Antonio Lioy
Orcid: 0000-0002-5669-9338
According to our database1,
Antonio Lioy
authored at least 139 papers
between 1984 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
1985
1990
1995
2000
2005
2010
2015
2020
0
5
10
2
1
1
1
2
3
3
4
7
2
3
1
3
1
1
3
1
1
1
1
1
1
1
1
2
2
2
1
1
8
2
5
2
2
1
6
4
5
3
3
1
2
1
3
2
4
3
4
3
2
2
2
1
2
4
1
1
4
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Future Gener. Comput. Syst., January, 2024
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Securing 5G: Trusted Execution Environments for Centrally Controlled IPsec Integrity.
Proceedings of the IFIP Networking Conference, 2024
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024
MATCH-IN: Mutual Attestation for Trusted Collaboration in Heterogeneous IoT Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
SAFEHIVE: Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments.
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024
Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network.
IEEE Access, 2023
An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem.
IEEE Access, 2023
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
2022
Sensors, 2022
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection.
Comput. Electr. Eng., 2022
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022
PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022
2021
Sensors, 2021
Toward a Complete Software Stack to Integrate Quantum Key Distribution in a Cloud Environment.
IEEE Access, 2021
On Enabling Additional Natural Person and Domain-Specific Attributes in the eIDAS Network.
IEEE Access, 2021
Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021
Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions.
Proceedings of the Intelligent Distributed Computing XIV, 2021
2020
Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Int. J. Grid Util. Comput., 2020
Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning.
IEEE Access, 2020
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach.
IEEE Access, 2020
2019
IEEE/ACM Trans. Netw., 2019
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps.
Softw. Pract. Exp., 2019
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions.
Secur. Commun. Networks, 2019
Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure.
Inf., 2019
Future Gener. Comput. Syst., 2019
Towards Simplifying PKI Implementation: Client-Server based Validation of Public Key Certificates.
CoRR, 2019
A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure.
Proceedings of the Intelligent Distributed Computing XIII, 2019
2018
On the impossibility of effectively using likely-invariants for software attestation purposes.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
J. Internet Serv. Inf. Secur., 2018
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
2017
Proceedings of the Guide to Security in SDN and NFV, 2017
SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment.
Proceedings of the Guide to Security in SDN and NFV, 2017
IEEE/ACM Trans. Netw., 2017
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
Comput. Electr. Eng., 2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017
Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions.
Proceedings of the Risks and Security of Internet and Systems, 2017
2016
Int. J. Netw. Manag., 2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure.
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
2015
IEEE/ACM Trans. Netw., 2015
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt.
Softw. Pract. Exp., 2015
IEEE Commun. Mag., 2015
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015
A novel approach for integrating security policy enforcement with dynamic network virtualization.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015
Proceedings of the Cyber Security and Privacy, 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
2013
FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface.
Softw. Pract. Exp., 2013
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the 21st Euromicro International Conference on Parallel, 2013
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013
2012
IEEE/ACM Trans. Netw., 2012
2011
IEEE Trans. Serv. Comput., 2011
IEEE Trans. Dependable Secur. Comput., 2011
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the 18th Euromicro Conference on Parallel, 2010
2009
Softw. Pract. Exp., 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008
2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007
An Estimation of Attack Surface to Evaluate Network (in)security.
Proceedings of the ICEIS 2007, 2007
Proceedings of the Public Key Infrastructure, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Proceedings of the ISSE 2006, 2006
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
Proceedings of the Public Key Infrastructure, 2006
2005
Proceedings of the 2005 International Conference on a World of Wireless, 2005
Proceedings of the 2005 International Conference on a World of Wireless, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Communications and Multimedia Security, 2005
2004
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004
Multiple electronic signatures on multiple documents.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004
2002
Security aspects in standard certificate revocation mechanisms: a case study for OCSP.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Secure Digital Administration in Medical Environment.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002
2001
Synthesis of power-managed sequential components based oncomputational kernel extraction.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001
2000
A Flexible Management Framework for Certificate Status Validation.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000
1999
Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting.
IEEE Trans. Computers, 1999
A Component-based Infrastructure for Building Cluster Management and Monitoring Tools.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
1998
Proceedings of the 8th Great Lakes Symposium on VLSI (GLS-VLSI '98), 1998
Proceedings of the 35th Conference on Design Automation, 1998
1997
Non-intrusive authentication.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the 7th Great Lakes Symposium on VLSI (GLS-VLSI '97), 1997
A parallel approach to symbolic traversal based on set partitioning.
Proceedings of the Advances in Hardware Design and Verification, 1997
1994
Proceedings of the Proceedings EURO-DAC'94, 1994
1993
Microprocess. Microprogramming, 1993
On the Resetability of Synchronous Sequential Circuits.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993
1992
A quadratic programming approach to estimating the testability and coverage distributions of a VLSI circuit.
Microprocess. Microprogramming, 1992
1991
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991
Proceedings of the Proceedings IEEE International Test Conference 1991, 1991
Proceedings of the First Great Lakes Symposium on VLSI, 1991
Proceedings of the First Great Lakes Symposium on VLSI, 1991
1990
Microprocessing and Microprogramming, 1990
Proceedings of the European Design Automation Conference, 1990
1989
1988
Proceedings of the Computer Design: VLSI in Computers and Processors, 1988
1984
Softw. Microsystems, 1984