Germano Caronni

According to our database1, Germano Caronni authored at least 22 papers between 1995 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Scalable offline monitoring of temporal specifications.
Formal Methods Syst. Des., 2016

2014
Scalable Offline Monitoring.
Proceedings of the Runtime Verification - 5th International Conference, 2014

2011
Distributed forensics and incident response in the enterprise.
Digit. Investig., 2011

2009
Deleting files in the Celeste peer-to-peer storage system.
J. Parallel Distributed Comput., 2009

2007
Midpoints Versus Endpoints: From Protocols to Firewalls.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
A Trust-Aware, P2P-Based Overlay for Intrusion Detection.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

2005
Maintaining Object Ordering in a Shared P2P Storage Environment.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

Firewall Conformance Testing.
Proceedings of the Testing of Communicating Systems, 2005

Dynamic Trust Metrics for Peer-to-Peer Systems.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

2003
Establishing Trust in Distributed Storage Providers.
Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P 2003), 2003

2001
Summary Report on Enterprise Security Workshop.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Firewalls in a P2P World.
Proceedings of the 1st International Conference on Peer-to-Peer Computing (P2P 2001), 2001

Enabling Hierarchical and Bulk-Distribution for Watermarked Content.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Walking the Web of Trust.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Dynamic security in communication systems.
PhD thesis, 1999

The VersaKey framework: versatile group key management.
IEEE J. Sel. Areas Commun., 1999

A flexible middleware for multimedia communication: design, implementation, and experience.
IEEE J. Sel. Areas Commun., 1999

1998
Efficient Security for Large and Dynamic Multicast Groups.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

1996
SKIP-securing the Internet.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

1995
A distributed and policy-free general-purpose shared window system.
IEEE/ACM Trans. Netw., 1995

Assuring Ownership Rights for Digital Images.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995


  Loading...