Antonio Lioy

Orcid: 0000-0002-5669-9338

According to our database1, Antonio Lioy authored at least 139 papers between 1984 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

1985
1990
1995
2000
2005
2010
2015
2020
0
5
10
2
1
1
1
2
3
3
4
7
2
3
1
3
1
1
3
1
1
1
1
1
1
1
1
2
2
2
1
1
8
2
5
2
2
1
6
4
5
3
3
1
2
1
3
2
4
3
4
3
2
2
2
1
2
4
1
1
4
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel architecture to virtualise a hardware-bound trusted platform module.
Future Gener. Comput. Syst., January, 2024

Integrity Management in Softwarized Networks.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Securing 5G: Trusted Execution Environments for Centrally Controlled IPsec Integrity.
Proceedings of the IFIP Networking Conference, 2024

Standard-Based Remote Attestation: The Veraison Project.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

IKE-less IPsec: Enhancing Security for IoT Device Networks.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

MATCH-IN: Mutual Attestation for Trusted Collaboration in Heterogeneous IoT Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

Shaping a Quantum-Resistant Future: Strategies for Post-Quantum PKI.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

SAFEHIVE: Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments.
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024

Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network.
IEEE Access, 2023

An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem.
IEEE Access, 2023

A Model for Automated Cybersecurity Threat Remediation and Sharing.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

2022
Integrity Verification of Distributed Nodes in Critical Infrastructures.
Sensors, 2022

Quantum Key Distribution in Kubernetes Clusters.
Future Internet, 2022

Encryption-agnostic classifiers of traffic originators and their application to anomaly detection.
Comput. Electr. Eng., 2022

A model of capabilities of Network Security Functions.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022


(POSTER) Using MACsec to protect a Network Functions Virtualisation infrastructure.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Computer-Aided Reverse Engineering of Protected Software.
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022

PALANTIR: Zero-Trust Architecture for Managed Security Service Provider.
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022

2021
Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture.
Sensors, 2021

Toward a Complete Software Stack to Integrate Quantum Key Distribution in a Cloud Environment.
IEEE Access, 2021

On Enabling Additional Natural Person and Domain-Specific Attributes in the eIDAS Network.
IEEE Access, 2021


Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions.
Proceedings of the Intelligent Distributed Computing XIV, 2021

2020
Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Towards a secure and lightweight network function virtualisation environment.
Int. J. Grid Util. Comput., 2020

Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning.
IEEE Access, 2020

Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach.
IEEE Access, 2020

2019
Adding Support for Automatic Enforcement of Security Policies in NFV Networks.
IEEE/ACM Trans. Netw., 2019

Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps.
Softw. Pract. Exp., 2019

Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions.
Secur. Commun. Networks, 2019

Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure.
Inf., 2019

Integrity verification of Docker containers for a lightweight cloud environment.
Future Gener. Comput. Syst., 2019

A Framework for Secure Digital Administration.
CoRR, 2019

Towards Simplifying PKI Implementation: Client-Server based Validation of Public Key Certificates.
CoRR, 2019

A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2018
On the impossibility of effectively using likely-invariants for software attestation purposes.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

User-oriented Network Security Policy Specification.
J. Internet Serv. Inf. Secur., 2018

Container-based design of a Virtual Network Security Function.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

2017
Trust in SDN/NFV Environments.
Proceedings of the Guide to Security in SDN and NFV, 2017

SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment.
Proceedings of the Guide to Security in SDN and NFV, 2017

Classification and Analysis of Communication Protection Policy Anomalies.
IEEE/ACM Trans. Netw., 2017

A formal approach for network security policy validation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Assessing network authorization policies via reachability analysis.
Comput. Electr. Eng., 2017

Towards Optimally Hiding Protected Assets in Software Applications.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

NFV-based network protection: The SHIELD approach.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

On the establishment of trust in the cloud-based ETSI NFV framework.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017


The FICEP Infrastructure - How We Deployed the Italian eIDAS Node in the Cloud.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017

Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
Inter-function anomaly analysis for correct SDN/NFV deployment.
Int. J. Netw. Manag., 2016

Towards Automatic Risk Analysis and Mitigation of Software Applications.
Proceedings of the Information Security Theory and Practice, 2016

Efficient Attribute Management in a Federated Identity Management Infrastructure.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Online and Offline Security Policy Assessment.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Analysis of Application-Layer Filtering Policies With Application to HTTP.
IEEE/ACM Trans. Netw., 2015

Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt.
Softw. Pract. Exp., 2015

Virtualized security at the network edge: a user-centric approach.
IEEE Commun. Mag., 2015

A formal model of network policy analysis.
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015

A Formal Model of Policy Reconciliation.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

Offloading personal security applications to a secure and trusted network node.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

A novel approach for integrating security policy enforcement with dynamic network virtualization.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

The Trust Problem in Modern Network Infrastructures.
Proceedings of the Cyber Security and Privacy, 2015

2014
Practical Assessment of Biba Integrity for TCG-Enabled Platforms.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Exploiting the Network for Securing Personal Devices.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

Inter-technology Conflict Analysis for Communication Protection Policies.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface.
Softw. Pract. Exp., 2013

Towards Privacy-by-Design Peer-to-Peer Cloud Computing.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Improved Reachability Analysis for Security Management.
Proceedings of the 21st Euromicro International Conference on Parallel, 2013

Privacy-by-design cloud computing through decentralization and real life trust.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

