PDF (pre-print)
R.Sassu, G.Ramunno, A.Lioy,
"Practical assessment of Biba integrity for TCG-enabled platforms",
TRUSTCOM'14: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Bejing (China), September 24-26, 2014, pp. 495-504
ISBN: 978-1-4799-6513-7
DOI: 10.1109/TrustCom.2014.63
YEAR 2013:
-
D.Berbecaru, M.Casalino, A.Lioy
"FcgiOCSP: a scalable OCSP-based Certificate Validation System exploiting the FastCGI interface",
Software: Practice and Experience,
John Wiley & Sons,
Vol.43, Issue 12, December 2013, pp. 1489-1518
Online ISSN: 1097-024X
Print ISSN: 0038-0644
DOI: 10.1002/spe.2148
PDF (members-only local copy)
-
T.Su, J.Lyle, A.Atzeni, S.Faily, H.Virji, C.Ntanos, C.Botsikas,
"Continuous integration for web-based software infrastructures: lessons learned on the webinos project",
HVC-2013: 9th Haifa Verification Conference,
Haifa (Israel), November 5-7, 2013, pp. 145-150
vol. 8244 of Lecture Notes in Computer Science (LNCS), Springer, 2013
ISBN: 978-3-319-03076-0
ISSN: 0302-9743
DOI: 10.1007/978-3-319-03077-7_10
PDF (members-only local copy)
-
M.Mezzalama, A.Lioy, H.Metwalley,
"Anatomia del malware" (in Italian)
Mondo Digitale, n. 47, 20 pages
available on-line at
http://mondodigitale.aicanet.net/2013-3/articoli/02_Anatomiadelmalware.pdfi
PDF (free local copy)
-
L.A.Cutillo, A.Lioy,
"Towards Privacy-by-Design Peer-to-Peer Cloud Computing",
TrustBus-2013,
Prague (Czech Republic), August 28-29, 2013, pp. 85-96
vol. 8058 of Lecture Notes in Computer Science (LNCS), Springer, 2013
DOI: 10.1007/978-3-642-40343-9_8
PDF (members-only local copy)
-
S.Faily, J.Lyle, I.Flechais, A.Atzeni, C.Cameroni, H.Myrhaug, A.Goker, R.Kleinfeld,
"Policies in context: factors influencing the elicitation and categorisation of context-sensitive security policies",
HUPS-2013: international workshop on Home Usable Privacy and Security,
Newcastle (UK), July 24-26, 2013
-
C.Basile, M.M.Casalino, S.Mutti, S.Paraboschi,
"Detection of conflicts in security policies",
chapter in the book "Computer and Information Security Handbook",
J.R.Vacca (ed.), Morgan Kaufmann, June 2013, pp.415-448
ISBN-10: 0123943973
ISBN-13: 978-0123943972
http://www.amazon.com/Computer-Information-Security-Handbook-Edition/dp/0123943973/
-
H.Platte, C.Basile, S.Paraboschi,
"Policy-driven system management",
chapter in the book "Computer and Information Security Handbook",
J.R.Vacca (ed.), Morgan Kaufmann, June 2013, pp.773-792
ISBN-10: 0123943973
ISBN-13: 978-0123943972
http://www.amazon.com/Computer-Information-Security-Handbook-Edition/dp/0123943973/
-
G.Cabiddu, A.Lioy, G.Ramunno,
"Building a trusted environment for security applications",
chapter in the book "Theory and Practice of Cryptography Solutions for Secure Information Systems",
edited by Atilla Elçi, Josef Pieprzyk, et al.,
IGI Global (USA), 2013, pp. 334-360
ISBN: 978-1-4666-4030-6
DOI: 10.4018/978-1-4666-4030-6.ch014
PDF (members-only local copy)
-
C.Basile, M.Ceccato,
"Towards a unified software attack model to assess software protections",
ICPC-2013: IEEE 21st International Conference on Program Comprehension,
San Francisco (CA, USA), May 21-23, 2013, pp. 219-222,
DOI: http://dx.doi.org/10.1109/ICPC.2013.6613852
PDF (members-only local copy)
-
C.Basile, D.Canavese, A.Lioy, C.Pitscheider,
"Improved Reachability Analysis for Security Management",
PDP-2013: 21st EuroMicro Int. Conf. on Parallel, Distributed and network-based Processing,
Belfast (UK), February 27 - March 1, 2013, pp. 534-541
ISBN: 978-1-4673-5321-2
DOI: 10.1109/PDP.2013.86
PDF (members-only local copy)
YEAR 2012: 9 papers (4 journals, 4 conferences, 1 report)
-
L.Marinos (editor),
"Consumerization of IT: Risk Mitigation Strategies and Good Practices",
ENISA deliverable 2011-10-18, joint work of 6 experts (including A.Lioy),
December 2012, 51 pages,
available on-line at http://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/COITMitigationStategiesPublishedVersion.pdf
PDF (free local copy)
-
S.Faily, J.Lyle, C.Namiluko, A.Atzeni, C.Cameroni,
"Model-driven architectural risk analysis using architectural and contextualised attack patterns"
MDsec'12: Workshop on Model-Driven Security, at the 15th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems
Innsbruck (Austria), October 1-5, 2012, 6 pages
ISBN: 978-1-4503-1806-8
DOI: 10.1145/2422498.2422501
PDF (members-only local copy)
-
S.Faily, J.Lyle, A.Paul, A.Atzeni, D.Blomme, H.Desruelle, K.Bangalore,
"Requirements sensemaking using concept maps"
HCSE-2012: 4th International Conference on Human-Centred Software Engineering
Toulouse (France), October 29-31, 2012, pp. 217-232,
vol. 7623 of Lecture Notes in Computer Science (LNCS), Springer, 2012
ISSN: 0302-9743
ISBN: 978-3-642-34347-6
DOI: 10.1007/978-3-642-34347-6_13
PDF (members-only local copy)
-
J.Lyle, A.Paverd, J.King-Lacroix, A.Atzeni, H.Virji, I.Flechais, S.Faily,
