Luigi Catuogno

Orcid: 0000-0002-6315-4221

According to our database1, Luigi Catuogno authored at least 43 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Firmware Update: Challenges and Solutions.
Cryptogr., June, 2023

2022
On Tracking Ransomware on the File System.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2020
Secure Dependency Enforcement in Package Management Systems.
IEEE Trans. Dependable Secur. Comput., 2020

An Enterprise Rights Management System for On-the-Field Maintenance Facilities.
IEEE Access, 2020

2019
Off-line enterprise rights management leveraging biometric key binding and secure hardware.
J. Ambient Intell. Humaniz. Comput., 2019

TRUST: TRust Unguarded Service Terminals.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

Improving Interoperability in Multi-domain Enterprise Right Management Applications.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
An Effective Methodology for Measuring Software Resource Usage.
IEEE Trans. Instrum. Meas., 2018

2017
Measuring the effectiveness of containerization to prevent power draining attacks.
Proceedings of the IEEE International Workshop on Measurement and Networking, 2017

2016
Ensuring non-repudiation in human conversations over VoIP communications.
Int. J. Commun. Networks Distributed Syst., 2016

Flexible and robust Enterprise Right Management.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

On the Evaluation of Security Properties of Containerized Systems.
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016

2015
Guaranteeing Dependency Enforcement in Software Updates.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

The Dark Side of the Interconnection: Security and Privacy in the Web of Things.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Ensuring Application Integrity: A Survey on Techniques and Tools.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Reliable Voice-Based Transactions over VoIP Communications.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A honeypot system with honeyword-driven fake interactive sessions.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

2014
A secure file sharing service for distributed computing environments.
J. Supercomput., 2014

A trusted versioning file system for passive mobile storage devices.
J. Netw. Comput. Appl., 2014

Achieving interoperability between federated identity management systems: A case of study.
J. High Speed Networks, 2014

On user authentication by means of video events recognition.
J. Ambient Intell. Humaniz. Comput., 2014

Analysis of a two-factor graphical password scheme.
Int. J. Inf. Sec., 2014

Interoperability between Federated Authentication Systems.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
SmartK: Smart cards in operating systems at kernel level.
Inf. Secur. Tech. Rep., 2013

Reliable accounting in grids.
Int. J. High Perform. Comput. Netw., 2013

On asynchronous enforcement of security policies in "Nomadic" storage facilities.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

Towards the design of a film-based graphical password scheme.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education.
Proceedings of the 20th International Conference on Software, 2012

2010
Trusted virtual domains: Color your network.
Datenschutz und Datensicherheit, 2010

On the Security of a Two-Factor Authentication Scheme.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

2009
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Proceedings of the Trusted Systems, First International Conference, 2009

2008
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

An internet role-game for the laboratory of network security course.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008

PITO: A Children-Friendly Interface for Security Tools.
Proceedings of the Learning to Live in the Knowledge Society, 2008

2007
iToken: aWireless smart card reader which provides handhelds with desk top equivalent security.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2005
Securing Operating System Services Based on Smart Cards.
Proceedings of the Trust, 2005

2004
An Architecture for Kernel-Level Verification of Executables at Run Time.
Comput. J., 2004

Reliable Accounting in Grid Economic Transactions.
Proceedings of the Grid and Cooperative Computing, 2004

2003
A Lightweight Security Model for WBEM.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

2002
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

2001
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001


  Loading...