Clemente Galdi, Papers


    Volumes

  1. Stelvio Cimato, Clemente Galdi, Giuseppe Persiano (Ed.)
    Third International Conference Security in Communication Networks, (SCN 02) LNCS vol. 2576.


    Book Chapters

  2. Luigi Catuogno and Clemente Galdi
    Graphical Passwords.
    In M. Gupta, J. Walp, & R. Sharman (Eds.),
    Threats, Countermeasures, and Advances in Applied Information Security (pp. 111-128). IGI Global 2012.


    Papers in International Journals

  3. Luigi Catuogno, Clemente Galdi, Nicola Pasquino
    An Effective Methodology for Measuring Software Resource Usage
    IEEE Transactions on Instrumentation and Measurement (Accepted).

  4. Luigi Catuogno, Clemente Galdi, Giuseppe Persiano
    Secure Dependency Enforcement in Package Management Systems
    IEEE Transactions on Dependable and Secure Computing. (Article in Press).

  5. Silvia Rossi, Francesco Barile, Clemente Galdi and Luca Russo
    Recommendation in Museums: Paths, Sequences and Group Satisfaction Maximization
    Multimedia Tools and Applications, 76(24):26031-26055 (2017)

  6. Piero A. Bonatti, Clemente Galdi and Davide Torres.
    Event-Driven RBAC.
    Journal of Computer Security 23(6): 709-757 (2015)

  7. Luigi Catuogno and Clemente Galdi
    On user authentication by means of video events recognition
    Journal of Ambient Intelligence and Humanized Computing 5 (6), 909-918 (2014)

  8. Luigi Catuogno and Clemente Galdi
    Analysis of a two-factor graphical password scheme.
    International Journal of Information Security 13 (5), 421-437 (2014)

  9. Luigi Catuogno and Clemente Galdi
    Achieving interoperability between federated identity management systems: A case of study..
    J. High Speed Networks 20(4): 209-221 (2014)

  10. Carlo Blundo, Angelo De Caro, Clemente Galdi and Pino Persiano.
    Certified Information Access
    Journal of Systems and Software n. 86(9): 2439-2450 (2013)

  11. Giovanni Di Crescenzo and Clemente Galdi
    Hypergraph Decomposition and Secret Sharing.
    Discrete Applied Mathematics, Vol 157(5), March 2009, pp. 928-946.

  12. Carlo Blundo Clemente Galdi and Pino Persiano.
    Low-Randomness Constant-Round Private Protocols
    International Journal on Information Security, Vol 6(1), January 2007, pp. 15-26.

  13. Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi and Roberto Tagliaferri
    Neural Networks Techniques for Proactive Password Checking
    IEEE Transaction on Dependable and Secure Computing, Vol 3(4), October-December 2006, pp. 327-339

  14. Clemente Galdi, Christos Kaklamanis, Manuela Montangero and Pino Persiano.
    Station Placement in Networks
    Parallel Processing Letters, Vol. 15(1-2), March-June 2005, pp. 117-129.

  15. Carlo Blundo, Paolo D'Arco, Alfredo De Santis and Clemente Galdi.
    Hyppocrates: A new Proactive Password Checker
    Journal of Systems and Software, n. 71(1-2), pp 163-175, 2004.

  16. Carlo Blundo, and Clemente Galdi.
    Hiding Information in Image Mosaics
    The Computer Journal, 46(2): 202-212 (2003)


    Papers in International Conferences

  17. Vincenzo Auletta, Iannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano
    Information retention in heterogeneous majority dynamics
    13th International Conference on Web and Internet Economics, (WINE 2017).

  18. Luigi Catuogno, Clemente Galdi, Nicola Pasquino
    Measuring the effectiveness of containerization to prevent power draining attacks
    IEEE International Workshop on Measurement and Networking, (M & N 2017)

  19. Joachim Biskup, Piero A. Bonatti, Clemente Galdi and Luigi Sauro.
    Inference-proof data filtering for a probabilistic setting
    5th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2017)

  20. Vincenzo Auletta, Iannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano
    Robustness in Discrete Preference Games
    16th International Conference on Autonomous Agents and Multiagents systems (AAMAS 2017).

  21. Vincenzo Auletta, Iannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano
    Generalized Discrete Preference Games
    25th International Joint Conference on Artificial Intelligence (IJCAI-16), pp. 53-59.

  22. Piero A. Bonatti, Marco Faella, Clemente Galdi and Luigi Sauro.
    15th Generalized Agent-mediated Procurement Auctions
    International Conference on Autonomous Agents and Multiagents systems (AAMAS 2016), pp. 77-85

  23. Luigi Catuogno, Clemente Galdi, Daniel Riccio
    Flexible and Robust Enterprise Right Management
    The twenty first IEEE Symposium on Computers and Communications (IEEE ISCC 16), pp 1257-1262

  24. Luigi Catuogno and Clemente Galdi
    On The Evaluation of Security Properties of Containerized Systems
    The 8th International Symposium on Cyberspace Safety and Security (CSS 2016), (Accepted)

  25. Daniel Riccio, Clemente Galdi and Rita Manzo
    Biometric/Cryptographic Keys Binding based on Function Minimization
    12th International Conference on Signal Image Technology and Internet-Based Systems, (SITIS 2016), 144-150

  26. Silvia Rossi, Francesco Barile, Clemente Galdi and Luca Russo
    Artworks Sequences Recommendations for Groups in Museums
    12th International Conference on Signal Image Technology and Internet-Based Systems, (SITIS 2016), 455-462

  27. Vincenzo Auletta, Iannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano
    Minority becomes majority in social networks
    11th International Conference on Web and Internet Economics (WINE 2015), 74-88

  28. Luigi Catuogno and Clemente Galdi
    Ensuring Application Integrity: A Survey on Techniques and Tools
    Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015

  29. Luigi Catuogno, Clemente Galdi, Giuseppe Persiano
    Guaranteeing Dependency Enforcement in Software Updates
    20th Nordic Conference on Secure IT Systems (NordSec 2015), 205-212

  30. Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro
    e-Auctions for Multi-Cloud Service Provisioning.
    11th IEEE International Conference on Services Computing (IEEE SCC 2014)35-42

  31. Joachim Biskup, Piero A. Bonatti, Clemente Galdi and Luigi Sauro.
    Optimality and Complexity of Inference-proof Data Filtering and CQE .
    19th European Symposium on Research in Computer Security, ESORICS (2) 2014: 165-181

  32. Luigi Catuogno and Clemente Galdi
    Interoperability Between Federated Authentication Systems.
    The Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2014)

  33. Luigi Catuogno and Clemente Galdi
    Towards the design of a film-based graphical password scheme.
    8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)

  34. Piero A. Bonatti, Marco Faella, Clemente Galdi and Luigi Sauro.
    Auctions for Partial Heterogeneous Preferences.
    38th International Symposium on Mathematical Foundations od Computer Science (MFCS 2013) 183-194

  35. Piero A. Bonatti, Clemente Galdi and Davide Torres.
    ERBAC: Event-Driven RBAC.
    18th ACM Symposium on Access Control Models and Technologies (SACMAT 2013) pp. 125-136

  36. Piero A. Bonatti, Marco Faella, Clemente Galdi and Luigi Sauro.
    An Integrated Formal Approach to Usage Control .
    4th IEEE International Workshop on Data Usage Management (DUMA 2013) pp.8-12

  37. Piero A. Bonatti, Marco Faella, Clemente Galdi and Luigi Sauro.
    Towards a Mechanism for Incentivating Privacy.
    16th European Symposium on Research in Computer Security (ESORICS 11) LNCS 6879, pp. 472-488. (Updated version)

  38. Luigi Catuogno and Clemente Galdi
    On the Security of a Two-Factor Authentication Scheme.
    Workshop in Information Security Theory and Practices 2010 Security and Privacy of Pervasive Systems and Smart Devices (WISTP 10), LNCS 6033, pp. 245-252.

  39. Carlo Blundo, Emiliano De Cristofaro, Clemente Galdi and Giuseppe Persiano
    Validating orchestration of web services with bpel and aggregate signatures
    In The 6th IEEE European Conference on Web Services (ECOWS 2008). p. 205-214

  40. Carlo Blundo, Emiliano De Cristofaro, Aniello Del Sorbo, Clemente Galdi and Giuseppe Persiano
    A Distributed Implementation of the Certified Information Access Service
    13th European Symposium on Research in Computer Security (ESORICS 2008), LNCS 5283, pp. 396-410.

  41. Luigi Catuogno and Clemente Galdi
    A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices
    Workshop in Information Security Theory and Practices 2008 Smart Cards, Mobile and Ubiquitous Computing Systems (WISTP 08), LNCS 5019, pp. 16-35.

  42. Aniello Del Sorbo, Clemente Galdi and Giuseppe Persiano
    Distributed Certified Information Access for Mobile Devices
    Workshop in Information Security Theory and Practices 2007 Smart Cards, Mobile and Ubiquitous Computing Systems (WISTP 07), LNCS vol. 4462, pp. 67-79.

  43. Ioannis Caragiannis, Clemente Galdi and Christos Kaklamanis
    Basic Computations in Wireless Networks
    14th International Symposium Algorithms and Computation, (ISAAC 2005), LNCS vol. 3827, pp. 533-542.

  44. Ioannis Caragiannis, Clemente Galdi and Christos Kaklamanis
    Network Load Games
    14th International Symposium Algorithms and Computation, (ISAAC 2005), LNCS vol. 3827, pp. 809-818.

  45. Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
    Design and Implementation of a Certified Email Service.
    4th International Conference Cryptology and Network Security, (CANS 2005) LNCS vol. 3810, pp. 186-199.

  46. Clemente Galdi and Raffaella Giordano
    Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol
    First International Conference Trust and Privacy in Digital Business (TrustBus 2004),
    Zaragoza, Spain, August 30 - September 1, 2004, LNCS vol. 3184, pp. 181-190.

  47. Giovanni Di Crescenzo and Clemente Galdi
    Hypergraph Decomposition and Secret Sharing.
    14th International Symposium Algorithms and Computation, (ISAAC 2003), LNCS vol. 2906, pp. 645-654.

  48. Carlo Blundo, Paolo D'Arco, Alfredo De Santis and Clemente Galdi
    Neural Networks and Proactive Password Checking
    INFRASEC 2002, Bristol (UK), October 1-3, Springer-Verlag, 2002.

  49. Carlo Blundo, Paolo D'Arco, Alfredo De Santis and Clemente Galdi.
    Hyppocrates: A new Proactive Password Checker
    Proceedings of Information Security Conference 2001, LNCS 2200, pp. 63--80
    Malaga, Spain, October 1-3, 2001

  50. Clemente Galdi and Pino Persiano.
    Private Computation over Broadcast Channel
    Proceedings of 4th International Conference on Information Security and Cryptology, 2001 (ICISC 2001), LNCS 2288, pp. 244-257.
    Seoul, Korea, December 6-7, 2001

  51. Clemente Galdi, Christos Kaklamanis, Manuela Montangero and Pino Persiano.
    Optimal and Approximate Station Placement in Networks (with applications to Multicasting and Space Efficient Traversals)
    Proceedings of 18th Annual Symposium on Theoretical Aspects of Computer Science, (STACS 2001), LNCS 2010, pp. 271-282.
    Dresden, Germany, February 15-17, 2001.

  52. Carlo Blundo and Clemente Galdi
    Steganography Using Modern Arts
    Proceedings of IFIP International Conference on Theoretical Computer Science, (IFIP TCS 2000), LNCS 1872, pp. 140-151.
    Sendai, Japan, August 17-19, 2000

  53. Carlo Blundo, Clemente Galdi and Pino Persiano.
    Randomess Recycling in Constant-Round Private Computations
    Proceedings of 13th International Symposium on Distributed Computing (DISC 99), LNC 1693, pp. 138-150