default search action
Clemente Galdi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Clemente Galdi, Stanislaw Jarecki:
Special Issue on 13th International Conference on Security and Cryptography for Networks (SCN 2022). Inf. Comput. 296: 105135 (2024) - [e5]Clemente Galdi, Duong Hieu Phan:
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14973, Springer 2024, ISBN 978-3-031-71069-8 [contents] - [e4]Clemente Galdi, Duong Hieu Phan:
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14974, Springer 2024, ISBN 978-3-031-71072-8 [contents] - 2023
- [j18]Luigi Catuogno, Clemente Galdi:
Secure Firmware Update: Challenges and Solutions. Cryptogr. 7(2): 30 (2023) - 2022
- [j17]Clemente Galdi, Vladimir Kolesnikov:
Special issue: Security and Cryptography for Networks - SCN 2020. J. Comput. Secur. 30(1): 1-2 (2022) - [c41]Luigi Catuogno, Clemente Galdi:
On Tracking Ransomware on the File System. ICISSP 2022: 210-219 - [e3]Clemente Galdi, Stanislaw Jarecki:
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Amalfi, Italy, September 12-14, 2022, Proceedings. Lecture Notes in Computer Science 13409, Springer 2022, ISBN 978-3-031-14790-6 [contents] - 2020
- [j16]Luigi Catuogno, Clemente Galdi, Daniel Riccio:
An Enterprise Rights Management System for On-the-Field Maintenance Facilities. IEEE Access 8: 95987-95996 (2020) - [j15]Luigi Catuogno, Clemente Galdi, Giuseppe Persiano:
Secure Dependency Enforcement in Package Management Systems. IEEE Trans. Dependable Secur. Comput. 17(2): 377-390 (2020) - [e2]Clemente Galdi, Vladimir Kolesnikov:
Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020, Proceedings. Lecture Notes in Computer Science 12238, Springer 2020, ISBN 978-3-030-57989-0 [contents]
2010 – 2019
- 2019
- [j14]Luigi Catuogno, Clemente Galdi, Daniel Riccio:
Off-line enterprise rights management leveraging biometric key binding and secure hardware. J. Ambient Intell. Humaniz. Comput. 10(7): 2883-2894 (2019) - [c40]Luigi Catuogno, Clemente Galdi:
Improving Interoperability in Multi-domain Enterprise Right Management Applications. ICISSP (Revised Selected Papers) 2019: 382-402 - [c39]Luigi Catuogno, Clemente Galdi:
A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment. ICISSP 2019: 588-595 - [c38]Daniele Casola, Giuseppe Cattaneo, Luigi Catuogno, Umberto Ferraro Petrillo, Clemente Galdi, Gianluca Roscigno:
TRUST: TRust Unguarded Service Terminals. I-SPAN 2019: 155-169 - 2018
- [j13]Luigi Catuogno, Clemente Galdi, Nicola Pasquino:
An Effective Methodology for Measuring Software Resource Usage. IEEE Trans. Instrum. Meas. 67(10): 2487-2494 (2018) - 2017
- [j12]Silvia Rossi, Francesco Barile, Clemente Galdi, Luca Russo:
Recommendation in museums: paths, sequences, and group satisfaction maximization. Multim. Tools Appl. 76(24): 26031-26055 (2017) - [c37]Vincenzo Auletta, Ioannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano:
Robustness in Discrete Preference Games. AAMAS 2017: 1314-1322 - [c36]Luigi Catuogno, Clemente Galdi, Nicola Pasquino:
Measuring the effectiveness of containerization to prevent power draining attacks. M&N 2017: 1-6 - [c35]Joachim Biskup, Piero A. Bonatti, Clemente Galdi, Luigi Sauro:
Inference-proof Data Filtering for a Probabilistic Setting. PrivOn@ISWC 2017 - [c34]Vincenzo Auletta, Ioannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano:
Information Retention in Heterogeneous Majority Dynamics. WINE 2017: 30-43 - 2016
