Follow
Clemente Galdi
Clemente Galdi
Associate Professor of Computer Science, Universita' di Salerno
Verified email at unisa.it
Title
Cited by
Cited by
Year
Minority becomes majority in social networks
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
International conference on web and internet economics, 74-88, 2015
632015
Neural network techniques for proactive password checking
A Ciaramella, P D'Arco, A De Santis, C Galdi, R Tagliaferri
IEEE Transactions on Dependable and Secure Computing 3 (4), 327-339, 2006
572006
Hypergraph decomposition and secret sharing
G Di Crescenzo, C Galdi
Discrete Applied Mathematics 157 (5), 928-946, 2009
512009
Hyppocrates: a new proactive password checker
C Blundo, P D’Arco, A De Santis, C Galdi
Journal of Systems and Software 71 (1-2), 163-175, 2004
372004
Generalized Discrete Preference Games.
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
IJCAI 16, 53-59, 2016
362016
ERBAC: event-driven RBAC
P Bonatti, C Galdi, D Torres
Proceedings of the 18th ACM symposium on Access control models and …, 2013
362013
Robustness in discrete preference games
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent …, 2017
342017
Information retention in heterogeneous majority dynamics
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
Web and Internet Economics: 13th International Conference, WINE 2017 …, 2017
312017
e-Auctions for multi-cloud service provisioning
M Anisetti, CA Ardagna, PA Bonatti, E Damiani, M Faella, C Galdi, ...
2014 IEEE International Conference on Services Computing, 35-42, 2014
272014
Recommendation in museums: paths, sequences, and group satisfaction maximization
S Rossi, F Barile, C Galdi, L Russo
Multimedia Tools and Applications 76, 26031-26055, 2017
252017
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008
252008
Network load games
I Caragiannis, C Galdi, C Kaklamanis
Algorithms and Computation: 16th International Symposium, ISAAC 2005, Sanya …, 2005
252005
Analysis of a two-factor graphical password scheme
L Catuogno, C Galdi
International journal of information security 13, 421-437, 2014
232014
An effective methodology for measuring software resource usage
L Catuogno, C Galdi, N Pasquino
IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018
202018
On the evaluation of security properties of containerized systems
L Catuogno, C Galdi
2016 15th International Conference on Ubiquitous Computing and …, 2016
202016
On the security of a two-factor authentication scheme
L Catuogno, C Galdi
Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010
192010
Event-driven RBAC
P Bonatti, C Galdi, D Torres
Journal of Computer Security 23 (6), 709-757, 2015
172015
Towards a mechanism for incentivating privacy
PA Bonatti, M Faella, C Galdi, L Sauro
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
172011
Certified e-mail with temporal authentication: An improved optimistic protocol
C Galdi, R Giordano
International Conference on Trust, Privacy and Security in Digital Business …, 2004
142004
Secure dependency enforcement in package management systems
L Catuogno, C Galdi, G Persiano
IEEE Transactions on Dependable and Secure Computing 17 (2), 377-390, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20