"Personal PKI for the smart device era",
EuroPKI-2012: 9th European PKI Workshop: Research and Applications,
Pisa (Italy), 13-14 September, 2012 , pp. 69-84,
vol. 7868 of Lecture Notes in Computer Science (LNCS), Springer, 2013
ISSN: 0302-9743
ISBN: 978-3-642-40011-7 (print)
ISBN: 978-3-642-40012-4 (online)
DOI: 10.1007/978-3-642-40012-4_5
PDF (members-only local copy)
-
C.Basile, A.Cappadonia, A.Lioy,
"Network-level access control policy analysis and transformation",
IEEE/ACM Transactions on Networking,
Vol.20, No.4, August 2012, pp. 985-998,
ISSN: 1063-6692
DOI: 10.1109/TNET.2011.2178431
PDF (members-only local copy)
-
C.Basile, S.Di Carlo, A.Scionti,
"FPGA-based remote-code integrity verification of programs in distributed embedded systems",
IEEE/ACM Transactions on Systems, Man, and Cybernetics (part C: applications and reviews),
Vol.42, No.2, March 2012, pp.187-200,
ISSN: 1094-6977
DOI: 10.1109/TSMCC.2011.2106493
PDF (members-only local copy)
-
E.Cesena, M.Pedicini, L.Roversi,
"Typing a Core Binary-Field Arithmetic in a Light Logic",
chapter in the book
"Foundational and Practical Aspects of Resource Analysis",
R.Peña, M.van Eekelen, O.Shkaravska (editors),
LNCS-7177, Springer, 2012, pp.19-35
ISBN: 978-3-642-32494-9
DOI: 10.1007/978-3-642-32495-6_2
YEAR 2011: 16 papers (3 journals, 10 conferences, 2 book chapters, 1 report)
-
G. Calandriello, P. Papadimitratos, J. Hubaux, A. Lioy,
"On the Performance of Secure Vehicular Communication Systems",
IEEE Transactions on Dependable and Secure Computing
ISSN: 1545-5971
Vol.8, No.6, November-December 2011, pp. 898-912
DOI: 10.1109/TDSC.2010.58
PDF (members-only local copy)
-
D.Berbecaru, A.Lioy, M.Mezzalama, G.Santiano, E.Venuto, M.Oreglia,
"Federating e-identities across Europe, or how to build cross-border e-services"
AICA-2011: Smart Tech and Smart Innovation conference,
Torino (Italy), November 15-17, 2011, 10 pages,
ISBN: 9788890540646
PDF (free local copy)
-
M.Mezzalama, G.Oglietti,
"Acquisizione del traffico IP da una rete ad elevato throughput utilizzando un sistema Open Source: tecnologie e problematiche"
AICA-2011: Smart Tech and Smart Innovation conference,
Torino (Italy), November 15-17, 2011, 18 pages,
ISBN: 9788890540646
PDF (free local copy)
-
A.Lioy, M.Mezzalama,
"Protezione dei sistemi informatici"
in the book "Ingegneria forense: metodologie, protocolli, casi studio"
edited by N.Augenti and B.M.Chiaia,
Dario Flaccovio editore (Palermo, Italy), ottobre 2011, pp. 455-488,
ISBN 9788857901015
-
E.Cesena, G.Ramunno, R.Sassu, D.Vernizzi, A.Lioy,
"On scalability of remote attestation",
STC'11: 6th ACM workshop on Scalable Trusted Computing
Chicago (IL, USA) October 17, 2011, pp. 25-30
ISBN: 978-1-4503-1001-7
DOI: 10.1145/2046582.2046588
-
J. Silvestro, D. Canavese, E. Cesena, P. Smiraglia,
"A unified ontology for the virtualization domain"
DOA-SVI 2011: Distributed Objects and Applications and Secure
Virtual Infrastructures 2011,
Hersonissos (Greece), October 17-21, 2011, pp. 617-624,
vol. 7045 of Lecture Notes in Computer Science (LNCS), Springer, 2011
ISSN: 0302-9743
ISBN: 978-3-642-25105-4
DOI: 10.1007/978-3-642-25106-1
-
D.Berbecaru, A.Lioy, M.D.Aime,
"Exploiting proxy-based federated identity management in wireless roaming access"
TrustBus 2011: 8th Int. Conf. on Trust, Privacy and Security in Digital Business,
Toulouse (France), August 29-September 2, 2011, pp. 13-23,
vol. 6863 of Lecture Notes in Computer Science (LNCS), Springer, 2011
ISSN: 0302-9743
ISBN: 978-3-642-22889-6
DOI: 10.1007/978-3-642-22890-2_2
-
A.Atzeni, C.Cameroni, S.Faily, J.Lyle, I.Flechais,
"Here's Johnny: a Methodology for Developing Attacker Personas"
ARES/SecSE 2011: 5th Secure Software Engineering workshop at the 6th Int. Conf. on Availability, Reliability and Security ,
Vienna (Austria), August 22-26, 2011, pp. 722-727,
ISBN: 978-1-4577-0979-1,
DOI: 10.1109/ARES.2011.115
-
O.G.Rizzo, E.Cesena,
"Crittografia al liceo: approfondire le classi di resto modulo n"
Didamatica 2011,
Torino (Italy), May 4-6, 2011, 4 pages,
ISBN: 9788890540622,
PDF (free local copy)
-
S.Barbagallo, R.Bertonasco, F.Corno, M.Mezzalama, M.Sonza Reorda, E.Venuto,
"La formazione a distanza al Politecnico di Torino: nuovi modelli e strumenti"
Didamatica 2011,
Torino (Italy), May 4-6, 2011, 10 pages,
ISBN: 9788890540622,
PDF (free local copy)
-
E.Cesena, D.Vernizzi,
"Slides for teaching: the slim approach"
Didamatica 2011,
Torino (Italy), May 4-6, 2011, 4 pages,
ISBN: 9788890540622,
PDF (free local copy)
-
G.Cabiddu, E.Cesena, R.Sassu, D.Vernizzi, G.Ramunno, A.Lioy,
"The Trusted Platform Agent"
IEEE Software
ISSN: 0740-7459
Vol.28, Issue 2, March-April 2011, pp. 35-41
DOI: 10.1109/MS.2010.160
-
D.Berbecaru,
"LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments"
