Follow
Luigi Catuogno
Luigi Catuogno
Dipartimento di Informatica, Università degli Studi di Salerno, ITALY
Verified email at dia.unisa.it
Title
Cited by
Cited by
Year
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
G Cattaneo, L Catuogno, A Del Sorbo, P Persiano
USENIX Annual Technical Conference, FREENIX Track, 10-3, 2001
2972001
Trusted Virtual Domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010
562010
A honeypot system with honeyword-driven fake interactive sessions
L Catuogno, A Castiglione, F Palmieri
2015 International Conference on High Performance Computing & Simulation …, 2015
302015
A trusted versioning file system for passive mobile storage devices
L Catuogno, H Löhr, M Winandy, AR Sadeghi
Journal of Network and Computer Applications 38, 65-75, 2014
262014
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008
252008
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code
L Catuogno, I Visconti
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
252003
Transparent Mobile Storage Protection in Trusted Virtual Domains.
L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy
LISA, 159-172, 2009
242009
An internet role-game for the laboratory of network security course
L Catuogno, A De Santis
ACM SIGCSE Bulletin 40 (3), 240-244, 2008
242008
Analysis of a two-factor graphical password scheme
L Catuogno, C Galdi
International journal of information security 13, 421-437, 2014
232014
The dark side of the interconnection: security and privacy in the Web of Things
L Catuogno, S Turchi
2015 9th International Conference on Innovative Mobile and Internet Services …, 2015
222015
On the evaluation of security properties of containerized systems
L Catuogno, C Galdi
2016 15th International Conference on Ubiquitous Computing and …, 2016
202016
Trusted virtual domains: Color your network
L Catuogno, H Löhr, M Manulis, AR Sadeghi, C Stüble, M Winandy
Datenschutz und Datensicherheit-DuD 34 (5), 289-294, 2010
202010
An effective methodology for measuring software resource usage
L Catuogno, C Galdi, N Pasquino
IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018
192018
A secure file sharing service for distributed computing environments
A Castiglione, L Catuogno, A Del Sorbo, U Fiore, F Palmieri
The Journal of Supercomputing 67, 691-710, 2014
192014
On the security of a two-factor authentication scheme
L Catuogno, C Galdi
Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010
192010
An architecture for kernel-level verification of executables at run time
L Catuogno, I Visconti
The Computer Journal 47 (5), 511-526, 2004
182004
Secure dependency enforcement in package management systems
L Catuogno, C Galdi, G Persiano
IEEE Transactions on Dependable and Secure Computing 17 (2), 377-390, 2017
122017
Off-line enterprise rights management leveraging biometric key binding and secure hardware
L Catuogno, C Galdi, D Riccio
Journal of Ambient Intelligence and Humanized Computing 10, 2883-2894, 2019
112019
On user authentication by means of video events recognition
L Catuogno, C Galdi
Journal of Ambient Intelligence and Humanized Computing 5, 909-918, 2014
112014
Achieving interoperability between federated identity management systems: A case of study
L Catuogno, C Galdi
Journal of High Speed Networks 20 (4), 209-221, 2014
112014
The system can't perform the operation now. Try again later.
Articles 1–20