default search action
Luigi Catuogno
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j15]Luigi Catuogno, Clemente Galdi:
Secure Firmware Update: Challenges and Solutions. Cryptogr. 7(2): 30 (2023) - 2020
- [j14]Luigi Catuogno, Clemente Galdi, Daniel Riccio:
An Enterprise Rights Management System for On-the-Field Maintenance Facilities. IEEE Access 8: 95987-95996 (2020) - [j13]Luigi Catuogno, Clemente Galdi, Giuseppe Persiano:
Secure Dependency Enforcement in Package Management Systems. IEEE Trans. Dependable Secur. Comput. 17(2): 377-390 (2020) - 2019
- [j12]Luigi Catuogno, Clemente Galdi, Daniel Riccio:
Off-line enterprise rights management leveraging biometric key binding and secure hardware. J. Ambient Intell. Humaniz. Comput. 10(7): 2883-2894 (2019) - 2018
- [j11]Luigi Catuogno, Clemente Galdi, Nicola Pasquino:
An Effective Methodology for Measuring Software Resource Usage. IEEE Trans. Instrum. Meas. 67(10): 2487-2494 (2018) - 2016
- [j10]Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno:
Ensuring non-repudiation in human conversations over VoIP communications. Int. J. Commun. Networks Distributed Syst. 16(4): 315-334 (2016) - 2014
- [j9]Luigi Catuogno, Clemente Galdi:
Analysis of a two-factor graphical password scheme. Int. J. Inf. Sec. 13(5): 421-437 (2014) - [j8]Luigi Catuogno, Clemente Galdi:
On user authentication by means of video events recognition. J. Ambient Intell. Humaniz. Comput. 5(6): 909-918 (2014) - [j7]Luigi Catuogno, Clemente Galdi:
Achieving interoperability between federated identity management systems: A case of study. J. High Speed Networks 20(4): 209-221 (2014) - [j6]Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi:
A trusted versioning file system for passive mobile storage devices. J. Netw. Comput. Appl. 38: 65-75 (2014) - [j5]Aniello Castiglione, Luigi Catuogno, Aniello Del Sorbo, Ugo Fiore, Francesco Palmieri:
A secure file sharing service for distributed computing environments. J. Supercomput. 67(3): 691-710 (2014) - 2013
- [j4]Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Petrillo, Ivan Visconti:
Reliable accounting in grids. Int. J. High Perform. Comput. Netw. 7(3): 186-194 (2013) - [j3]Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti:
SmartK: Smart cards in operating systems at kernel level. Inf. Secur. Tech. Rep. 17(3): 93-104 (2013) - 2010
- [j2]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Trusted virtual domains: Color your network. Datenschutz und Datensicherheit 34(5): 289-294 (2010) - 2004
- [j1]Luigi Catuogno, Ivan Visconti:
An Architecture for Kernel-Level Verification of Executables at Run Time. Comput. J. 47(5): 511-526 (2004)
Conference and Workshop Papers
- 2022
- [c28]Luigi Catuogno, Clemente Galdi:
On Tracking Ransomware on the File System. ICISSP 2022: 210-219 - 2019
- [c27]Luigi Catuogno, Clemente Galdi:
Improving Interoperability in Multi-domain Enterprise Right Management Applications. ICISSP (Revised Selected Papers) 2019: 382-402 - [c26]Luigi Catuogno, Clemente Galdi:
A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment. ICISSP 2019: 588-595 - [c25]Daniele Casola, Giuseppe Cattaneo, Luigi Catuogno, Umberto Ferraro Petrillo, Clemente Galdi, Gianluca Roscigno:
TRUST: TRust Unguarded Service Terminals. I-SPAN 2019: 155-169 - 2017
- [c24]Luigi Catuogno, Clemente Galdi, Nicola Pasquino:
Measuring the effectiveness of containerization to prevent power draining attacks. M&N 2017: 1-6 - 2016