PDP 2011: the 19th Euromicro International Conference on Parallel, Distributed and Network-Based Computing,
Ayia Napa (Cyprus), February 9-11, 2011, pp. 141-145,
ISSN: 1066-6192,
ISBN: 978-0-7695-4328-4,
DOI: 10.1109/PDP.2011.32
-
M. Aime, A. Lioy, P.C. Pomi,
"Automatic (re)configuration of IT systems for dependability",
IEEE Transactions on Services Computing,
ISSN: 1939-1374
Vol.4, Issue 2, February 2011, pp. 110-124
DOI: 10.1109/TSC.2010.31
-
M. Aime, A. Lioy, P.C. Pomi, M. Vallini,
"Security plans for SaaS",
in the book
"New Frontiers in Information and Software as Service - Service and Application Design Challenges in the Cloud",
edited by D.Agrawal; K.S.Candan, W.-S.Li,
Springer, February 2011, pp. 81-111
ISBN 978-3-642-19293-7
DOI (chapter): 10.1007/978-3-642-19294-4_4
DOI (book): 10.1007/978-3-642-19294-4
-
D.Catteddu (editor),
"Security and Resilience in Governmental Clouds",
ENISA deliverable, joint work of 21 experts (including A.Lioy),
January 2011, 146 pages,
available on-line at http://www.enisa.europa.eu/act/rm/emerging-and-future-risk/deliverables/security-and-resilience-in-governmental-clouds
YEAR 2010: 13 papers (4 journals, 8 conferences, 1 book chapter)
-
D.Berbecaru, L. Albertalli, A. Lioy,
"The ForwardDiffSig scheme for multicast authentication",
IEEE/ACM Transactions on Networking,
Vol.18, No.6, December 2010, pp.1855-1868,
ISSN: 1063-6692
DOI: 10.1109/TNET.2010.2052927
-
G. Cabiddu, E. Cesena, D. Vernizzi,
"Anonymous services - Enhancing end-user privacy exploiting anonymous networks",
Secrypt 2010 - international conference on security and cryptography,
Athens (Greece), July 26-28, 2010, pp. 221-225,
ISBN: 9789898425188
-
M. Aime, F. Guasconi,
"Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management",
DEPEND'10 - 3nd Int. Conf. on Dependability,
Venezia Mestre (Italy), July 18-25, 2010, pp. 92-97,
ISBN: 978-0-7695-4090-0,
DOI: 10.1109/DEPEND.2010.22
-
E. Cesena, H. Löhr, G. Ramunno, A.R. Sadeghi, D. Vernizzi,
"Anonymous Authentication with TLS and DAA",
TRUST 2010 - Third International Conference on Trust and Trustworthy Computing,
Berlin (Germany), 21-23 June 2010, pp. 47-62,
LNCS-6101, Springer,
ISBN: 978-3-642-13868-3
DOI: 10.1007/978-3-642-13869-0_4
-
I. Enrici, M. Ancilli, A. Lioy,
"A psychological approach to information technology security",
HSI-2010: 3rd Int. Conf. on Human System Interactions,
Rzeszòw (Poland), May 13-15, 2010, pp. 459-466,
IEEE Press,
ISBN: 978-1-4244-7560-5
DOI: 10.1109/HSI.2010.5514528
-
M. Aime, P.C. Pomi, M. Vallini,
"Ontology and algorithms for the dependable configuration of information systems"
International Journal of Critical Computer-Based Systems (IJCCBS)
Vol.1, No.4, pp.301-335,
ISSN: 1757-8779,
-
D.Berbecaru,
"Performance of two one-time signature schemes in space/time constrained environments",
IEEE ISWPC 2010: IEEE International Symposium on Wireless Pervasive Computing,
Modena (Italy), May 5-7, 2010, pp.238-243,
ISBN: 978-1-4244-6857-7,
DOI: 10.1109/ISWPC.2010.5483755
-
M. Aime,
"Trusted Distributed Log Services",
EW2010: 2010 European Wireless,
Lucca (Italy), April 2010, pp. 488-495,
ISBN: 978-1-4244-6001-4,
DOI: 10.1109/EW.2010.5483494
PDF (members-only local copy)
-
L.Catuogno, A.Dmitrienko, K.Eriksson, D.Kuhlmann, G.Ramunno, A.R.Sadeghi, S.Schulz, M.Schunter, M.Winandy, J.Zhan,
"Trusted Virtual Domains - Design, Implementation and Lessons Learned"
INTRUST2009 - The International Conference on Trusted Systems
Beijing (China), December 17-19, 2009, pp. 156-179,
LNCS-6163, Springer 2010,
ISBN: 978-3-642-14596-4
DOI: 10.1007/978-3-642-14597-1_10
-
C.Basile, A.Lioy, S.Scozzi, M.Vallini,
"Ontology-based Security Policy Translation",
Journal of Information Assurance and Security,
2010, Vol.5, pp.437-445,
ISSN: 1554-1010,
PDF (free local copy)
-
C.Basile, A.Lioy, M.Vallini,
"Towards a Network-Independent Policy Specification"
PDP 2010: 18th Euromicro International Conference on Parallel, Distributed and Network-Based Computing
Pisa (Italy), February 17-19, 2010, pp. 649-653
IEEE Computer Society,
ISSN: 1066-6192
ISBN: 978-0-7695-3939-3
DOI: 10.1109/PDP.2010.45
-
A.Lioy, G.Ramunno,
"Trusted Computing"
in the book
"Handbook of Information and Communication Security"
edited by P.Stavroulakis, M.Stamp,
Springer, 2010, pp.697-717
ISBN 978-3-642-04116-7,
DOI: 10.1007/978-3-642-04117-4_32
-
S.Cabuk, C.I.Dalton, K.Eriksson, D.Kuhlmann, H.V.Ramasamy, G.Ramunno, A.R.Sadeghi, M.Schunter, C.Stueble,
"Towards automated security policy enforcement in multi-tenant virtual data centers",
Journal of Computer Security,
IOS Press
Vol.18, Issue 1, January 2010, pp.89-121
Online ISSN: 1875-8924
Print ISSN: 0926-227X
DOI:10.3233/JCS-2010-0376
YEAR 2009: 10 papers (3 journals, 5 conferences, 2 book chapters)
-
A.Giambruno, M.A.Shibli, S.Muftic, A.Lioy,
"MagicNET: XACML Authorization Policies for Mobile Agents"
ICITST-2009: Int. Conf. on Internet Technologies and Secured Transactions
London (UK), November 9-12, 2009, pp. 1-7
IEEE, ISBN: 978-1-4244-5647-5
-
M.A.Shibli, S.Muftic, A.Giambruno, A.Lioy,
"MagicNET: security system for development, validation and adoption of mobile agents"
NSS-2009: 3rd Int. Conf. on Network and System Security
Gold Coast, Queensland (Australia), October 19-21, 2009, pp. 389-396
IEEE, ISBN: 978-0-7695-3838-9
DOI: 10.1109/NSS.2009.33
-
C. Basile, A. Lioy, S. Scozzi, M. Vallini,
"Ontology-based policy translation"
CISIS'09 - Int. Workshop on Computational Intelligence in Security for Information Systems
Burgos (Spain), September 23-26, 2009, pp. 117-126
Springer, ISBN: 978-3-642-04090-0
DOI: 10.1007/978-3-642-04091-7_15
PDF (free local copy)
-
A.Sorniotti, R.Molva, L.Gomez, C.Trefois, A.Laube, P.Scaglioso,
"Efficient access control for wireless sensor data",
International Journal of Wireless Information Networks,
Vol.16, No.3, September 2009, pp.165-174
Springer, ISSN: 1068-9605 (print) 1572-8129 (online)
DOI:10.1007/s10776-009-0102-4
-
M. Aime, P.C. Pomi, M. Vallini,
"Planning dependability of virtualised networks", (best paper award)
DEPEND'09 - 2nd Int. Conf. on Dependability and Security in Complex and Critical Information Systems,
Athend (Greece), June 18-23, 2009, pp. 46-51,
ISBN: 978-0-7695-3666-8,
DOI: 10.1109/DEPEND.2009.13
-
A.Lioy, G.Ramunno, D.Vernizzi,
"Trusted-Computing technologies for the protection of Critical Information Systems",
Journal of Information Assurance and Security,
2009, Vol.4, pp.449-457,
ISSN: 1554-1010,
PDF (free local copy)
-
G.Calandriello, A.Lioy,
"Efficient and Reliable Pseudonymous Authentication"
in the book
"Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange"
edited by H.Guo
IGI Global, 2009, pp. 247-263
ISBN 978-1-60566-338-8
DOI: 10.4018/978-1-60566-338-8
-
A.Abou El Kalam, A.Atzeni, A.Cappadonia, E.Cesena, S.Fischer-Hubner, S.Lindskog, L.A.Martucci, C.Pastrone
"Toward a formal framework to evaluate wireless sensor network security",
NEWCOM++ - ACoRN Joint Workshop,
Barcelona(Spain), March 30-April 1, 2009
-
D.Berbecaru, A.Desai, A.Lioy
"A unified and flexible solution for integrating CRL and OCSP into PKI applications",
Software: Practice and Experience,
John Wiley & Sons
Vol.39, Issue 10, July 2009, pp. 891-921
Online ISSN: 1097-024X
Print ISSN: 0038-0644
DOI: 10.1002/spe.918
PDF (members-only local copy)
-
A.Atzeni,
"Problemi di sicurezza delle comunicazioni a distanza"
in the book
"Nuove tecnologie e processo penale"
edited by Giappichelli Editore
ISBN 978-88-348-7798-2
YEAR 2008:
-
P.G.Scaglioso, C.Basile, A.Lioy
"Modern standard-based access control in network services: XACML in action",
IJCSNS - International Journal of Computer Science and Network Security,
Vol. 8, No. 12, December 2008, pp. 296-305
ISSN:1738-7906
DOI: N/A
(but here is a pointer to the publisher copy)
PDF (free local copy)
-
F.Kargl, P.Papadimitratos, L.Buttyan, M.Muter, B.Wiedersheim, E.Schoch, T-V.Thong, G.Calandriello, A.Held, A.Kung, J.P.Hubaux
"Secure vehicular communications: implementation, performance, and research challenges",
IEEE Communications,
Vol. 46, No. 11, November 2008, pp. 110-118
ISSN: 0163-6804
DOI: 10.1109/MCOM.2008.4689253
-
E.Cesena, G.Ramunno, D.Vernizzi
"Towards Trusted Broadcast Encryption",
TrustCom 2008: The 2008 International Symposium on Trusted Computing,
Zhang Jia Jie (Hunan, China), November 18-20, 2008, pp. 2125-2130
ISBN:978-0-7695-3398-8
DOI: 10.1109/ICYCS.2008.499
-
F.Armknecht, Y.Gasmi, A.R.Sadeghi; P.Stewin, M.Unger, G.Ramunno, D.Vernizzi
"An Efficient Implementation of Trusted Channels Based on OpenSSL",
STC'08: 3rd ACM workshop on Scalable Trusted Computing 2008
Fairfax (VA, USA) October 31, 2008, pp. 41-50
ISBN:978-1-60558-2
DOI: 10.1145/1456455.1456462
-
M.D.Aime, A.Atzeni, P.C.Pomi
"The Risks With Security Metrics",
QoP-2008: 4th ACM Workshop on Quality of Protection
Alexandria (VA, USA), October 27, 2008, pp. 65-70
ISBN:978-1-60558-321-1
DOI: 10.1145/1456362.1456376
PDF (members-only local copy)
-
M.D.Aime, A.Atzeni, P.C.Pomi
"Learning to enhance dependability of information systems",
SASO 2008 - 2nd IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems
Venezia (Italy), October 20-24, 2008, pp. 483-484
ISBN: 978-0-7695-3404-6
DOI: 10.1109/SASO.2008.50
-
A. Lioy, G. Ramunno, D. Vernizzi
"Trusted-Computing Technologies for the Protection of Critical Information Systems"
CISIS'08 - Int. Workshop on Computational Intelligence in Security for Information Systems
Genova (Italy), October 23-24, 2008, pp. 77-83
Springer, ISBN: 978-3-540-88180-3
DOI: 10.1007/978-3-540-88181-0_10
-
D. Berbecaru, L. Albertalli
"On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks",
