquitous Computing andá…, 2016
152016
Event-driven RBAC
P Bonatti, C Galdi, D Torres
Journal of Computer Security 23 (6), 709-757, 2015
142015
Information retention in heterogeneous majority dynamics
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
International Conference on Web and Internet Economics, 30-43, 2017
132017
Recommendation in museums: paths, sequences, and group satisfaction maximization
S Rossi, F Barile, C Galdi, L Russo
Multimedia Tools and Applications 76 (24), 26031-26055, 2017
132017
Certified e-mail with temporal authentication: An improved optimistic protocol
C Galdi, R Giordano
International Conference on Trust, Privacy and Security in Digital Businessá…, 2004
132004
Hiding information in image mosaics
C Blundo, C Galdi
The computer journal 46 (2), 202-212, 2003
112003
On user authentication by means of video events recognition
L Catuogno, C Galdi
Journal of Ambient Intelligence and Humanized Computing 5 (6), 909-918, 2014
102014
The system can't perform the operation now. Try again later.
Articles 1–20