2012
Network-Level Access Control Policy Analysis and Transformation.
IEEE/ACM Trans. Netw., 2012

The PoSecCo Security Decision Support System.
Proceedings of the ISSE 2012, 2012

2011
Automatic (Re)Configuration of IT Systems for Dependability.
IEEE Trans. Serv. Comput., 2011

On the Performance of Secure Vehicular Communication Systems.
IEEE Trans. Dependable Secur. Comput., 2011

The Trusted Platform Agent.
IEEE Softw., 2011

Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

On scalability of remote attestation.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
Trusted Computing.
Proceedings of the Handbook of Information and Communication Security, 2010

The ForwardDiffSig Scheme for Multicast Authentication.
IEEE/ACM Trans. Netw., 2010

Towards a Network-Independent Policy Specification.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

2009
A unified and flexible solution for integrating CRL and OCSP into PKI applications.
Softw. Pract. Exp., 2009

MagicNET: Security System for Development, Validation and Adoption of Mobile Agents.
Proceedings of the Third International Conference on Network and System Security, 2009

MagicNET: XACML authorization policies for mobile agents.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Ontology-Based Policy Translation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
Impact of Vehicular Communications Security on Transportation Safety
CoRR, 2008

Geometric Interpretation of Policy Specification.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Trusted-Computing Technologies for the Protection of Critical Information Systems.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

2007
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Secur. Priv., 2007

POSITIF: A Policy-Based Security Management System.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Efficient and robust pseudonymous authentication in VANET.
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007

An Estimation of Attack Surface to Evaluate Network (in)security.
Proceedings of the ICEIS 2007, 2007

On the Robustness of Applications Based on the SSL and TLS Security Protocols.
Proceedings of the Public Key Infrastructure, 2007

2006
Why to adopt a security metric? A brief survey.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

PKI past, present and future.
Int. J. Inf. Sec., 2006

Security Analysis and Configuration of Large Networks.
Proceedings of the ISSE 2006, 2006

A Wireless Distributed Intrusion Detection System and a New Attack Model.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Fighting E-Mail Abuses: The EMPE Approach.
Proceedings of the Public Key Infrastructure, 2006

2005
Incremental Trust: Building Trust from Past Experience.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

The Wireless Opaque Channel to Contrast Information Leakage.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Motivations for a Theoretical Approach to WYSIWYS.
Proceedings of the Communications and Multimedia Security, 2005

Decentralised Access Control in 802.11 Networks.
Proceedings of the Communications and Multimedia Security, 2005

2004
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

The EuroPKI Experience.
Proceedings of the Public Key Infrastructure, 2004

Multiple electronic signatures on multiple documents.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

2002
Security aspects in standard certificate revocation mechanisms: a case study for OCSP.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Secure Digital Administration in Medical Environment.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002

2001
Synthesis of power-managed sequential components based oncomputational kernel extraction.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2001

On the Complexity of Public-Key Certificate Validation.
Proceedings of the Information Security, 4th International Conference, 2001

Towards a policy system for IPsec: issues and an experimental implementation.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

2000
Security issues in control, management and routing protocols.
Comput. Networks, 2000

A Flexible Management Framework for Certificate Status Validation.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Security policy system: status and perspective.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000

1999
Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting.
IEEE Trans. Computers, 1999

A Component-based Infrastructure for Building Cluster Management and Monitoring Tools.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1998
Timed Supersetting and the Synthesis of Telescopic Units.
Proceedings of the 8th Great Lakes Symposium on VLSI (GLS-VLSI '98), 1998

Computational Kernels and their Application to Sequential Power Optimization.
Proceedings of the 35th Conference on Design Automation, 1998

1997
Non-intrusive authentication.
Proceedings of the Information Security in Research and Business, 1997

Secure document management and distribution in an open network environment.
Proceedings of the Information and Communication Security, First International Conference, 1997

Accurate Entropy Calculation for Large Logic Circuits Based on Output Clustering.
Proceedings of the 7th Great Lakes Symposium on VLSI (GLS-VLSI '97), 1997

A parallel approach to symbolic traversal based on set partitioning.
Proceedings of the Advances in Hardware Design and Verification, 1997

1994
Testing redundant asynchronous circuits by variable phase splitting.
Proceedings of the Proceedings EURO-DAC'94, 1994

1993
On the Equivalence of Fanout-Point Faults.
IEEE Trans. Computers, 1993

A study of the resetability of synchronous sequential circuits.
Microprocess. Microprogramming, 1993

On the Resetability of Synchronous Sequential Circuits.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993

1992
A quadratic programming approach to estimating the testability and coverage distributions of a VLSI circuit.
Microprocess. Microprogramming, 1992

Advanced Fault Collapsing (Logic Circuits Testing).
IEEE Des. Test Comput., 1992

1991
Test generation in a distributed environment.
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991

Looking for Functional Fault Equivalence.
Proceedings of the Proceedings IEEE International Test Conference 1991, 1991

A hierarchical multi-level test generation system.
Proceedings of the First Great Lakes Symposium on VLSI, 1991

An algebraic approach to test generation for sequential circuits.
Proceedings of the First Great Lakes Symposium on VLSI, 1991

1990
Automatic compaction of microcode.
Microprocess. Microsystems, 1990

Assessing the diagnostic power of test pattern sets.
Microprocessing and Microprogramming, 1990

Diagnosis oriented test pattern generation.
Proceedings of the European Design Automation Conference, 1990

1989
A multilevel hardware description language.
Microprocess. Microprogramming, 1989

1988
Adaptative backtrace and dynamic partitioning enhance ATPG.
Proceedings of the Computer Design: VLSI in Computers and Processors, 1988

1984
A testability measure to improve algebraic test generation.
Softw. Microsystems, 1984


  Loading...