WIMOB'08 - IEEE International Conference on Wireless and Mobile Networking and Communications
Avignon (France), October 12-14, 2008, pp. 234-240
IEEE Computer Society, ISBN: 978-0-7695-3393-3
DOI: 10.1109/WiMob.2008.14
-
S.Furnell, S.K.Katsikas, A.Lioy (editors),
"Trust, Privacy and Security in Digital Business",
Proc. of 5th Int. Conf. TrustBus 2008,
Torino (Italy), September 4-5, 2008,
vol. 5185 of Lecture Notes in Computer Science (LNCS), Springer,
204 pages
ISSN 0302-9743
ISBN-10 3-540-85734-6
ISBN-13 978-3-540-85734-1
DOI: 10.1007/978-3-540-85735-8
-
M.D.Aime, P.C.Pomi, M.Vallini
"Policy-Driven System Configuration for Dependability",
SECURWARE'08 - 2nd Int. Conf. on Emerging Security Information, Systems and Technologies
Cap Esterel (France), August 25-31, 2008, pp. 420-425
ISBN: 978-0-7695-3329-2
DOI: 10.1109/SECURWARE.2008.54
-
M.D.Aime, A.Atzeni
"Generation of Diagnostic Plans for Large ICT Systems",
SECURWARE'08 - 2nd Int. Conf. on Emerging Security Information, Systems and Technologies
Cap Esterel (France), August 25-31, 2008, pp. 344-349
ISBN: 978-0-7695-3329-2
DOI: 10.1109/SECURWARE.2008.56
-
C. Basile, A. Cappadonia, A. Lioy
"Geometric Interpretation of Policy Specification",
POLICY 2008: IEEE Int. workshop on Policies for Distributed Systems and Networks
Palisades (NY, USA), June 2-4, 2008, pp. 78-81
IEEE Computer Society, ISBN: 978-0-7695-3133-5
DOI: 10.1109/POLICY.2008.36
-
P. Papadimitratos, G. Calandriello, J.-P. Hubaux, A. Lioy
"Impact of vehicular communication security on transportation safety",
MOVE 2008: IEEE INFOCOM-2008 workshop on Mobile Networking for Vehicular Environments
Phoenix (AZ, USA), April 13-18, 2008, pp. 1-6
ISBN: 978-1-4244-2219-7
DOI: 10.1109/INFOCOM.2008.4544663
-
E. Cesena, G. Ramunno, D. Vernizzi
"Secure storage using a sealing proxy",
EUROSEC'08: ACM SIGOPS European Workshop on System Security
Glasgow, Scotland, March 31, 2008, pp. 27-34
ACM SIGOPS, ISBN: 978-1-60558-119-4
DOI: 10.1145/1355284.1355290
-
D. Berbecaru, L. Albertalli
"An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes",
PDP2008: 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing
Toulouse, France, February 13-15, 2008, pp. 581-589
IEEE Computer Society, ISBN: 0-7695-3089-3 (Print)
DOI: 10.1109/PDP.2008.64
-
C. Basile, P.C. Pomi, P. Scaglioso
"Integrating Deployment Techniques with Monitoring: The Proactive Configuration Checker (PCC)",
PDP2008: 16th Euromicro Conference on Parallel, Distributed and Network-
Based Processing
Toulouse, France, February 13-15, 2008, pp. 611-615
IEEE Computer Society, ISBN: 0-7695-3089-3 (Print)
DOI: 10.1109/PDP.2008.70
YEAR 2007:
-
C. Basile, A. Cappadonia and A. Lioy
"Algebraic Models to Detect and Solve Policy Conflicts",
MMM-ACNS 2007 - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security
St. Petersburg, Russia, September 13-15, 2007, pp. 242-247
ISBN: 978-3-540-73985-2 (Print) 978-3-540-73986-9 (Online)
DOI: 10.1007/978-3-540-73986-9_20
-
G. Calandriello, P. Papadimitratos, J-P. Hubaux, A. Lioy
"Efficient and robust pseudonymous authentication in VANET",
VANET'07: 4th ACM Int. Workshop on Vehicular ad-hoc networks
Montreal, Quebec, Canada, 10 September 2007, pp. 19-27
ISBN: 978-1-59593-739-1
DOI: 10.1145/1287748.1287752
PDF (members-only local copy)
-
M.D.Aime, A.Atzeni, P.C.Pomi,
"AMBRA - Automated Model-Based Risk Analysis",
QoP 2007: ACM Workshop on Quality of Protection,
Alexandria, VA, USA, 29 October 2007, pp. 43-48,
ISBN: 978-1-59593-885-5,
DOI: 10.1145/1314257.1314272
PDF (members-only local copy)
-
D. Berbecaru, A. Lioy,
"On the Robustness of Applications Based on the SSL and TLS Security Protocols"
,
EuroPKI 2007:4th European PKI Workshop: Theory and Practice
Palma de Mallorca, Spain, 28-30 June 2007, pp. 248-264
vol. 4582 of Lecture Notes in Computer Science (LNCS), Springer, 2007
ISSN: 0302-9743
ISBN-10: 3-540-73407-4
ISBN-13: 978-3-540-73407-9
DOI: 10.1007/978-3-540-73408-6_18
[ PDF ]
-
A. Atzeni, A. Lioy,
"An estimation of attack surface to evaluate network (in)security",
ICEIS 2007: 9th Int. Conference on Enterprise Information Systems
Funchal, Portugal, 12-16 June, 2007, pp. 493-498
ISBN: 978-972-8865-90-0
[ PDF ]
-
E. Cesena, P.C. Pomi, G. Ramunno, D. Vernizzi
"Performance of Xen's Secured Virtual Networks",
TNC-2007: Terena Networking Conference 2007
Lingby, Denmark, 21-24 May, 2007
[ PDF ]
-
R.Avanzi, E.Cesena
"Trace Zero Varieties over Fields of Characteristic 2 for Cryptographic Applications",
SAGA-2007: 1st Symposium on Algebraic Geometry and its Applications
Papeete (Tahiti, French Polynesia), 7-11 May, 2007, pp. 188-215
ISBN: 13-978-981-279-342-3
ISBN: 10-981-279-342-9
-
M.D.Aime, G. Calandriello, A. Lioy,
"Dependability in Wireless Networks: Can We Rely on WiFi?",
IEEE Security and Privacy
vol. 5, no. 1, January/February 2007, pp. 23-29.
ISSN: 1540-7993
DOI: 10.1109/MSP.2007.4
[ PDF ]
YEAR 2006:
-
A. Lioy,
"Security analysis and configuration of large networks",
in the volume S.Paulus, N.Pohlmann, H.Reimer (editors)
"Securing Electronic Business Processes"
Proceedings of ISSE-2006 (Information Security Solutions Europe),
Rome, Italy, October 10-12, 2006, pp. 259-265
ISBN-10: 3-8348-0213-1
ISBN-13: 978-3-8348-0213-2
[ PDF ]
-
M.D.Aime, A. Atzeni,
"Opaque channel: contrasting information leakage in wireless scenarios",
AICA 2006,
Cesena, Italy, September 21-22, 2006, pp.481-490
ISBN: 88-6055-075-0
[ PDF ]
-
D.Kuhlmann, R.Landfermann, H.V.Ramasamy, M.Schunter, G.Ramunno, D.Vernizzi
"An Open Trusted Computing Architecture - Secure Virtual Machines Enabling User-Defined Policy Enforcement",
IBM Research Report RZ3655
October 2006, 15 pages
[ PDF ]
or from the IBM site
-
M.D.Aime, G. Calandriello, A. Lioy,
"A wireless distributed intrusion detection system and a new attack model",
ISCC 2006: 11th IEEE Int. Symposium on Computers and Communications,
Cagliari (Italy), June 26-29, 2006, pp.35-40,
ISBN-13 978-0-7695-2588-4
ISBN-10 0-7695-2588-1
ISSN 1530-1346
DOI 10.1109/ISCC.2006.22
[ PDF ]
-
A.S.Atzeni, A.Lioy (editors),
"Public Key Infrastructure - Theory and practice",
EuroPKI-2006: 3rd European PKI workshop,
Torino (Italy), June 19-20, 2006,
vol. 4043 of Lecture Notes in Computer Science (LNCS), Springer,
261 pages
ISSN 0302-9743
ISBN-10 3-540-35151-5
ISBN-13 978-3-540-35151-1
DOI: 10.1007/11774716
-
D.Berbecaru,
"On the tradeoff between performance and security in OCSP-based certificate revocation systems for wireless environments",
ISCC 2006: 11th IEEE Symposium on Computers and Communications,
Cagliari (Italy), June 26-29, 2006, pp.340-345,
ISBN-13 978-0-7695-2588-4
ISBN-10 0-7695-2588-1
ISSN 1530-1346
DOI 10.1109/ISCC.2006.22
[ PDF ]
-
M.Pala, A.Lioy
"Fighting e-mail abuses: the EMPE approach",
EuroPKI-2006 - 3rd European PKI Workshop: Theory and Practice,
Torino (Italy), June 19-20, 2006, pp.130-144
vol. 4043 of Lecture Notes in Computer Science (LNCS), Springer, 2006
ISBN-10 3-540-35151-5
ISBN-13 978-3-540-35151-1
ISSN 0302-9743
DOI 10.1007/11774716_11
[ PDF ]
-
A.Lioy, M.Marian, N.Moltchanova, M.Pala,
"PKI past, present and future",
International Journal of Information Security, Springer,
Vol. 5, No. 1, January 2006, pp. 18-29
ISSN 1615-5262 (print edition)
ISSN 1615-5270 (electronic edition)
DOI 10.1007/s10207-005-0077-9
[ PDF ]
YEAR 2005
-
A.Atzeni, A.Lioy, L.Tamburino
"A general methodology for network security evaluation"
AICA-2005
Udine (Italy), October 5-7, 2005, pp. 605-615
ISBN 88-8420-287-6
[ PDF ]
-
C.Basile, A.Lioy, M.Marian
"POSITIF: un approccio olistico alla sicurezza basato su politiche formali" (in Italian)
AICA-2005
Udine (Italy), October 5-7, 2005, pp. 710-719
ISBN 88-8420-287-6
-
A.Lioy, G.Ramunno, M.D.Aime, M.Pala,
"Motivations for a theoretical approach to WYSIWYS",
CMS-2005: IFIP Int. Conf. on Communications and Multimedia Security,
Salzburg (Austria), September 19-21, 2005,
vol. 3677 of Lecture Notes in Computer Science (LNCS), Springer,
pp. 289-290
ISBN 3-540-28791-4
ISSN 0302-9743
DOI: 10.1007/11552055_38
-
M.D.Aime, A.Lioy, G.Ramunno,
"Decentralised access control in 802.11 networks",
CMS-2005: IFIP Int. Conf. on Communications and Multimedia Security,
Salzburg (Austria), September 19-21, 2005,
vol. 3677 of Lecture Notes in Computer Science (LNCS), Springer,
pp. 180-190
ISBN 3-540-28791-4
ISSN 0302-9743
DOI 10.1007/11552055_18
[ SpringerLink |
PDF ]
-
A.Atzeni, A.Lioy
"Why to adopt a security metric? A brief survey",
QoP-2005: Quality of Protection workshop,
Milano (Italy), September 15, 2005, pp. 1-12
ISBN 978-0-387-29016-4
[ PDF ]
-
D.Berbecaru,
"On measuring SSL-based secure data transfer with handheld devices",
ISWCS-2005: IEEE International Symposium on Wireless Communication Systems,
Siena (Italy), September 5-9, 2005, 5 pages (CD-ROM proceedings only)
ISBN 0-7803-9206-X
[ PDF ]
-
D.Berbecaru,
"FIrDA-SSL: Experiments with securing communication in PANs",
SecureComm-2005: IEEE/Create-Net International Conference on Security and Privacy for Emerging Areas in Communication Networks,
Athens (Greece), September 5-9, 2005, 11 pages (CD-ROM proceedings only)
ISBN 0-7803-9469-0
[ PDF ]
-
M.D.Aime, A.Atzeni, A.Lioy,
"The wireless opaque channel to contrast information leakage",
WoWMoM 2005: IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks,
Taormina (Italy), June 13-16, 2005 pp. 570-575
ISBN 0-7695-2342-0
DOI 10.1109/WOWMOM.2005.104
[ PDF ]
-
M.D.Aime, A.Lioy,
"Incremental trust: building trust from past experience",
WoWMoM 2005: IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks,
Taormina (Italy), June 13-16, 2005 pp. 603-608
ISBN 0-7695-2342-0
DOI 10.1109/WOWMOM.2005.54
[ PDF ]
YEAR 2004:
-
D.Berbecaru,
"MBS-OCSP: An OCSP based certificate revocation system for wireless
environments",
ISSPIT-2004: IEEE International Symposium on Signal Processing and Information Technology,
Rome (Italy), December 18-21, 2004, pp. 267-272
ISBN 0-7803-8689-2
[ PDF ]
-
D.Berbecaru, A.Lioy,
"Preliminary steps in designing and implementing a privilege verifier for PMI",
ICWI-2004: IADIS International Conference on WWW/Internet,
Madrid (Spain), October 6-9, 2004, pp. 317-324
ISBN 972-99353-0-0
[PDF]
-
M.Aime, A.Lioy, D.Mazzocchi,
"Security of 802.11 wireless networks",
in the book
"Security and privacy in advanced networking technologies"
edited by B.Jerman-Blazic, W.Schneider, T.Klobucar,
IOS press - NATO series, Aug. 2004, pp. 51-100
ISBN 1-58603-430-8
ISBN 1387-6694
-
A.Lioy, G.Ramunno,
"Multiple electronic signatures on multiple documents",
ICETE'04: IADIS Int. Conf. on E-Business and Telecommunication Networks,
EGCDMAS sub-workshop (Electronic Government, and Commerce: Design, Modeling, Analysis and Security),
Setubal (Portugal), August 24-28, 2004, pp. 24-34
ISBN 972-8865-17-1
[ PDF ]
-
C.Basile, A.Lioy,
"Towards an algebraic approach to solve policy conflicts",
FCS'04: Foundations of Computer Security,
WOLFASI sub-workshop (Workshop On Logical Foundations of an Adaptive Securit
y Infrastructure),
Turku (Finland), July 12-13, 2004, pp. 319-338
ISBN 952-12-1372-8
ISSN 1239-1905
-
A.Lioy, M.Marian, N.Moltchanova, M.Pala,
"The EuroPKI experience",
1st European Workshop on PKI,
Samos Island (Greece), June 25-26, 2004
vol.3093 of Lecture Notes in Computer Science (LNCS), Springer,
pp. 14-27
ISBN 3-540-22216-2
ISSN 0302-9742
DOI: 10.1007/978-3-540-25980-0_2
[PDF]
-
A. Lioy, A. Nagar, F. Ricchiuti,
"PMI: gestione delle autorizzazioni nei sistemi distribuiti" (in Italian),
ICT Security,
No. 23, May 2004, pp. 56-63
ISSN 1724-1987
-
G. Ramunno, D. Rocca,
"The standardisation effort in CEN/SSS E-Sign workshop",
ICT Security,
No. 23, May 2004, pp. 23-26
ISSN 1724-1987
-
D.Berbecaru, C.Derenale, A.Lioy,
"Digital certificates and public-key infrastructures",
in the book
"Information Security Policies and Actions in Modern Integrated Systems"
M.G.Fugini and C.Bellettini editors, IDEA group publishing, Feb. 2004, pp. 65-98
ISBN 1-59140-291-3 (soft cover) / 1-59140-186-0 (hard cover)
YEAR 2003:
-
A.Lioy, D.Mazzocchi (Editors),
"Communications and Multimedia Security - Advanced Techniques for Network and Data Protection",
CMS-2003: 7th IFIP Int. Conf. on Communications and Multimedia Security,
Torino (Italy), October 2-3, 2003,
vol. 2828 of Lecture Notes in Computer Science (LNCS), Springer,
263 pages
ISBN-13 978-3-540-20185-4
ISBN-10 3-540-28791-4
ISSN 0302-9743
DOI 10.1007/b13863
YEAR 2002:
-
D.Berbecaru, A.Lioy,
"Towards simplifying PKI implementation: client-server based validation of public-key certificates",
ISSPIT-2002: IEEE International Symposium on Signal Processing and Information Technology,
Marrakesh (Morocco), Dec. 18-21, 2002, pp. 277-282
ISBN 0-9727186-0-5
[PDF]
-
D.Berbecaru, A.Lioy, M.Marian, D.Marano,
"Secure digital administration in a medical environment",
ICWI-2002: IADIS International Conference on WWW/Internet,
Lisbon (Portugal), November 13-15, 2002, pp. 299-306
ISBN 972-9027-53-6
[PDF]
-
M.Aime, A.Lioy, D.Mazzocchi,
"Wireless security: current status and future evolution" (in Italian),
AICA symposium 2002,
Conversano (BA), Italy, September 25-27, 2002, pp. xx-yy
[PDF]
-
D. Berbecaru, A. Lioy, M. Marian,
"Security aspects in standard certificate revocation mechanisms: a case study for OCSP",
ISCC-2002: 7th IEEE Symposium on Computers and Communications,
Taormina/Giardini Naxos (Italy), July 1-4, 2002, pp. 484-489,
ISBN 0-7695-1671-8
DOI: 10.1109/ISCC.2002.1021719
YEAR 2001:
-
D. Berbecaru, A. Lioy, M. Marian,
"A Framework for Secure Digital Administration",
EuroWeb 2001 - The Web in Public Administration, IW3C endorsed conference,
Pisa, Italy, December 18-20, 2001, pp. 119-133,
ISBN 88-88327-33-9
-
D. Berbecaru, A. Lioy, M. Marian,
"On the Complexity of Public-Key Certificate Validation",
ISC-2001: 4th International Information Security Conference,
Malaga, Spain, October 1-3, 2001, vol. 2200 of Lecture Notes in Computer Science (LNCS), pp. 183-203,
ISBN 3-540-42662-0
DOI: 10.1007/3-540-45439-X_13
-
D.Berbecaru, A.Lioy, M.Marian,
"PKI-based system management",
SACCS-2001: International Symposium on Automatic Control and Computer Science,
Iasi (Romania), October 26-27, 2001
(CD-ROM proceedings only)
[PDF]
-
M.Baltatu, A.Lioy, D.Lombardo, D.Mazzocchi,
"Towards a policy system for IPsec: issues and an experimental implementation",
ICONN-2001: IEEE International Conference on Networks 2001,
Bangkok (Thailand), October 10-12, 2001, pp. 146-151
ISBN 0-7695-1186-4
DOI: 10.1109/ICON.2001.962332
[PDF]
-
A.Lioy, M.Mezzalama,
"Sicurezza dei sistemi informativi",
in volume 5 "Sistemi Distribuiti"
of the book "Sistemi Informativi"
edited by C.Batini, B.Pernici, G.Santucci,
Franco Angeli, 2001, pp. 124-209
ISBN 88-464-3270-3
-
M.Baltatu, A.Lioy
"IP Security"
chapter in the book Advanced Security Technologies in Networking
edited by B.Jerman-Blazic, W.S.Schneider and T.Klobucar,
IOS Press - NATO Series, 2001, pp. 95-108
ISBN 1-58603-156-2
[PDF]
YEAR 2000:
-
M. Baltatu, A. Lioy, F. Maino, D. Mazzocchi
"Security issues in control, management and routing protocols"
Computer Networks, The International Journal of Computer and Telecommunication Networks
Elsevier, Amsterdam, December 2000, pp. 881-894
ISBN 1389-1286
DOI: 10.1016/S1389-1286(00)00159-6
[PDF]
note: a previous version of this paper (with the same title and authors) appeared in the proceedings of
TERENA Networking Conference 2000,
Lisbona (Portugal), May 22-25, 2000
[ PDF ]
or from the TNC-2000 on-line proceedings
-
D.Berbecaru, A.Lioy, F.Maino, D.Mazzocchi, G.Ramunno,
"Towards concrete application of electronic signature"
AICA symposium 2000,
Taormina (Italy), September 27-30, 2000, pp. 543-561
[PDF]
-
M.Baltatu, A.Lioy, D.Mazzocchi,
"Security Policy System: status and perspective",
ICONN-2000: IEEE International Conference on Networks 2000,
Singapore, September 5-8, 2000, pp. 278-284
ISBN 0-7695-0777-8
DOI: 10.1109/ICON.2000.875802
[PDF]
-
D.Berbecaru, A.Corradi, A.Lioy, F.Maino, R.Montanari, C.Stefanelli,
"A Flexible Management Framework for Certificate Status Validation"
IFIP/SEC2000 - 15th
International Conference on Information Security
Beijing, P.R.
China, August 20-25, 2000, pp. 481-490
ISSN 0-7923-7914-4
[PDF]
-
A.Lioy, F.Maino, M.Marian, D.Mazzocchi,
"DNS security "
TERENA Networking Conference 2000,
Lisbona (Portugal), May 22-25, 2000
[ PDF ]
or from the TNC-2000 on-line proceedings
YEAR 1999:
-
C.Basile, A.Lioy, F.Maino, A.Mazzeo, N.Mazzocca, D.Mazzocchi
"DIVA-SEC: un sistema sicuro di Video on-Demand"
AICA'99 Symposium,
Padova (Italy), September 27-29, 1999
[ PS.GZ
| PDF ]
-
G.Dall'Agnola, M.G.Fugini, A.Lioy, F.Maino, F.Maio, D.Mazzocchi
"Securing applications in the Demostene project"
ISSE 99 - Information Security Solutions Europe
Berlin (Germany), October 4-6, 1999
[ HTML
| PS
| PDF
]
YEAR 1998:
-
A.Lioy, F.Maino
"Un modello per la registrazione degli utenti di una PKI e la sua implementazione nel progetto ICE-TEL"
AICA'98 Symposium,
Napoli (Italy), Sep. 18-20, 1998
[ HTML
| PS.GZ
| PDF
]
-
A.Lioy, F.Maino
"Providing X.509-based user access
control to web servers"
IFIP/SEC'98 - 14th International
Information Security Conference,
Vienna/Budapest
(Austria/Ungheria), Aug 31 - Sep 4, 1998,
[ HTML
| PS.GZ
| PDF
]
-
A.Lioy, F.Maino
"La PKI del progetto ICE-TEL: la prima
infrastruttura di sicurezza italiana"
CABOTO'98 - Quale
Commercio Elettronico per la piccola e media impresa del Nord-Est
nel 2000,
Venezia - Mestre, Feb. 26-27, 1998
[
PS.GZ
| PDF
]
YEAR 1997:
-
A.Lioy, F.Maino, M.Mezzalama
"Secure document
management and distribution in an open network environment"
ICICS'97 - International Conference on Information and
Communications Security,
Beijing (P. R. China), Nov. 11-13,
1997, pp. 109-117
[
PS.GZ
| PDF
]
-
C.Fornaro, M.Gavelli, A.Lioy, F.Maino
"Esperienze nello sviluppo
di un'infrastruttura di sicurezza di rete a chiave pubblica
"
AICA'97 Symposium,
Milano (Italy), Sep.
24-26, 1997, pp. 233-247
[ HTML
| PS.GZ
| PDF
]
-
D.A.Galliano, A.Lioy, F.Maino
"Non-intrusive
authentication"
IFIP/SEC'97 - 13th International
Information Security Conference,
Copenhagen (Denmark), May
14-16, 1997, pp. 440-451
[
PS.GZ
| PDF
]
-
A.Lioy, F.Maino
"Providing security to the building
licenses delivering process in the city of Torino"
JENC-8 -
8th Joint European Networking Conference,
Edinburgh (Scotland),
May 12-15, 1997, pp. 432.1-432.6
[
PS.GZ
| PDF
]
YEAR 1995:
-
C.Fornaro, A.Lioy, F.Maino
"Aspetti
di sicurezza in un sistema informativo universitario"
NIR-IT'95: Network Information Retrieval in Italy,
Milano
(Italy), Nov. 21-23, 1995
[ HTML
| PS.GZ
| PDF
]
-
A.Capella, C.Fornaro, A.Lioy
"La sicurezza dei sistemi informativi di rete"
AICA'95 Symposium,
Cagliari (Italy), Sep. 27-29, 1995, pp. 339-346
[ PS.GZ ]
-
C.Fornaro, A.Lioy
"LIE - A
Network Tool to Track Intruder's Actions"
FIRST'95:
Forum of Incident Response and Security Teams,
Karlsruhe
(Germany), Sep. 18-22, 1995
[ HTML
| PS.GZ ]
-
C.Fornaro, A.Lioy
"Organizzazione di un'autorità certificativa basata su PGP"
Politecnico di Torino, report TR-SG-95-2,
Torino (Italy), August 1995
[ PS.GZ ]
-
C.Fornaro, A.Lioy
"Privacy e autenticazione della posta elettronica con PGP"
Politecnico di Torino, report TR-SG-95-1
Torino (Italy)), November 28, 1995
[ PS.GZ ]
Last modified on Monday, 16-Mar-2020 19:22:12