- [c23]Luigi Catuogno, Clemente Galdi:
On the Evaluation of Security Properties of Containerized Systems. IUCC-CSS 2016: 69-76 - [c22]Luigi Catuogno, Clemente Galdi, Daniel Riccio:
Flexible and robust Enterprise Right Management. ISCC 2016: 1257-1262 - 2015
- [c21]Luigi Catuogno, Aniello Castiglione, Francesco Palmieri:
A honeypot system with honeyword-driven fake interactive sessions. HPCS 2015: 187-194 - [c20]Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno:
Reliable Voice-Based Transactions over VoIP Communications. IMIS 2015: 101-108 - [c19]Luigi Catuogno, Clemente Galdi:
Ensuring Application Integrity: A Survey on Techniques and Tools. IMIS 2015: 192-199 - [c18]Luigi Catuogno, Stefano Turchi:
The Dark Side of the Interconnection: Security and Privacy in the Web of Things. IMIS 2015: 205-212 - [c17]Luigi Catuogno, Clemente Galdi, Giuseppe Persiano:
Guaranteeing Dependency Enforcement in Software Updates. NordSec 2015: 205-212 - 2014
- [c16]Luigi Catuogno, Clemente Galdi:
Interoperability between Federated Authentication Systems. IMIS 2014: 493-498 - 2013
- [c15]Luigi Catuogno, Clemente Galdi:
Towards the design of a film-based graphical password scheme. ICITST 2013: 388-393 - [c14]Ilsun You, Luigi Catuogno, Aniello Castiglione, Giuseppe Cattaneo:
On asynchronous enforcement of security policies in "Nomadic" storage facilities. ISIE 2013: 1-6 - 2012
- [c13]Aniello Castiglione, Giuseppe Cattaneo, Luigi Catuogno, Ezio Cerrelli, Carlo Di Giampaolo, Fulvio Marino, Rodolfo Rotondo:
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education. SoftCOM 2012: 1-5 - 2010
- [c12]Luigi Catuogno, Clemente Galdi:
On the Security of a Two-Factor Authentication Scheme. WISTP 2010: 245-252 - 2009
- [c11]Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan:
Trusted Virtual Domains - Design, Implementation and Lessons Learned. INTRUST 2009: 156-179 - [c10]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy:
Transparent Mobile Storage Protection in Trusted Virtual Domains. LISA 2009: 159-172 - 2008
- [c9]Luigi Catuogno:
PITO: A Children-Friendly Interface for Security Tools. Learning to Live in the Knowledge Society 2008: 349-352 - [c8]Luigi Catuogno, Alfredo De Santis:
An internet role-game for the laboratory of network security course. ITiCSE 2008: 240-244 - [c7]Luigi Catuogno, Clemente Galdi:
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices. WISTP 2008: 16-35 - 2007
- [c6]Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, G. Di Matteo, Luigi Romano:
iToken: aWireless smart card reader which provides handhelds with desk top equivalent security. SecureComm 2007: 98-106 - 2005
- [c5]Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti:
Securing Operating System Services Based on Smart Cards. TrustBus 2005: 321-330 - 2004
- [c4]Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Petrillo, Ivan Visconti:
Reliable Accounting in Grid Economic Transactions. GCC Workshops 2004: 514-521 - 2003
- [c3]Giuseppe Cattaneo, Luigi Catuogno, Umberto Ferraro Petrillo, Ivan Visconti:
A Lightweight Security Model for WBEM. OTM Workshops 2003: 975-988 - 2002
- [c2]Luigi Catuogno, Ivan Visconti:
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. SCN 2002: 219-233 - 2001
- [c1]Giuseppe Cattaneo, Luigi Catuogno, Aniello Del Sorbo, Pino Persiano:
The Design and Implementation of a Transparent Cryptographic File System for UNIX. USENIX ATC, FREENIX Track 2001: 199-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint