The Design and Implementation of a Transparent Cryptographic File System for UNIX. G Cattaneo, L Catuogno, A Del Sorbo, P Persiano USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001 | 296 | 2001 |
Trusted Virtual Domains–design, implementation and lessons learned L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ... Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010 | 56 | 2010 |
A honeypot system with honeyword-driven fake interactive sessions L Catuogno, A Castiglione, F Palmieri 2015 International Conference on High Performance Computing & Simulation …, 2015 | 30 | 2015 |
A trusted versioning file system for passive mobile storage devices L Catuogno, H Löhr, M Winandy, AR Sadeghi Journal of Network and Computer Applications 38, 65-75, 2014 | 26 | 2014 |
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices L Catuogno, C Galdi IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008 | 25 | 2008 |
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code L Catuogno, I Visconti Security in Communication Networks: Third International Conference, SCN 2002 …, 2003 | 25 | 2003 |
Transparent Mobile Storage Protection in Trusted Virtual Domains. L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy LISA, 159-172, 2009 | 24 | 2009 |
An internet role-game for the laboratory of network security course L Catuogno, A De Santis ACM SIGCSE Bulletin 40 (3), 240-244, 2008 | 24 | 2008 |
Analysis of a two-factor graphical password scheme L Catuogno, C Galdi International journal of information security 13, 421-437, 2014 | 23 | 2014 |
The dark side of the interconnection: security and privacy in the Web of Things L Catuogno, S Turchi 2015 9th International Conference on Innovative Mobile and Internet Services …, 2015 | 22 | 2015 |
On the evaluation of security properties of containerized systems L Catuogno, C Galdi 2016 15th International Conference on Ubiquitous Computing and …, 2016 | 20 | 2016 |
Trusted virtual domains: Color your network L Catuogno, H Löhr, M Manulis, AR Sadeghi, C Stüble, M Winandy Datenschutz und Datensicherheit-DuD 34 (5), 289-294, 2010 | 20 | 2010 |
An effective methodology for measuring software resource usage L Catuogno, C Galdi, N Pasquino IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018 | 19 | 2018 |
A secure file sharing service for distributed computing environments A Castiglione, L Catuogno, A Del Sorbo, U Fiore, F Palmieri The Journal of Supercomputing 67, 691-710, 2014 | 19 | 2014 |
On the security of a two-factor authentication scheme L Catuogno, C Galdi Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010 | 19 | 2010 |
An architecture for kernel-level verification of executables at run time L Catuogno, I Visconti The Computer Journal 47 (5), 511-526, 2004 | 18 | 2004 |
Secure dependency enforcement in package management systems L Catuogno, C Galdi, G Persiano IEEE Transactions on Dependable and Secure Computing 17 (2), 377-390, 2017 | 12 | 2017 |
Off-line enterprise rights management leveraging biometric key binding and secure hardware L Catuogno, C Galdi, D Riccio Journal of Ambient Intelligence and Humanized Computing 10, 2883-2894, 2019 | 11 | 2019 |
On user authentication by means of video events recognition L Catuogno, C Galdi Journal of Ambient Intelligence and Humanized Computing 5, 909-918, 2014 | 11 | 2014 |
Achieving interoperability between federated identity management systems: A case of study L Catuogno, C Galdi Journal of High Speed Networks 20 (4), 209-221, 2014 | 11 | 2014 |