Clemente Galdi

Orcid: 0000-0002-2988-700X

According to our database1, Clemente Galdi authored at least 61 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Special Issue on 13th International Conference on Security and Cryptography for Networks (SCN 2022).
Inf. Comput., January, 2024

2023
Secure Firmware Update: Challenges and Solutions.
Cryptogr., June, 2023

2022
Special issue: Security and Cryptography for Networks - SCN 2020.
J. Comput. Secur., 2022

On Tracking Ransomware on the File System.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2020
Secure Dependency Enforcement in Package Management Systems.
IEEE Trans. Dependable Secur. Comput., 2020

An Enterprise Rights Management System for On-the-Field Maintenance Facilities.
IEEE Access, 2020

2019
Off-line enterprise rights management leveraging biometric key binding and secure hardware.
J. Ambient Intell. Humaniz. Comput., 2019

TRUST: TRust Unguarded Service Terminals.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

Improving Interoperability in Multi-domain Enterprise Right Management Applications.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
An Effective Methodology for Measuring Software Resource Usage.
IEEE Trans. Instrum. Meas., 2018

2017
Recommendation in museums: paths, sequences, and group satisfaction maximization.
Multim. Tools Appl., 2017

Information Retention in Heterogeneous Majority Dynamics.
Proceedings of the Web and Internet Economics - 13th International Conference, 2017

Inference-proof Data Filtering for a Probabilistic Setting.
Proceedings of the 5th Workshop on Society, 2017

Measuring the effectiveness of containerization to prevent power draining attacks.
Proceedings of the IEEE International Workshop on Measurement and Networking, 2017

Robustness in Discrete Preference Games.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
Discrete Preference Games in Heterogeneous Social Networks: Subverted Majorities and the Swing Player.
CoRR, 2016

Artworks Sequences Recommendations for Groups in Museums.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

Biometric/Cryptographic Keys Binding Based on Function Minimization.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

Flexible and robust Enterprise Right Management.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Generalized Discrete Preference Games.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

On the Evaluation of Security Properties of Containerized Systems.
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016

Generalized Agent-mediated Procurement Auctions.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Event-driven RBAC.
J. Comput. Secur., 2015

Minority Becomes Majority in Social Networks.
Proceedings of the Web and Internet Economics - 11th International Conference, 2015

Guaranteeing Dependency Enforcement in Software Updates.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Ensuring Application Integrity: A Survey on Techniques and Tools.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

2014
Achieving interoperability between federated identity management systems: A case of study.
J. High Speed Networks, 2014

On user authentication by means of video events recognition.
J. Ambient Intell. Humaniz. Comput., 2014

Analysis of a two-factor graphical password scheme.
Int. J. Inf. Sec., 2014

Discrete preference games: social influence through coordination, and beyond.
CoRR, 2014

Interoperability between Federated Authentication Systems.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Optimality and Complexity of Inference-Proof Data Filtering and CQE.
Proceedings of the Computer Security - ESORICS 2014, 2014

E-Auctions for Multi-Cloud Service Provisioning.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Certified Information Access.
J. Syst. Softw., 2013

An Integrated Formal Approach to Usage Control.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

ERBAC: event-driven RBAC.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Auctions for Partial Heterogeneous Preferences.
Proceedings of the Mathematical Foundations of Computer Science 2013, 2013

Towards the design of a film-based graphical password scheme.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2011
Towards a Mechanism for Incentivating Privacy.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
On the Security of a Two-Factor Authentication Scheme.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

2009
Hypergraph decomposition and secret sharing.
Discret. Appl. Math., 2009

2008
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

A Distributed Implementation of the Certified Information Access Service.
Proceedings of the Computer Security, 2008

Validating Orchestration of Web Services with BPEL and Aggregate Signatures.
Proceedings of the ECOWS 2008, 2008

2007
Low-randomness constant-round private XOR computations.
Int. J. Inf. Sec., 2007

Distributed Certified Information Access for Mobile Devices.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

2006
Neural Network Techniques for Proactive Password Checking.
IEEE Trans. Dependable Secur. Comput., 2006

2005
Station Placement in Networks.
Parallel Process. Lett., 2005

Network Load Games.
Proceedings of the Algorithms and Computation, 16th International Symposium, 2005

Basic Computations in Wireless Networks.
Proceedings of the Algorithms and Computation, 16th International Symposium, 2005

Design and Implementation of an Inline Certified E-mail Service.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
H<sub>YPPOCRATES</sub>: a new proactive password checker.
J. Syst. Softw., 2004

Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

2003
Hiding Information in Image Mosaics.
Comput. J., 2003

2002
A Novel Approach to Proactive Password Checking.
Proceedings of the Infrastructure Security, International Conference, 2002

2001
Optimal and Approximate Station Placement in Networks (With Applications to Multicasting and Space Efficient Traversals).
Proceedings of the STACS 2001, 2001

Hyppocrates.
Proceedings of the Information Security, 4th International Conference, 2001

Private Computation with Shared Randomness over Broadcast Channel.
Proceedings of the Information Security and Cryptology, 2001

2000
Steganography Using Modern Arts.
Proceedings of the Theoretical Computer Science, 2000

1999
Randomness Recycling in Constant-Round Private Computations (extended Abstract).
Proceedings of the Distributed Computing, 1999


  Loading...