- [c33]Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Generalized Agent-mediated Procurement Auctions. AAMAS 2016: 77-85 - [c32]Luigi Catuogno, Clemente Galdi:
On the Evaluation of Security Properties of Containerized Systems. IUCC-CSS 2016: 69-76 - [c31]Vincenzo Auletta, Ioannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano:
Generalized Discrete Preference Games. IJCAI 2016: 53-59 - [c30]Luigi Catuogno, Clemente Galdi, Daniel Riccio:
Flexible and robust Enterprise Right Management. ISCC 2016: 1257-1262 - [c29]Daniel Riccio, Clemente Galdi, Rita Manzo:
Biometric/Cryptographic Keys Binding Based on Function Minimization. SITIS 2016: 144-150 - [c28]Silvia Rossi, Francesco Barile, Clemente Galdi, Luca Russo:
Artworks Sequences Recommendations for Groups in Museums. SITIS 2016: 455-462 - [i2]Vincenzo Auletta, Ioannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano:
Discrete Preference Games in Heterogeneous Social Networks: Subverted Majorities and the Swing Player. CoRR abs/1603.02971 (2016) - 2015
- [j11]Piero A. Bonatti, Clemente Galdi, Davide Torres:
Event-driven RBAC. J. Comput. Secur. 23(6): 709-757 (2015) - [c27]Luigi Catuogno, Clemente Galdi:
Ensuring Application Integrity: A Survey on Techniques and Tools. IMIS 2015: 192-199 - [c26]Luigi Catuogno, Clemente Galdi, Giuseppe Persiano:
Guaranteeing Dependency Enforcement in Software Updates. NordSec 2015: 205-212 - [c25]Vincenzo Auletta, Ioannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano:
Minority Becomes Majority in Social Networks. WINE 2015: 74-88 - 2014
- [j10]Luigi Catuogno, Clemente Galdi:
Analysis of a two-factor graphical password scheme. Int. J. Inf. Sec. 13(5): 421-437 (2014) - [j9]Luigi Catuogno, Clemente Galdi:
On user authentication by means of video events recognition. J. Ambient Intell. Humaniz. Comput. 5(6): 909-918 (2014) - [j8]Luigi Catuogno, Clemente Galdi:
Achieving interoperability between federated identity management systems: A case of study. J. High Speed Networks 20(4): 209-221 (2014) - [c24]Marco Anisetti, Claudio A. Ardagna, Piero A. Bonatti, Ernesto Damiani, Marco Faella, Clemente Galdi, Luigi Sauro:
E-Auctions for Multi-Cloud Service Provisioning. IEEE SCC 2014: 35-42 - [c23]Joachim Biskup, Piero A. Bonatti, Clemente Galdi, Luigi Sauro:
Optimality and Complexity of Inference-Proof Data Filtering and CQE. ESORICS (2) 2014: 165-181 - [c22]Luigi Catuogno, Clemente Galdi:
Interoperability between Federated Authentication Systems. IMIS 2014: 493-498 - [i1]Vincenzo Auletta, Ioannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano:
Discrete preference games: social influence through coordination, and beyond. CoRR abs/1402.4050 (2014) - 2013
- [j7]Carlo Blundo, Angelo De Caro, Clemente Galdi, Giuseppe Persiano:
Certified Information Access. J. Syst. Softw. 86(9): 2439-2450 (2013) - [c21]Luigi Catuogno, Clemente Galdi:
Towards the design of a film-based graphical password scheme. ICITST 2013: 388-393 - [c20]Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Auctions for Partial Heterogeneous Preferences. MFCS 2013: 183-194 - [c19]Piero A. Bonatti, Clemente Galdi, Davide Torres:
ERBAC: event-driven RBAC. SACMAT 2013: 125-136 - [c18]Piero A. Bonatti, Luigi Sauro, Marco Faella, Clemente Galdi:
An Integrated Formal Approach to Usage Control. IEEE Symposium on Security and Privacy Workshops 2013: 8-12 - 2011
- [c17]Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Towards a Mechanism for Incentivating Privacy. ESORICS 2011: 472-488 - 2010
- [c16]Luigi Catuogno, Clemente Galdi:
On the Security of a Two-Factor Authentication Scheme. WISTP 2010: 245-252
2000 – 2009
- 2009
- [j6]Giovanni Di Crescenzo, Clemente Galdi:
Hypergraph decomposition and secret sharing. Discret. Appl. Math. 157(5): 928-946 (2009) - 2008
- [c15]Carlo Blundo, Emiliano De Cristofaro, Clemente Galdi, Giuseppe Persiano:
Validating Orchestration of Web Services with BPEL and Aggregate Signatures. ECOWS 2008: 205-214 - [c14]Carlo Blundo, Emiliano De Cristofaro, Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano:
A Distributed Implementation of the Certified Information Access Service. ESORICS 2008: 396-410 - [c13]Luigi Catuogno, Clemente Galdi:
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices. WISTP 2008: 16-35 - 2007
- [j5]Carlo Blundo, Clemente Galdi, Giuseppe Persiano:
Low-randomness constant-round private XOR computations. Int. J. Inf. Sec. 6(1): 15-26 (2007) - [c12]Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano:
Distributed Certified Information Access for Mobile Devices. WISTP 2007: 67-79 - 2006
- [j4]Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri:
Neural Network Techniques for Proactive Password Checking. IEEE Trans. Dependable Secur. Comput. 3(4): 327-339 (2006) - 2005
- [j3]Clemente Galdi, Christos Kaklamanis, Manuela Montangero, Giuseppe Persiano:
Station Placement in Networks. Parallel Process. Lett. 15(1-2): 117-130 (2005) - [c11]Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco:
Design and Implementation of an Inline Certified E-mail Service. CANS 2005: 186-199 - [c10]Ioannis Caragiannis, Clemente Galdi, Christos Kaklamanis:
Basic Computations in Wireless Networks. ISAAC 2005: 533-542 - [c9]Ioannis Caragiannis, Clemente Galdi, Christos Kaklamanis:
Network Load Games. ISAAC 2005: 809-818 - 2004
- [j2]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
HYPPOCRATES: a new proactive password checker. J. Syst. Softw. 71(1-2): 163-175 (2004) - [c8]Clemente Galdi, Raffaella Giordano:
Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol. TrustBus 2004: 181-190 - 2003
- [j1]Carlo Blundo, Clemente Galdi:
Hiding Information in Image Mosaics. Comput. J. 46(2): 202-212 (2003) - [c7]Giovanni Di Crescenzo, Clemente Galdi:
Hypergraph Decomposition and Secret Sharing. ISAAC 2003: 645-654 - [e1]Stelvio Cimato, Clemente Galdi, Giuseppe Persiano:
Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers. Lecture Notes in Computer Science 2576, Springer 2003, ISBN 3-540-00420-3 [contents] - 2002
- [c6]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
A Novel Approach to Proactive Password Checking. InfraSec 2002: 30-39 - 2001
- [c5]Clemente Galdi, Pino Persiano:
Private Computation with Shared Randomness over Broadcast Channel. ICISC 2001: 244-257 - [c4]Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
Hyppocrates. ISC 2001: 63-80 - [c3]Clemente Galdi, Christos Kaklamanis, Manuela Montangero, Pino Persiano:
Optimal and Approximate Station Placement in Networks (With Applications to Multicasting and Space Efficient Traversals). STACS 2001: 271-282 - 2000
- [c2]Carlo Blundo, Clemente Galdi:
Steganography Using Modern Arts. IFIP TCS 2000: 140-151
1990 – 1999
- 1999
- [c1]Carlo Blundo, Clemente Galdi, Pino Persiano:
Randomness Recycling in Constant-Round Private Computations (extended Abstract). DISC 1999: 138-150
Coauthor Index
aka: Pino Persiano
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-20 00:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint