TORSEC - Security Group

The group performs research in the fields of computer and network security. It is established within the Dipartimento di Automatica e Informatica of the Politecnico di Torino. The group's activity is mainly concerned with - but not restricted to - the following topics:

  • Computer security (trusted and trustworthy computing, platform and data privacy)
  • Electronic identity, user authentication/authorization and identity management
  • Design and optimization of network shields (by means of firewalls and secure channels, such as VPN or TLS/SSL)
  • Electronic commerce (Internet and mobile payment systems) 
  • System security (risk analysis, security planning and audit, intrusion detection and tracing, forensics analysis)

Projects and publications

  • Selected funded research projects
    • INTELLIGENT TRUST AND SECURITY ORCHESTRATION FOR 6G DISTRIBUTED CLOUD ENVIRONMENTS
      LIOY ANTONIO
      2024 - 2026 (Current)
    • QUANTUM-ORIENTED UPDATE TO BROWSERS AND INFRASTRUCTURES FOR THE PQ TRANSITION
      LIOY ANTONIO
      2023 - 2026 (Current)
    • SECURITY AND RIGHTS IN THE CYBERSPACE (SERICS) – SPOKE 8
      LIOY ANTONIO
      2023 - 2025 (Current)
    • SUPERVISIONE ALLE ATTIVITÀ DI RICERCA PER LA PROGETTAZIONE E REALIZZAZIONE DI STRUMENTI PER LA VERIFICA AUTOMATICA DI RESILIENZA AGLI ATTACCHI CYBER IN AMBITO AUTOMOTIVE
      BASILE CATALDO
      2024 - 2024 (Current)
    • VALUTAZIONE DEL SISTEMA DI BIGLIETTERA OVERTICKET
      LIOY ANTONIO
      2024 - 2024 (Current)
    • SPIRS - SECURE PLATFORM FOR ICT SYSTEMS ROOTED AT THE SILICON MANUFACTURING PROCESS
      LIOY ANTONIO
      2021 - 2024 (Current)
    • A COORDINATED FRAMEWORK FOR CYBER RESILIENT SUPPLY CHAIN SYSTEMS OVER COMPLEX ICT INFRASTRUCTURES
      LIOY ANTONIO
      2020 - 2023 (Current)
    • SUPERVISIONE ALLE ATTIVITÀ DI RICERCA PER LA PROGETTAZIONE E REALIZZAZIONE DI STRUMENTI PER IL SELF-ASSESSMENT DI COMPLIANCE CON STANDARD AVANZATI PER LA CYBERSECURITY DI SISTEMI AUTOMOTIVE (ISO-21434 E UN-ECE WP29)
      BASILE CATALDO
      2021 - (Current)
    • TETRACO - TECNOLOGIE PER TRADING E CONSUMO DI CONTENUTI
      LIOY ANTONIO
      2009 - (Current)
    • SUPERVISIONE ALLE ATTIVITÀ DI RICERCA PER LA PROGETTAZIONE E REALIZZAZIONE DI STRUMENTI PER LA VERIFICA AUTOMATICA DI RESILIENZA AGLI ATTACCHI CYBER IN AMBITO AUTOMOTIVE
      BASILE CATALDO
      2023 - 2024 (Completed)
    • GESTIONE, VALUTAZIONE E PREVISIONE DEI RISCHI AZIENDALI LEGATI ALLA CYBERSECURITY
      BASILE CATALDO
      2022 - 2023 (Completed)
    • VALUTAZIONE DEL SISTEMA DI BIGLIETTERIA ‘EILO’ AL FINE DI OTTENERNE LA CERTIFICAZIONE AI SENSI DELLA NORMATIVA VIGENTE
      LIOY ANTONIO
      2022 - 2023 (Completed)
    • PRACTICAL AUTONOMOUS CYBERHEALTH FOR RESILIENT SMES & MICROENTERPRISES
      LIOY ANTONIO
      2020 - 2023 (Completed)
    • VALUTAZIONE DEL SISTEMA DI BIGLIETTERIA PERSEO DI PGMR ITALIA SRL AL FINE DI OTTENERNE LA CERTIFICAZIONE AI SENSI DELLA NORMATIVA VIGENTE
      LIOY ANTONIO
      2022 - 2022 (Completed)
    • CYBER SECURITY NETWORK OF COMPETENCE CENTRES FOR EUROPE
      LIOY ANTONIO, MANTELERO ALESSANDRO
      2019 - 2022 (Completed)
    • ANALISI SULL’ADEGUATEZZA DELLA SICUREZZA INFORMATICA DELL’ARCHITETTURA CED DELL’ATC
      LIOY ANTONIO
      2021 - 2021 (Completed)
    • MODELLI E METODI PER LA VALUTAZIONE DELLA RESILIENZA AD ATTACCHI CYBER DEI DISPOSITIVI AUTOMOTIVE CONNESSI
      BASILE CATALDO, LIOY ANTONIO
      2020 - 2021 (Completed)
    • ALGORITMI PER L’ANALISI DI PATTERN RICORRENTI E PER LA PREVISIONE DI ATTACCHI CIBERNETICI
      LIOY ANTONIO
      2020 - 2021 (Completed)
    • HIERARCHICAL OPEN MANUFACTURING EUROPE
      CHIABERT PAOLO, LIOY ANTONIO
      2018 - 2021 (Completed)
    • CERTIFICAZIONE DEL SISTEMA DI BIGLIETTERIA MIMS AI SENSI DELLA NORMATIVA VIGENTE
      LIOY ANTONIO
      2020 - 2020 (Completed)
    • VERIFICAZIONE TECNICA PROPOSTA DALLA SOCIETÀ MODIMAR S.R.L. CONTRO IL COMUNE DI SCILLA, NEI CONFRONTI DELLA SOCIETÀ DINAMICA S.R.L., PER L’ANNULLAMENTO, PREVIA SOSPENSIONE DELL’EFFICACIA, DEL PROVVEDIMENTO CON CUI È STATA COMUNICATA LA NON AMMISSIONE DEL COSTITUENDO RAGGRUPPAMENTO TEMPORANEO DI PROFESSIONISTI, COMPOSTO ANCHE DALLA SOCIETÀ MODIMAR S.R.L., IN RELAZIONE ALLA PROCEDURA APERTA TELEMATICA PER L’AFFIDAMENTO DEL SERVIZIO DI PROGETTAZIONE DEFINITIVA ED ESECUTIVA, COORDINAMENTO DELLA SICUREZZA IN FASE DI PROGETTAZIONE, DIREZIONE LAVORI E COORDINAMENTO DELLA SICUREZZA IN FASE DI ESECUZIONE, PER I LAVORI DI “AMMODERNAMENTO DEL PORTO DI SCILLA E DELLE INFRASTRUTTURE DI COLLEGAMENTO”.
      LIOY ANTONIO
      2020 - 2020 (Completed)
    • DIGITAL TRANSFORMATION - IOT E BLOCKCHAIN
      LIOY ANTONIO
      2020 - 2020 (Completed)
    • DEEP-AUGUR 2
      LIOY ANTONIO
      2019 - 2019 (Completed)
    • EID FOR UNIVERSITY
      LIOY ANTONIO
      2018 - 2019 (Completed)
    • PROGETTAZIONE DI UN SISTEMA INFORMATIZZATO PER LA GESTIONE INTEGRATA DELLA PRODUZIONE DALLA PRESA IN CARICO DELLE MATERIE PRIME ALLA TRACCIABILITÀ DEL PRODOTTO FINITO CON FUNZIONALITÀ DI SUPPORTO ALLE DECISIONI E PROTEZIONE DEI DATI RACCOLTI ED ANALIZZATI
      LIOY ANTONIO
      2018 - 2019 (Completed)
    • DEVELOPMENT OF AN EIDAS-OPENNCP CONNECTOR FOR CROSS BORDER EHEALTH
      LIOY ANTONIO
      2018 - 2019 (Completed)
    • FICEP – FIRST ITALIAN CROSSBOARD EIDAS PROXY
      LIOY ANTONIO
      2016 - 2019 (Completed)
    • SECURING AGAINST INTRUDERS AND OTHER THREATS THROUGH A NFV-ENABLED ENVIRONMEN
      LIOY ANTONIO
      2016 - 2019 (Completed)
    • FIRST ITALIAN CROSSBORDER EIDAS PROXY
      LIOY ANTONIO
      2016 - 2019 (Completed)
    • CERTIFICAZIONE AI SENSI DELLA NORMATIVA VIGENTE DEL SISTEMA AUTENTIQUBO 3.0
      LIOY ANTONIO
      2018 - 2018 (Completed)
    • DEEP-AUGUR
      LIOY ANTONIO
      2018 - 2018 (Completed)
    • ARCHITETTURE DEI SERVER E DELLO STORAGE (SOFTWARE DEFINED DATA CENTER); ARCHITETTURE DI RETE (SOFTWARE DEFINED NETWORKS); INFRASTRUTTURE CONVERGENTI; TECNOLOGIE DI VIRTUALIZZAZIONE E CONTAINER PER I SISTEMI OPERATIVI (MICROSOFT, LINUX, SOLARIS); TECNOLOGIA DEI MICROSERVIZI; CLOUD COMPUTING PER I SERVIZI INTERNI (OPENSTACK)”.
      LIOY ANTONIO
      2017 - 2018 (Completed)
    • CERTIFICAZIONE FIRMWARE DI MISURATORI FISCALI OLIVETTI DAL PUNTO DI VISTA DELLA CONFORMITÀ ALLE NORMATIVE MINISTERIALI VIGENTI IN MATERIA DI SICUREZZA FISCALE
      LIOY ANTONIO
      2017 - 2017 (Completed)
    • ANALISI DEL CAPITOLATO TECNICO DI GARA PER LA FORNITURA DEL SISTEMA INFORMATIVO DI GESTIONE DELLA FISCALITÀ LOCALE DI SORIS S.P.A
      MEZZALAMA MARCO
      2017 - 2017 (Completed)
    • ASPIRE -ADVANCED SOFTWARE PROTECTION: INTEGRATION, RESEARCH AND EXPLOITATION
      LIOY ANTONIO
      2013 - 2016 (Completed)
    • TENACE - PROTEZIONE DELLE INFRASTRUTTURE CRITICHE NAZIONALI DA MINACCE CIBERNETICHE
      LIOY ANTONIO
      2013 - 2016 (Completed)
    • FIDES - HIGH IMPACT INITIATIVE
      LIOY ANTONIO
      2015 - 2015 (Completed)
    • SECURED -SECURITY AT THE NETWORK EDGE
      LIOY ANTONIO
      2013 - 2015 (Completed)
    • STORK2 - SECURE IDENTITY ACROSS BORDERS LINKED
      LIOY ANTONIO
      2012 - 2015 (Completed)
    • CLIPS-CLOUD APPROACH FOR INNOVATION IN PUBLIC SERVICE
      LIOY ANTONIO, PAOLUCCI EMILIO
      2014 - 2014 (Completed)
    • EIT ICT LABS PGA 2014
      LIOY ANTONIO, LOMBARDI PATRIZIA
      2014 - 2014 (Completed)
    • VALUTAZIONE DELL'ARCHITETTURA DI SICUREZZA DEL SISTEMA SCOONTRI-NO
      LIOY ANTONIO
      2013 - 2014 (Completed)
    • CERTIFICAZIONE DEL SISTEMA DI BIGLIETTERIA ELETTRONICO 18 TICKETS
      LIOY ANTONIO
      2013 - 2013 (Completed)
    • ANALISI DELLA SICUREZZA DEL CHIP E DEL PIN NELLE CARTE DI PAGAMENTO BANCOMAT E PAGO BANCOMAT
      LIOY ANTONIO
      2012 - 2013 (Completed)
    • WEBINOS-SECURE WEBOS APPLICATION DELIVERY ENVIRONMENT
      LIOY ANTONIO
      2010 - 2013 (Completed)
    • TCLOUDS- TRUSTWORTHY CLOUDS - PRIVACY AND RESILIENCE FOT INTERNET-SCALE CRITICAL INFRASTRUCTURE
      LIOY ANTONIO
      2010 - 2013 (Completed)
    • POSECCO-POLICY AND SECURITY CONFIGURATION MANAGEMENT
      LIOY ANTONIO
      2010 - 2013 (Completed)
    • CERTIFICAZIONE (VARIANTE) AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI DI SKIDATA...
      LIOY ANTONIO
      2012 - 2012 (Completed)
    • PERIZIA STRAGIUDIZIALE DI CONGRUITÀ COSTI E FUNZIONALITÀ DEL PROGETTO MOGHI
      LIOY ANTONIO
      2012 - 2012 (Completed)
    • ANALISI DELLA SICUREZZA DEL PIN NELLE CARTE DI PAGAMENTO ELETTRONICHE
      LIOY ANTONIO
      2011 - 2012 (Completed)
    • CERTIFICAZIONE (INTEGRAZIONE) AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI DI SKIDATA
      LIOY ANTONIO
      2011 - 2011 (Completed)
    • COORDINAMENTO COMMISSIONE TECNICA DELLE PROPOSTE PROGETTUALI E ARMONIZZZAZIONE VALUTAZIONI PER IL BANDO TECNOLOGIE SMART ....
      MEZZALAMA MARCO
      2011 - 2011 (Completed)
    • CERTIFICAZIONE (VARIANTE AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI ....
      LIOY ANTONIO
      2011 - 2011 (Completed)
    • VALUTAZIONE PRELIMINARE DEL SISTEMA INFORMATIVO AZIENDALE
      MEZZALAMA MARCO
      2010 - 2010 (Completed)
    • CERTIFICAZIONE AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA DI BIGLIETTERIA AUTOMATIZZATA WINTIC -JDK VE.2.0
      LIOY ANTONIO
      2010 - 2010 (Completed)
    • CERTIFICAZIONE AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI DI SKIDATA
      LIOY ANTONIO
      2009 - 2009 (Completed)
    • DESEREC - DEPENDABLE SECURITY BY ENHANCED RECONFIGURABILITY
      LIOY ANTONIO
      2006 - 2009 (Completed)
    • OPEN_TC - OPEN TRUSTED COMPUTING
      LIOY ANTONIO
      2005 - 2009 (Completed)
    • STORK-SECURE IDENTITY ACROSS BORDERS LINKED
      LIOY ANTONIO, OREGLIA MARCO
      2008 - 2008 (Completed)
    • ANTICIPANDO GALILEO: PRODOTTI E SERVIZI A SUPPORTO DELLA MOBILITÀ E DELLA SICUREZZA (GAL.PMI)
      DALLA CHIARA BRUNO, DOVIS FABIO, LIOY ANTONIO, MALNATI GIOVANNI, MANZINO AMBROGIO
      2006 - 2008 (Completed)
    • OTTIMIZZAZIONE DI UNA PIATTAFORMA TELEMATICA ESSENZIALE ED APERTA A NUOVI SERVIZI APPLICATA ALLA GESTIONE TELEMATICA DEGLI ACCESSI E DELLA DOMANDA DI TRASPORTO INDIVIDUALE IN AMBITO URBANO - OPENGATE
      LIOY ANTONIO, MORISIO MAURIZIO
      2006 - 2008 (Completed)
    • MESHADPTIVE HOME WIRELENESS NETS - MEADOW
      AJMONE MARSAN MARCO GIUSEPPE, BALDI MARIO, LIOY ANTONIO, OLMO GABRIELLA
      2005 - 2008 (Completed)
    • ANALISI DELLE SOLUZIONI DIMS - DYNAMIC INTELLIGENCE MANAGEMENT SYSTEM E DIGIPROBE
      MEZZALAMA MARCO
      2007 - 2007 (Completed)
    • POSITIF - POLICY-BASED SECURITY TOOLS AND FRAMEWORK
      LIOY ANTONIO
      2004 - 2007 (Completed)
    • NASTEC-BUILDING TRUST IN NETWORKING IN NEWLY ASSOCIATED STATES THROUGH THE USE OF SECURE INFORMATION SOCIETY TECHNOLOGIES
      LIOY ANTONIO
      2001 - 2003 (Completed)
    • SICUREZZA DEI SISTEMI DISTRIBUITI
      LIOY ANTONIO
      1998 - 2000 (Completed)
  • Selected recent publications
    At press time
    1. Fighting TLS Attacks: an Autoencoder-based Model for Heartbleed Attack Detection
      Proceeding

      Berbecaru, Diana; Giannuzzi, Stefano
      In: Intelligent Distributed Computing XVI: 16th International Symposium on Intelligent Distributed Computing, IDC 2023
      Springer Nature Switzerland AG
      The 16th International Symposium on Intelligent Distributed Computing (Hamburg, Germany) 13 - 15 September 2023

    2. Integrity Management in Softwarized Networks
      Proceeding

      Bravi, Enrico; Lioy, Antonio; Berbecaru, DIANA GRATIELA
      In: IEEE/IFIP Network Operations and Management Symposium
      IEEE
      IEEE/IFIP Network Operations and Management Symposium (Seoul (South Korea)) June 6-10, 2024
      pp.7

    2024
    1. Security at the Edge for Resource-Limited IoT Devices
      Article

      Canavese, Daniele; Mannella, Luca; Regano, Leonardo; Basile, Cataldo
      SENSORS
      Multidisciplinary Digital Publishing Institute (MDPI)
      Vol.24 pp.16 (pp.1-16) ISSN:1424-8220 DOI:10.3390/s24020590

    2. A novel architecture to virtualise a hardware-bound trusted platform module
      Article

      DE BENEDICTIS, Marco; Jacquin, Ludovic; Pedone, Ignazio; Atzeni, Andrea; Lioy, Antonio
      FUTURE GENERATION COMPUTER SYSTEMS
      Elsevier
      Vol.150 pp.16 (pp.21-36) ISSN:0167-739X DOI:10.1016/j.future.2023.08.012

    2023
    1. A Model for Automated Cybersecurity Threat Remediation and Sharing
      Proceeding

      Settanni, F; Regano, L; Basile, C; Lioy, A
      In: NetSoft-2023 - 9th IEEE International Conference on Network Softwarization
      IEEE
      2023 IEEE 9th International Conference on Network Softwarization (NetSoft) (Madrid (Spain)) June 19-23, 2023
      pp.6 (pp.492-497) ISBN:9798350399806 DOI:10.1109/NetSoft57336.2023.10175486

    2. A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures
      Proceeding

      Bravi, Enrico; Berbecaru, Diana; Lioy, Antonio
      In: 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
      IEEE
      IEEE CloudCom2023: 14th IEEE International Conference on Cloud Computing Technology and Science‍ (Naples (ITA)) 4-6 December 2023
      pp.8 (pp.91-98) ISBN:9798350339826 DOI:10.1109/CloudCom59040.2023.00027

    3. Autoencoder-SAD: An Autoencoder-based Model for Security Attacks Detection
      Proceeding

      Berbecaru, Diana Gratiela; Giannuzzi, Stefano; Canavese, Daniele
      In: 28th IEEE Symposium on Computers and Communications (IEEE ISCC 2023)
      IEEE
      28th IEEE Symposium on Computers and Communications (IEEE ISCC 2023) (Gammarth (TUN)) 9-12 July 2023
      pp.6 (pp.758-763) ISBN:9798350300482 DOI:10.1109/ISCC58397.2023.10217930

    4. Exploiting Emercoin Blockchain and Trusted Computing for IoT Scenarios: A Practical Approach
      Proceeding

      Berbecaru, Diana Gratiela; Pintaldi, Lorenzo
      In: 28th IEEE Symposium on Computers and Communications (IEEE ISCC 2023)
      IEEE
      28th IEEE Symposium on Computers and Communications (IEEE ISCC 2023) (Gammarth (TUN)) 9-12 July 2023
      pp.6 (pp.771-776) ISBN:9798350300482 DOI:10.1109/ISCC58397.2023.10217961

    5. Exploiting the DICE specification to ensure strong identity and integrity of IoT devices
      Proceeding

      Bravi, Enrico; Sisinni, Silvia; Lioy, Antonio
      In: SpliTech-2023: 8th International Conference on Smart and Sustainable Technologies
      IEEE
      SpliTech-2023: 8th International Conference on Smart and Sustainable Technologies (Split-Bol (Croatia)) 20-23 June 2023
      pp.6 (pp.1-6) ISBN:9789532901283 DOI:10.23919/SpliTech58164.2023.10193517

    6. An expert system for automatic cyber risk assessment and its AI-based improvements
      Proceeding

      Gatti, Gabriele; Basile, Cataldo; Perboli, Guido
      In: Proceedings of 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)
      IEEE
      2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (Turin (Italy)) 26-30 June 2023
      pp.7 (pp.1434-1440) ISBN:9798350326970 DOI:10.1109/COMPSAC57700.2023.00220

    7. An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem
      Article

      Berbecaru, Diana Gratiela; Lioy, Antonio
      IEEE ACCESS
      IEEE
      Vol.11 pp.20 (pp.79156-79175) ISSN:2169-3536 DOI:10.1109/ACCESS.2023.3299357

    8. Computer-Aided Reverse Engineering of Protected Software
      Proceeding

      Canavese, Daniele; Regano, Leonardo; Lioy, Antonio
      COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
      In: Digital Sovereignty in Cyber Security: New Challenges in Future Vision
      Springer
      First International Workshop, CyberSec4Europe 2022 (Venice (IT)) April 17–21, 2022
      Vol.1807 pp.13 (pp.3-15) ISSN:1865-0929 ISBN:9783031360954 DOI:10.1007/978-3-031-36096-1_1

    9. Mitigating Software Integrity Attacks with Trusted Computing in a Time Distribution Network
      Article

      Berbecaru, DIANA GRATIELA; Sisinni, Silvia; Lioy, Antonio; Rat, Benoit; Margaria, Davide; Vesco, ANDREA GUIDO ANTONIO
      IEEE ACCESS
      IEEE
      Vol.11 pp.18 (pp.50510-50527) ISSN:2169-3536 DOI:10.1109/ACCESS.2023.3276476

    10. TLS-Monitor: A Monitor for TLS Attacks
      Proceeding

      Berbecaru, Diana Gratiela; Petraglia, Giuseppe
      In: 2023 IEEE Consumer Communications & Networking Conference (2023)
      Institute of Electrical and Electronics Engineers Inc
      2023 IEEE Consumer Communications & Networking Conference (2023) (Las Vegas (USA)) 8 - 11 January 2023
      pp.6 (pp.1-6) ISBN:9781665497343 DOI:10.1109/CCNC51644.2023.10059989

    2022
    1. Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
      Article

      Canavese, D.; Regano, L.; Basile, C.; Ciravegna, G.; Lioy, A.
      COMPUTERS & ELECTRICAL ENGINEERING
      PERGAMON-ELSEVIER SCIENCE
      Vol.97 pp.11 ISSN:0045-7906 DOI:10.1016/j.compeleceng.2021.107621

    2. Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030
      Article

      Contreras, Luis M.; Serrano, Javier; Mamatas, Lefteris; Bernini, Giacomo; Monti, Paolo; Antunes, Mario; Atmojo, Udayanto; Tocker, Eli; Val, Iñaki; Sgambelluri, Andrea; Härri, Jérôme; Lioy, Antonio; Martinez-Julia, Pedro; González, José; Sánchez-Garrido, Jorge; Asaeda, Hitoshi
      ITU JOURNAL
      International Telecommunication Union
      Vol.3 pp.17 (pp.693-709) ISSN:2616-8375 DOI:10.52953/SAMO3073

    3. PALANTIR: Zero-trust architecture for Managed Security Service Provider
      Proceeding

      Compastié, Maxime; Sisinni, Silvia; Gurung, Supreshna; Fernández, Carolina; Jacquin, Ludovic; Mlakar, Izidor; Šafran, Valentino; Lioy, Antonio; Pedone, Ignazio
      CEUR WORKSHOP PROCEEDINGS
      In: C&ESAR’22: Computer & Electronics Security Application Rendezvous
      CEUR Workshop Proceedings (CEUR-WS.org)
      C&ESAR’22: Computer & Electronics Security Application Rendezvous (Rennes (France)) 15-16/11/2022
      pp.16 (pp.83-98) ISSN:1613-0073

    4. An Integrated Framework to Support Bachelor Design Students in 3-D Modeling
      Article

      Sanna, Andrea; Manuri, Federico; DE PACE, Francesco; Valpreda, Fabrizio; Fornaro, Claudio
      IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES
      IEEE
      Vol.15 pp.12 (pp.673-684) ISSN:1939-1382 DOI:10.1109/TLT.2022.3215208

    5. PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments
      Proceeding

      Fernández, Carolina; Sanvito, Davide; Kompougias, Orestis; ˇ Safran, Valentino; Compastié, Maxime; Pedone, Ignazio; López Martínez, Antonio; Gil Pérez, Manuel; Kourtis, Akis; Xylouris, George; Mlakar, Izidor; Tsarsitalidis, Stylianos; Klonidis, Dimitrios; Canavese, Daniele; Logothetis, Vangelis; Lopez, Diego; Pastor, Antonio; Lioy, Antonio; Jacquin, Ludovic; Gurung, Supreshna; Bifulco, Roberto; Priovolos, Athanasios; Balampanis, Ilias; Rokkas, Theodoros; Papadakis, Nikolaos; Paraschos, Dimitris; Jeran, Primoz; Athanasiou, George; Papadopoulos, Dimitris
      In: MeditCom-2022 Proceedings
      IEEE
      2022 IEEE International Mediterranean Conference on Communications and Networking (Athens (Greece)) 05-08 September 2022
      pp.4 (pp.82-85) DOI:10.1109/MeditCom55741.2022.9928648

    6. Using MACsec to protect a Network Functions Virtualisation Infrastructure
      Proceeding

      Lioy, Antonio; Pedone, Ignazio; Sisinni, Silvia
      In: ISCC-2022 Proceedings
      IEEE
      27th IEEE Symposium on Computers and Communications (Rhodes (Greece)) 30/6-3/7/2022
      pp.3 (pp.1-3) DOI:10.1109/ISCC55528.2022.9912955

    7. Counteracting software integrity attacks on IoT devices with remote attestation: a prototype
      Proceeding

      Berbecaru, DIANA GRATIELA; Sisinni, Silvia
      ... INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING.
      In: 2022 26th International Conference on System Theory, Control and Computing, ICSTCC 2022 - Proceedings
      IEEE
      2022 26th International Conference on System Theory, Control and Computing (ICSTCC) (Sinaia (Romania)) 19 - 21 October, 2022
      pp.6 (pp.380-385) ISSN:2372-1618 ISBN:9781665467469 DOI:10.1109/ICSTCC55426.2022.9931765

    8. A model of capabilities of Network Security Functions
      Proceeding

      Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A.
      In: NetSoft-2022 Proceedings
      IEEE
      2022 IEEE 8th International Conference on Network Softwarization (Milano (Italy)) 27 June - 1 July 2022
      pp.6 (pp.474-479) ISBN:9781665406949 DOI:10.1109/NetSoft54395.2022.9844057

    9. Quantum Key Distribution in Kubernetes Clusters
      Article

      Pedone, Ignazio; Lioy, Antonio
      FUTURE INTERNET
      MDPI
      Vol.14 pp.19 ISSN:1999-5903 DOI:10.3390/fi14060160

    10. Integrity Verification of Distributed Nodes in Critical Infrastructures
      Article

      Sisinni, Silvia; Margaria, Davide; Pedone, Ignazio; Lioy, Antonio; Vesco, ANDREA GUIDO ANTONIO
      SENSORS
      MDPI
      Vol.22 pp.23 ISSN:1424-8220 DOI:10.3390/s22186950

    11. Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions
      Proceeding

      Berbecaru, Diana Gratiela; Lioy, Antonio
      STUDIES IN COMPUTATIONAL INTELLIGENCE
      In: Intelligent Distributed Computing XIV
      Springer, Cham
      2021 International Symposium on Intelligent and Distributed Computing (IDC 2021) 16 - 18 September 2021
      Vol.1026 pp.11 (pp.203-213) ISSN:1860-949X ISBN:9783030966263 DOI:10.1007/978-3-030-96627-0_19

    12. Data set and machine learning models for the classification of network traffic originators
      Article

      Canavese, D.; Regano, L.; Basile, C.; Ciravegna, G.; Lioy, A.
      DATA IN BRIEF
      Elsevier Inc.
      Vol.41 pp.24 ISSN:2352-3409 DOI:10.1016/j.dib.2022.107968

    13. Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
      Article

      Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio
      COMPUTERS & ELECTRICAL ENGINEERING
      Elsevier Ltd
      Vol.97 pp.11 ISSN:0045-7906 DOI:10.1016/j.compeleceng.2021.107621

    14. Toward Cybersecurity Personalization in Smart Homes
      Article

      Bringhenti, Daniele; Valenza, Fulvio; Basile, Cataldo
      IEEE SECURITY & PRIVACY
      IEEE
      Vol.20 pp.9 (pp.45-53) ISSN:1540-7993 DOI:10.1109/MSEC.2021.3117471

    2021
    1. Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises
      Proceeding

      Mantas, E.; Papadopoulos, D.; Fernandez, C.; Ortiz, N.; Compastie, M.; Martinez, A. L.; Perez, M. G.; Kourtis, A.; Xylouris, G.; Mlakar, I.; Tsarsitalidis, S.; Klonidis, D.; Pedone, I.; Canavese, D.; Perez, G. M.; Sanvito, D.; Logothetis, V.; Lopez, D.; Pastor, A.; Lioy, A.; Jacquin, L.; Bifulco, R.; Kapodistria, A.; Priovolos, A.; Gardikis, G.; Neokosmidis, I.; Rokkas, T.; Papadakis, N.; Paraschos, D.; Jeran, P.; Litke, A.; Athanasiou, G.
      In: MeditCom-2021 Proceedings
      IEEE
      2021 IEEE International Mediterranean Conference on Communications and Networking (Athens (Greece)) 7-10 September 2021
      pp.6 (pp.500-505) ISBN:9781665445054 DOI:10.1109/MeditCom49071.2021.9647609

    2. Verification of X.509 Attribute Certificates for Attribute-based Authorization: A Practical Approach
      Proceeding

      Berbecaru, D.
      In: 2021 25th International Conference on System Theory, Control and Computing, ICSTCC 2021 - Proceedings
      Institute of Electrical and Electronics Engineers Inc.
      25th International Conference on System Theory, Control and Computing, ICSTCC 2021 (Iași (Romania)) October 20 – 23, 2021
      pp.6 (pp.346-351) ISBN:9781665414968 DOI:10.1109/ICSTCC52150.2021.9607273

    3. On enabling additional natural person and domain-specific attributes in the eIDAS network
      Article

      Berbecaru, Diana Gratiela; Lioy, Antonio; Cameroni, Cesare
      IEEE ACCESS
      IEEE
      Vol.9 pp.26 (pp.134096-134121) ISSN:2169-3536 DOI:10.1109/ACCESS.2021.3115853

    4. Towards a complete software stack to integrate Quantum Key Distribution in a cloud environment
      Article

      Pedone, I.; Atzeni, A.; Canavese, D.; Lioy, A.
      IEEE ACCESS
      Institute of Electrical and Electronics Engineers Inc.
      Vol.9 pp.22 (pp.115270-115291) ISSN:2169-3536 DOI:10.1109/ACCESS.2021.3102313

    5. Cybersecurity in ICT supply chains: key challenges and a relevant architecture
      Article

      Masip-Bruin, X.; Marin-Tordera, E.; Ruiz, J.; Jukan, A.; Trakadas, P.; Cernivec, A.; Lioy, A.; Lopez, D.; Santos, H.; Gonos, A.; Silva, A.; Soriano, J.; Kalogiannis, G.
      SENSORS
      MDPI
      Vol.21 pp.24 ISSN:1424-8220 DOI:10.3390/s21186057

    6. Satellite-derived Time for Enhanced Telecom Networks Synchronization: the ROOT Project
      Proceeding

      Pini, Marco; Minetto, Alex; Vesco, Andrea; Berbecaru, DIANA GRATIELA; Miguel Contreras Murillo, Luis; Nemry, Pierre; De Francesca, Ivan; Rat, Benoit; Callewaert, Krel
      In: Proceedings of 2021 IEEE 8th International Workshop on Metrology for AeroSpace (MetroAeroSpace)
      Institute of Electrical and Electronics Engineers (IEEE) (STATI UNITI D'AMERICA)
      2021 IEEE 8th International Workshop on Metrology for AeroSpace (MetroAeroSpace 2021) (Naples (Italy)) June 23 - 25, 2021
      pp.6 (pp.288-293) ISBN:9781728175560 DOI:10.1109/MetroAeroSpace51421.2021.9511780

    2020
    1. ATEMA: An attribute enablement module for attribute retrieval and transfer through the eIDAS Network
      Proceeding

      Berbecaru, Diana; Cameroni, Cesare
      In: 2020 24th International Conference on System Theory, Control and Computing (ICSTCC)
      Institute of Electrical and Electronics Engineers (IEEE) Computer Society
      2020 24th International Conference on System Theory, Control and Computing (ICSTCC) (Sinaia, Romania) 8-10 October 2020
      pp.8 (pp.532-539) ISBN:9781728198095 DOI:10.1109/ICSTCC50638.2020.9259642

    2. Supporting authorize-then-authenticate for wi-fi access based on an electronic identity infrastructure
      Article

      Berbecaru, D.; Lioy, A.; Cameroni, C.
      JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS
      Innovative Information Science and Technology Research Group
      Vol.11 pp.21 (pp.34-54) ISSN:2093-5374 DOI:10.22667/JOWUA.2020.06.30.034

    3. Trusted Computing technology and proposals for resolving cloud computing security problems
      Book chapter

      Pedone, Ignazio; Canavese, Daniele; Lioy, Antonio
      Cloud computing security - Foundations and challenges
      CRC Press (STATI UNITI D'AMERICA)
      pp.14 ISBN:9780429055126

    4. Detection of encrypted cryptomining malware connections with machine and deep learning
      Article

      Pastor, Antonio; Mozo, Alberto; Vakaruk, Stanislav; Canavese, Daniele; Lopez, Diego R.; Regano, Leonardo; Gomez-Canaval, Sandra; Lioy, Antonio
      IEEE ACCESS
      IEEE
      Vol.8 pp.20 (pp.158036-158055) ISSN:2169-3536 DOI:10.1109/access.2020.3019658

    5. Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach
      Article

      Berbecaru, Diana Gratiela; Lioy, Antonio; Cameroni, Cesare
      IEEE ACCESS
      Institute of Electrical and Electronics Engineers Computer Society
      Vol.8 pp.15 (pp.126186-126200) ISSN:2169-3536 DOI:10.1109/ACCESS.2020.3007998

    6. Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure
      Proceeding

      Berbecaru, Diana; Lioy, Antonio; Cameroni, Cesare
      STUDIES IN COMPUTATIONAL INTELLIGENCE
      In: Intelligent Distributed Computing XIII
      Springer
      International Symposium on Intelligent and Distributed Computing (IDC 2019) (Saint-Petersburg (RUS)) 7- 9 Oct. 2019
      Vol.868 pp.10 (pp.313-322) ISSN:1860-949X ISBN:9783030322571 DOI:10.1007/978-3-030-32258-8_37

    7. Empirical assessment of the effort needed to attack programs protected with client/server code splitting
      Article

      Viticchie, A.; Regano, L.; Basile, C.; Torchiano, M.; Ceccato, M.; Tonella, P.
      EMPIRICAL SOFTWARE ENGINEERING
      Springer
      Vol.25 pp.48 (pp.1-48) ISSN:1382-3256 DOI:10.1007/s10664-019-09738-1

    8. Towards a secure and lightweight Network Function Virtualisation environment
      Article

      De Benedictis, M.; Lioy, A.; Smiraglia, P.
      INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING
      Inderscience
      Vol.11 pp.10 (pp.243-252) ISSN:1741-847X DOI:10.1504/IJGUC.2020.105539

    9. The Rise of Android Banking Trojans
      Article

      Atzeni, Andrea; Dıaz, Fernando; Lopez, Francisco; Marcelli, Andrea; Sanchez, Antonio; Squillero, Giovanni
      IEEE POTENTIALS
      IEEE
      Vol.39 pp.6 (pp.13-18) ISSN:0278-6648 DOI:10.1109/MPOT.2019.2904744

    2019
    1. Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions
      Article

      Pedone, Ignazio; Lioy, Antonio; Valenza, Fulvio
      SECURITY AND COMMUNICATION NETWORKS
      Hindawi
      Vol.2019 pp.11 (pp.1-11) ISSN:1939-0114 DOI:10.1155/2019/2425983

    2. Electronic identification for universities: Building cross-border services based on the eIDAS infrastructure
      Article

      Berbecaru, D.; Lioy, A.; Cameroni, C.
      INFORMATION
      MDPI AG
      Vol.10 pp.17 ISSN:2078-2489 DOI:10.3390/info10060210

    3. Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps
      Article

      Berbecaru, D.; Lioy, A.; Cameroni, C.
      SOFTWARE-PRACTICE & EXPERIENCE
      John Wiley and Sons Ltd
      Vol.49 pp.20 (pp.1643-1662) ISSN:0038-0644 DOI:10.1002/spe.2738

    4. A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure
      Proceeding

      De Benedictis, M.; Lioy, A.
      In: IEEE NetSoft 2019 - 1st Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-Defined and Virtualized Infrastructures (SecSoft
      IEEE
      IEEE Conference on Network Softwarization (NetSoft-2019) (Paris (France)) 24/6/2019
      pp.9 (pp.1-9) DOI:10.1109/NETSOFT.2019.8806655

    5. VR@Polito: the virtual reality initiative of Politecnico di Torino – the experience of the Virtual tour for foreign students
      Proceeding

      Castaldo, U.; Conti, Filippo; Lamberti, F.; Mezzalama, M.; Venuto, E.
      In: Atti Convegno Nazionale DIDAMATiCA 2019
      AICA - Associazione Italiana per l'Informatica ed il Calcolo Automatico (ITALIA)
      BYOD, realtà aumentata e virtuale: opportunità o minaccia per la formazione? (Reggio Calabria) 16-17 maggio 2019
      pp.4 (pp.63-66) ISBN:9788898091508

    6. Integrity verification of Docker containers for a lightweight cloud environment
      Article

      DE BENEDICTIS, Marco; Lioy, Antonio
      FUTURE GENERATION COMPUTER SYSTEMS
      Elsevier
      Vol.97 pp.11 (pp.236-246) ISSN:0167-739X DOI:10.1016/j.future.2019.02.026

    7. Adding Support for Automatic Enforcement of Security Policies in NFV Networks
      Article

      Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio; Lopez, Diego R.; Pastor Perales, Antonio
      IEEE-ACM TRANSACTIONS ON NETWORKING
      IEEE/ACM
      Vol.27 pp.14 (pp.707-720) ISSN:1063-6692 DOI:10.1109/TNET.2019.2895278

    8. A meta-model for software protections and reverse engineering attacks
      Article

      Basile, Cataldo; Canavese, Daniele; Regano, Leonardo; Falcarin, Paolo; De Sutter, Bjorn
      THE JOURNAL OF SYSTEMS AND SOFTWARE
      Elsevier Inc.
      Vol.150 pp.19 (pp.3-21) ISSN:0164-1212 DOI:10.1016/j.jss.2018.12.025

    9. Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
      Article

      Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn
      EMPIRICAL SOFTWARE ENGINEERING
      Springer
      Vol.24 pp.47 (pp.240-286) ISSN:1382-3256 DOI:10.1007/s10664-018-9625-6

    2018
    1. On integration of academic attributes in the eIDAS infrastructure to support cross-border services
      Proceeding

      Berbecaru, Diana; Lioy, Antonio
      In: 2018 22nd International Conference on System Theory, Control and Computing, ICSTCC 2018 - Proceedings
      Institute of Electrical and Electronics Engineers Inc.
      22nd International Conference on System Theory, Control and Computing, ICSTCC 2018 (rou) 2018
      pp.6 (pp.691-696) ISBN:9781538644447 DOI:10.1109/ICSTCC.2018.8540674

    2. On creating digital evidence in IP networks with NetTrack
      Book chapter

      Berbecaru, Diana
      Handbook of Research on Network Forensics and Analysis Techniques
      IGI Global
      pp.22 (pp.225-246) ISBN:9781522541028 DOI:10.4018/978-1-5225-4100-4.ch012

    3. User-oriented Network Security Policy Specification
      Article

      Valenza, Fulvio; Lioy, Antonio
      JOURNAL OF INTERNET SERVICES AND INFORMATION SECURITY
      ISYOU
      Vol.8 pp.15 (pp.33-47) ISSN:2182-2069 DOI:10.22667/JISIS.2018.05.31.033

    4. Countering Android Malware: a Scalable Semi-Supervised Approach for Family-Signature Generation
      Article

      Atzeni, Andrea; Díaz, Fernando; Marcelli, Andrea; Sánchez, Antonio; Squillero, Giovanni; Tonda, Alberto
      IEEE ACCESS
      IEEE
      pp.17 (pp.59540-59556) ISSN:2169-3536 DOI:10.1109/ACCESS.2018.2874502

    5. Container-based design of a Virtual Network Security Function
      Proceeding

      DE BENEDICTIS, Marco; Lioy, Antonio; Smiraglia, Paolo
      In: NETSOFT-2018: IEEE Conference on Network Softwarization
      IEEE
      NETSOFT-2018: IEEE Conference on Network Softwarization (Montreal (QC, Canada)) 25-29 June 2018
      pp.9 (pp.55-63) DOI:10.1109/NETSOFT.2018.8459903

    6. Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems
      Proceeding

      Carelli, Alberto; Cristofanini, Carlo Alberto; Vallero, Alessandro; Basile, Cataldo; Prinetto, Paolo; Di Carlo, Stefano
      In: Proceedings of the 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2018)
      Institute of Electrical and Electronics Engineers Inc. (STATI UNITI D'AMERICA)
      IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2018) (Cluj-Napoca (Romania)) 24-26 May 2018
      pp.6 (pp.1-6) ISBN:9781538622049 DOI:10.1109/AQTR.2018.8402795

    7. On the impossibility of effectively using likely-invariants for software attestation purposes
      Article

      Viticchie', Alessio; Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio
      JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS
      Innovative Information Science & Technology Research Group (ISYOU)
      Vol.9 pp.25 (pp.1-25) ISSN:2093-5374 DOI:10.22667/JOWUA.2018.06.30.001

    8. L’uso delle tecnologie ICT (dal web alle app) a supporto della didattica blended
      Book chapter

      Farinetti, Laura; Mezzalama, Marco; Venuto, Enrico
      La formazione nell'era delle smart cities
      Cisalpino (ITALIA)
      pp.14 (pp.253-266) ISBN:9788820511043 DOI:10.12894/1111

    9. Usable security
      Book chapter

      Atzeni, Andrea; Faily, S.; Galloni, R.
      Encyclopedia of Information Science and Technology, Fourth Edition
      IGI GLOBAL (STATI UNITI D'AMERICA)
      pp.10 (pp.5004-5013) ISBN:9781522522560 DOI:10.4018/978-1-5225-2255-3.ch433

    2017
    1. NFV-based network protection: The SHIELD approach
      Proceeding

      Lioy, A.; Gardikis, G.; Gaston, B.; Jacquin, L.; De Benedictis, M.; Angelopoulos, Y.; Xylouris, C.
      In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
      IEEE
      2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) (Berlin (Germany)) 6-8 November 2017
      pp.2 (pp.1-2) ISBN:9781538632857 DOI:10.1109/NFV-SDN.2017.8169869

    2. Remotely assessing integrity of software applications by monitoring invariants: Present limitations and future directions
      Proceeding

      Viticchié, Alessio; Basile, Cataldo; Lioy, Antonio
      In: CRiSIS-2017: 12th Int. Conf. on Risks and Security of Internet and Systems
      Springer
      CRiSIS-2017: 12th Int. Conf. on Risks and Security of Internet and Systems (Dinard (France)) September 19-21, 2017
      pp.17 (pp.66-82) ISBN:9783319766867 DOI:10.1007/978-3-319-76687-4_5

    3. NFV-based network protection: the SHIELD approach
      Proceeding

      Lioy, Antonio; Gardikis, George; Gaston, Bernat; Jacquin, Ludovic; De Benedictis, Marco; Angelopoulos, Yiannis; Xylouris, Christos
      In: NFV-SDN 2017: IEEE Conference on Network Function Virtualization and Software Defined Networks
      IEEE
      NFV-SDN 2017: IEEE Conference on Network Function Virtualization and Software Defined Networks (Berlin (Germany)) November 6-8, 2017
      pp.2 (pp.1-2) ISBN:9781538632857 DOI:10.1109/NFV-SDN.2017.8169869

    4. Estimating Software Obfuscation Potency with Artificial Neural Networks
      Proceeding

      Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio
      SECURITY AND CRYPTOLOGY
      In: STM - 2017: 13th International Workshop on Security and Trust Management
      Springer International Publishing (STATI UNITI D'AMERICA)
      STM - 2017: 13th International Workshop on Security and Trust Management (Oslo (NO)) September 14–15, 2017
      Vol.10547 pp.10 (pp.193-202) ISBN:9783319680620 DOI:10.1007/978-3-319-68063-7_13

    5. On the establishment of trust in the cloud-based ETSI NFV framework
      Proceeding

      DE BENEDICTIS, Marco; Lioy, Antonio
      In: SN-2017: IEEE International Workshop on Security in NFV-SDN
      IEEE
      SN-2017: IEEE International Workshop on Security in NFV-SDN (Berlin (Germany)) November 6-8, 2017
      pp.6 (pp.280-285) DOI:10.1109/NFV-SDN.2017.8169864

    6. The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud
      Proceeding

      Smiraglia, Paolo; DE BENEDICTIS, Marco; Atzeni, Andrea; Lioy, Antonio; Pucciarelli, Massimiliano
      In: e-Democracy 2017: Privacy-Preserving, Secure, Intelligent e-Government Services
      Springer
      e-Democracy 2017: Privacy-Preserving, Secure, Intelligent e-Government Services (Athens (Greece)) December 14-15, 2017
      pp.15 (pp.196-210) DOI:10.1007/978-3-319-71117-1_14

    7. Towards Optimally Hiding Protected Assets in Software Applications
      Proceeding

      Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio
      In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS)
      IEEE
      2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) (Prague (CZ)) July 25-29, 2017
      pp.12 (pp.374-385) ISBN:9781538605929 DOI:10.1109/QRS.2017.47

    8. Educational video services in universities: a systematic effectiveness analysis
      Proceeding

      Cagliero, Luca; Farinetti, Laura; Mezzalama, Marco; Venuto, Enrico; Baralis, ELENA MARIA
      In: 2017 IEEE Frontiers in Education Conference (FIE)
      IEEE
      2017 IEEE Frontiers in Education Conference (FIE 2017) (Indianapolis, Indiana (USA)) October 18 - 21, 2017
      Vol.1 pp.9 (pp.1-9) ISBN:9781509059201 DOI:10.1109/FIE.2017.8190709

    9. From Web to Apps in Massive University On-line Learning
      Article

      Mezzalama, Marco; Venuto, Enrico; Farinetti, Laura
      JOURNAL OF MODERN EDUCATION REVIEW
      Academic Star Publishing Company
      Vol.7 pp.13 (pp.166-178) ISSN:2155-7993 DOI:10.15341/jmer(2155-7993)/03.07.2017/002

    10. Dalle APP per la didattica alle APP nella didattica - Innovazioni per una didattica innovativa
      Proceeding

      Castaldo, Ursula; Mezzalama, Marco; Venuto, Enrico
      In: Atti del programma scientifico di Didamatica 2017
      Aica (ITALIA)
      Didamatica 2017 - Le tecnologie digitali al centro dell'alternanza scuola-lavoro (Roma (Italia)) 15-16 maggio 2017
      pp.8 ISBN:9788898091461

    11. Trust and integrity in distributed systems
      Doctoral thesis

      Su, Tao
      Politecnico di Torino
      pp.149 DOI:10.6092/polito/porto/2676918

    12. How Professional Hackers Understand Protected Code while Performing Attack Tasks
      Proceeding

      Mariano, Ceccato; Paolo, Tonella; Basile, Cataldo; Bart, Coppens; Bjorn, De Sutter; Falcarin, Paolo; Torchiano, Marco
      In: ICPC 2017: 25th International Conference on Program Comprehension
      IEEE Computer Society
      ICPC 2017: 25th International Conference on Program Comprehension (Bueno Aires (Argentina)) 22-23 Maggio
      pp.11 (pp.154-164) ISBN:9781538605356 DOI:10.1109/ICPC.2017.2

    13. Classification and analysis of communication protection policy anomalies
      Article

      Valenza, Fulvio; Basile, Cataldo; Canavese, Daniele; Lioy, Antonio
      IEEE-ACM TRANSACTIONS ON NETWORKING
      IEEE
      Vol.25 pp.14 (pp.2601-2614) ISSN:1063-6692 DOI:10.1109/TNET.2017.2708096

    14. HAIT: Heap Analyzer with Input Tracing
      Proceeding

      Atzeni, Andrea; Marcelli, Andrea; Muroni, Francesco; Squillero, Giovanni
      In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT
      SCITEPRESS
      SECRYPT 2017 (Madrid, Spain) 24-26 Luglio 2017
      Vol.Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT pp.8 (pp.327-334) ISBN:9789897582592 DOI:10.5220/0006420803270334

    15. Experimental validation of a massive educational service in a blended learning environment
      Proceeding

      Baralis, ELENA MARIA; Cagliero, Luca; Farinetti, Laura; Mezzalama, Marco; Venuto, Enrico
      In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)
      IEEE
      41st IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC 2017), Symposium on Computer Education & Learning Technologies (CELT) (Torino (Italy)) July 4 - 8, 2017
      Vol.1 pp.10 (pp.381-390) ISBN:9781538603673 DOI:10.1109/COMPSAC.2017.123

    16. Assessing network authorization policies via reachability analysis
      Article

      Basile, Cataldo; Canavese, Daniele; Pitscheider, Christian; Lioy, Antonio; Valenza, Fulvio
      COMPUTERS & ELECTRICAL ENGINEERING
      Elsevier
      Vol.64 pp.22 (pp.110-131) ISSN:0045-7906 DOI:10.1016/j.compeleceng.2017.02.019

    17. Towards Stronger Data Security in an eID Management Infrastructure
      Proceeding

      Berbecaru, DIANA GRATIELA; Atzeni, Andrea; DE BENEDICTIS, Marco; Smiraglia, Paolo
      In: PDP-2017: 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing
      IEEE
      PDP-2017: 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (St. Petersburg (Russia)) 06-08 March 2017
      pp.5 (pp.391-395) ISBN:9781509060580 DOI:10.1109/PDP.2017.90

    18. Trust in SDN/NFV environments
      Book chapter

      Lioy, Antonio; Su, Tao; Lopez, Diego R.; Pastor, Antonio; Shaw, Adrian L.; Attak, Hamza
      Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications
      springer
      pp.22 (pp.103-124) ISBN:9783319646527 DOI:10.1007/978-3-319-64653-4_4

    19. A formal approach for network security policy validation
      Article

      Valenza, Fulvio; Su, Tao; Spinoso, Serena; Lioy, Antonio; Sisto, Riccardo; Vallini, Marco
      JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS
      Innovative Information Science & Technology Research Group (ISYOU)
      Vol.8 pp.22 (pp.79-100) ISSN:2093-5374 DOI:10.22667/JOWUA.2017.03.31.079

    2016
    1. Massive on-line learning: moving from web to mobile
      Proceeding

      Mezzalama, Marco; Venuto, Enrico
      In: Enhancing european higher education; “Opportunities and impact of new modes of teaching”
      EADTU (PAESI BASSI)
      The Online, Open and Flexible Higher Education Conference (Roma) 19-21 October 2016
      pp.18 (pp.749-766) ISBN:9789079730254

    2. Efficient Attribute Management in a Federated Identity Management Infrastructure
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio
      In: PDP-2016: 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing
      PDP-2016: 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (Heraklion (Greece)) 17-19 February 2016
      pp.6 (pp.590-595) DOI:10.1109/PDP.2016.102

    3. On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio
      In: ISCC-2016: IEEE Symposium on Computers and Communication
      ISCC-2016: IEEE Symposium on Computers and Communication (Messina (Italy)) June 27-30, 2016
      pp.7 (pp.1263-1269) DOI:10.1109/ISCC.2016.7543910

    4. A reference architecture for software protection
      Proceeding

      De Sutter, Bjorn; Falcarin, Paolo; Wyseur, Brecht; Basile, Cataldo; Ceccato, Mariano; Dannoville, Jerome; Zunke, Michael
      In: Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016
      Institute of Electrical and Electronics Engineers Inc.
      13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (Venice (Italy)) 4-8 April 2016
      pp.4 (pp.291-294) ISBN:9781509021314 DOI:10.1109/WICSA.2016.43

    5. Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems
      Book chapter

      Su, Tao; Lioy, Antonio; Barresi, Nicola
      Cloud Computing Security - Foundations and Challenges
      Taylor & Francis
      pp.14 (pp.345-358) ISBN:9781482260946

    6. Cloudification of Public Services in Smart Cities: the CLIPS project
      Proceeding

      Filograna, Antonio; Smiraglia, Paolo; Gilsanz, Celia; Krco, Srdjan; Medela, Arturo; Su, Tao
      In: Proceedings of the 21st IEEE Symposium on Computers and Communications (ISCC'16)
      IEEE
      21st IEEE Symposium on Computers and Communications (ISCC'16) (Messina (IT)) 2016
      pp.6 (pp.153-158) ISBN:9781509006793 DOI:10.1109/ISCC.2016.7543731

    7. Automatic generation of high speed elliptic curve cryptography code
      Doctoral thesis

      Canavese, Daniele
      Politecnico di Torino
      pp.136 DOI:10.6092/polito/porto/2652694

    8. Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks
      Proceeding

      Viticchie', Alessio; Avancini, Andrea; Ceccato, Mariano; Basile, Cataldo; Abrath, Bert; Coppens, Bart
      In: 2nd International workshop on software protection
      ACM (STATI UNITI D'AMERICA)
      2nd International Workshop on Software PROtection (Vienna (Austria)) 28 October 2016
      Vol.SPRO '16 Proceedings of the 2016 ACM Workshop on Software PROtection pp.84 ISBN:9781450345767 DOI:10.1145/2995306.2995315

    9. Assessment of Source Code Obfuscation Techniques
      Proceeding

      Viticchie', Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto
      In: IEEE 16th international working conference on source code analysis and manipulation
      IEEE Computer Society
      IEEE 16th International Working Conference on Source Code Analysis and Manipulation (Raleigh, NC (USA)) October 2-3, 2016
      pp.10 (pp.11-20) ISBN:9781509038480 DOI:10.1109/SCAM.2016.17

    10. A novel security information and event management system for enhancing cyber security in a hydroelectric dam
      Article

      Di Sarno, Cesario; Garofalo, Alessia; Matteucci, Ilaria; Vallini, Marco
      INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION
      Elsevier
      Vol.13 pp.13 (pp.39-51) ISSN:1874-5482 DOI:10.1016/j.ijcip.2016.03.002

    11. Towards Automatic Risk Analysis and Mitigation of Software Applications
      Proceeding

      Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Viticchie', Alessio; Lioy, Antonio
      In: Information Security Theory and Practice
      Springer
      WISTP 2016 - IFIP International Conference on Information Security Throey and Practice (Heraklion, Crete (Greece)) September 26–27, 2016
      pp.16 (pp.120-135) ISBN:9783319459301 DOI:10.1007/978-3-319-45931-8_8

    12. Online and offline security policy assessment
      Proceeding

      Valenza, Fulvio; Vallini, Marco; Lioy, Antonio
      In: Titolo volume non avvalorato
      ACM
      MIST’16: 8th ACM CCS international workshop on Managing Insider Security Threats (Vienna (Austria)) October 28, 2016
      pp.4 (pp.101-104) DOI:10.1145/2995959.2995970

    13. Mobile Web App: technologies and services in a Campus environment
      Proceeding

      Castaldo, Ursula; Mezzalama, Marco; Venuto, Enrico
      MONDO DIGITALE
      In: Didamatica 2016. Atti del Convegno
      A.I.C.A. - Ass. It. per Informatica e Calcolo Automatico (ITALIA)
      Didamatica 2016 "Innovazione: sfida comune di scuola, università, ricerca e impresa" - Trentesima edizione della conferenza AICA sulla informatica per la didattica (Udine) 19, 20 e 21 Aprile 2016
      pp.10 (pp.1-10) ISSN:1720-898X ISBN:9788898091447

    14. Distributed Security Policy Analysis
      Doctoral thesis

      Pitscheider, Christian
      Politecnico di Torino
      pp.146 DOI:10.6092/polito/porto/2644186

    15. Harmonised security across devices (interview with Prof. Antonio Lioy)
      Other

      Lioy, Antonio
      RESEARCH EU. RESULTS MAGAZINE
      European Union (BELGIO)
      pp.2 (pp.40-41) ISSN:1831-9947

    16. Inter-function anomaly analysis for correct SDN/NFV deployment
      Article

      Basile, Cataldo; Canavese, Daniele; Lioy, Antonio; Pitscheider, Christian; Valenza, Fulvio
      INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT
      John Wiley & Sons
      Vol.26 pp.19 (pp.25-43) ISSN:1055-7148 DOI:10.1002/nem.1917

    2015
    1. The trust problem in modern network infrastructures
      Book chapter

      Jacquin, Ludovic; Lioy, Antonio; Lopez, Diego R.; Shaw, Adrian L.; Su, Tao
      Cyber Security and Privacy
      Springer
      pp.12 (pp.116-127) ISBN:9783319253602 DOI:10.1007/978-3-319-25360-2_10

    2. Android Apps Risk Evaluation: a methodology
      Article

      Atzeni, Andrea; Su, Tao; Baltatu, Madalina; D'Alessandro, Rosalia; Pessiva, Giovanni
      ICST TRANSACTIONS ON UBIQUITOUS ENVIRONMENTS
      ICST
      Vol.1 pp.18 (pp.1-18) ISSN:2032-9377 DOI:10.4108/ue.1.4.e5

    3. Light combinators for finite fields arithmetic
      Article

      Canavese, Daniele; Cesena, Emanuele; Ouchary, Rachid; Pedicini, M.; Roversi, L.
      SCIENCE OF COMPUTER PROGRAMMING
      Elsevier
      Vol.111 pp.30 (pp.365-394) ISSN:0167-6423 DOI:10.1016/j.scico.2015.04.001

    4. Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt
      Article

      Berbecaru, DIANA GRATIELA; Lioy, Antonio
      SOFTWARE-PRACTICE & EXPERIENCE
      John Wiley & Sons
      Vol.45 pp.21 (pp.1457-1477) ISSN:0038-0644 DOI:10.1002/spe.2292

    5. Towards the Dynamic Provision of Virtualized Security Services
      Book chapter

      Basile, Cataldo; Pitscheider, Christian; Risso, FULVIO GIOVANNI OTTAVIO; Valenza, Fulvio; Vallini, Marco
      Cyber Security and Privacy
      Springer International Publishing
      pp.12 (pp.65-76) ISBN:9783319253596 DOI:10.1007/978-3-319-25360-2_6

    6. A Formal Model of Network Policy Analysis
      Proceeding

      Valenza, Fulvio; Spinoso, Serena; Basile, Cataldo; Sisto, Riccardo; Lioy, Antonio
      In: RTSI 2015 - First International Forum on Research and Technologies for Society and Industry - Proceedings
      IEEE (STATI UNITI D'AMERICA)
      RTSI 2015 - First International Forum on Research and Technologies for Society and Industry (Torino, Italy) 16-18 September 2015
      pp.7 (pp.516-522) ISBN:9781467381666 DOI:10.1109/RTSI.2015.7325150

    7. IP packet capture on high throughput networks by using NUMA architectures
      Article

      Mezzalama, Marco; Oglietti, Gianluca; Venuto, Enrico
      INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING
      Dorma Journal Scientific Pubblication
      Vol.4 pp.8 (pp.248-255) ISSN:2409-4285

    8. Automatic discovery of software attacks via backward reasoning
      Proceeding

      Basile, Cataldo; Canavese, Daniele; D’Annoville, Jerome; De Sutter, Bjorn; Valenza, Fulvio
      In: International Workshop on Software Protection (SPRO 2015)
      IEEE Computer Society
      ICSE International Workshop on Software Protection (SPRO 2015) (Firenze) 19 Maggio 2015
      Vol.ICSE 2015 International Workshop on Software Protection (SPRO 2015) pp.7 DOI:10.1109/SPRO.2015.17

    9. Dal Web alle APP: esperienze nei sistemi MOOC e MOC
      Proceeding

      Castaldo, U.; Mezzalama, Marco; Venuto, Enrico
      In: Didamatica 2015
      AICA (ITALIA)
      STUDIO ERGO LAVORO - dalla società della conoscenza alla società delle competenze (Genova) 15-17 Aprile 2015
      pp.8 ISBN:9788898091386

    10. Authentication
      Book chapter

      Atzeni, Andrea; Lioy, Antonio
      Encyclopedia of Information Science and Technology
      IGI Global (STATI UNITI D'AMERICA)
      pp.9 (pp.4239-4247) ISBN:9781466658882 DOI:10.4018/978-1-4666-5888-2.ch416

    11. Offloading personal security applications to a secure and trusted network node
      Proceeding

      Bonafiglia, Roberto; Ciaccia, F.; Lioy, Antonio; Nemirovsky, M.; Risso, FULVIO GIOVANNI OTTAVIO; Su, Tao
      In: Netsoft-2015: 1st IEEE Conference on Network Softwarization
      IEEE (STATI UNITI D'AMERICA)
      Netsoft-2015: 1st IEEE Conference on Network Softwarization (London (UK)) 13-17 April 2015
      pp.2 (pp.1-2) ISBN:9781479978984 DOI:10.1109/NETSOFT.2015.7116171

    12. A novel approach for integrating security policy enforcement with dynamic network virtualization
      Proceeding

      Basile, Cataldo; Lioy, Antonio; Pitscheider, Christian; Valenza, Fulvio; Vallini, Marco
      In: 1st IEEE Conference on Network Softwarization (NetSoft-2015)
      IEEE
      1st IEEE Conference on Network Softwarization (NetSoft-2015) (London (UK)) 13-17 April 2015
      pp.5 ISBN:9781479978991 DOI:10.1109/NETSOFT.2015.7116152

    13. Virtualized Security at the Network Edge: A User-centric Approach
      Article

      Montero, D.; Yannuzzi, M.; Shaw, A.; Jacquin, L.; Pastor, A.; Serral Gracià, R.; Lioy, Antonio; Risso, FULVIO GIOVANNI OTTAVIO; Basile, Cataldo; Sassu, Roberto; Nemirovsky, M.; Ciaccia, Francesco; Georgiades, M.; Charalambides, S.; Kuusijarvi, J.; Bosco, F.
      IEEE COMMUNICATIONS MAGAZINE
      IEEE
      Vol.53 pp.11 (pp.176-186) ISSN:0163-6804 DOI:10.1109/MCOM.2015.7081092

    14. Hard clues in soft environments: The Cloud's influence on digital forensics
      Book chapter

      Atzeni, Andrea; Smiraglia, Paolo; Siringo, Andrea
      Handbook of Research on Security Considerations in Cloud Computing
      IGI Global
      pp.27 (pp.258-284) ISBN:9781466683877 DOI:10.4018/978-1-4666-8387-7.ch012

    15. Analysis of application-layer filtering policies with application to HTTP
      Article

      Basile, Cataldo; Lioy, Antonio
      IEEE-ACM TRANSACTIONS ON NETWORKING
      IEEE
      Vol.23 pp.14 (pp.28-41) ISSN:1063-6692 DOI:10.1109/TNET.2013.2293625

    16. A formal model of policy reconciliation
      Proceeding

      Basile, Cataldo; Lioy, Antonio; Pitscheider, Christian; Zhao, Shilong
      In: PDP-2015: 23rd EuroMicro International Conference on Parallel, Distributed and network-based Processing
      IEEE
      PDP-2015: 23rd EuroMicro International Conference on Parallel, Distributed and network-based Processing (Turku (Finland)) March 4-6, 2015
      pp.8 (pp.587-594) ISBN:9781479984909 DOI:10.1109/PDP.2015.42

    17. Inter-technology conflict analysis for communication protection policies
      Proceeding

      Valenza, Fulvio; Basile, Cataldo; Canavese, Daniele; Lioy, Antonio
      In: Risks and Security of Internet and Systems
      Springer
      CRiSIS-2014: 9th International Conference on Risks and Security of Internet and Systems (Trento (Italy)) 27-29 August 2014
      pp.16 (pp.148-163) ISBN:9783319171265 DOI:10.1007/978-3-319-17127-2_10

    2014
    1. D7.1 - Project leaflet and portal
      Other

      Lioy, Antonio; Bosco, Francesca; Risso, FULVIO GIOVANNI OTTAVIO; Smiraglia, Paolo
      deliverable of the SECURED project
      pp.9 DOI:10.6092/polito/porto/2650350

    2. Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework
      Proceeding

      Shamal, Faily; John, Lyle; Ivan, Fléchais; Atzeni, Andrea; Cameroni, Cesare; Hans, Myrhaug; Ayse, Göker; Robert, Kleinfeld
      In: HCI'14: 28th Int. BCS Human Computer Interaction Conference 2014
      HCI'14: 28th Int. BCS Human Computer Interaction Conference 2014 (Southport (UK)) 9-12 September 2014
      pp.6 (pp.189-194) DOI:10.14236/ewic/hci2014.21

    3. Closing the loop of SIEM analysis to Secure Critical Infrastructures
      Proceeding

      Garofalo, A.; Di Sarno, C.; Matteucci, I.; Vallini, Marco; Formicola, V.
      In: Titolo volume non avvalorato
      The First International Workshop on Real-time Big Data Analytics for Critical Infrastructure Protection (BIG4CIP 2014) (Newcastle (UK)) 13 May 2014
      pp.6

    4. The TClouds Platform: From the Concept to the Implementation of Benchmark Scenarios
      Article

      Bessani, A.; Cutillo, LEUCIO ANTONIO; Ramunno, Gianluca; Schirmer, N.; Smiraglia, Paolo
      OPERATING SYSTEMS REVIEW
      ACM
      Vol.48 pp.10 (pp.13-22) ISSN:0163-5980 DOI:10.1145/2694737.2694741

    5. How Dangerous is Your Android App? An Evaluation Methodology
      Proceeding

      Atzeni, Andrea; Su, Tao; M., Baltatu; R., D'Alessandro; G., Pessiva
      In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
      ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
      11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (London, United Kingdom) 02/12/2014-05/12/2014
      pp.10 (pp.130-139) DOI:10.4108/icst.mobiquitous.2014.257832

    6. Exploiting the network for securing personal devices
      Proceeding

      Dalton, C.; Lioy, Antonio; Lopez, D.; Risso, FULVIO GIOVANNI OTTAVIO; Sassu, Roberto
      COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
      In: Cyber Security and Privacy
      Springer
      Third Cyber Security and Privacy EU Forum (Athens (Greece)) 21-22 May 2014
      pp.12 (pp.16-27) ISSN:1865-0929 DOI:10.1007/978-3-319-12574-9_2

    7. Network-Security-Policy Analysis
      Proceeding

      Pitscheider, Christian
      In: Titolo volume non avvalorato
      International Academy, Research and Industrial Association (IARIA)
      DEPEND 2014, The Seventh International Conference on Dependability (Lisbon (Portugal)) November 16- 20, 2014
      pp.7 (pp.10-16)

    8. Offloading security applications into the network
      Proceeding

      Lioy, Antonio; Pastor, A.; Risso, FULVIO GIOVANNI OTTAVIO; Sassu, Roberto; Shaw, A. L.
      In: Titolo volume non avvalorato
      IIMC International Information Management Corporation, (REGNO UNITO DI GRAN BRETAGNA)
      eChallenges e-2014 (Belfast (UK)) 29-30 October 2014
      pp.9

    9. Practical assessment of Biba integrity for TCG-enabled platforms
      Proceeding

      Sassu, Roberto; Ramunno, Gianluca; Lioy, Antonio
      In: TRUSTCOM'14: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
      TRUSTCOM'14: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Bejing (China)) 24-26 September 2014
      pp.10 (pp.495-504) DOI:10.1109/TrustCom.2014.63

    10. Lightweight Formal Verification in Real World, A Case Study
      Proceeding

      Atzeni, Andrea; Su, Tao; Montanaro, Teodoro
      LECTURE NOTES IN BUSINESS INFORMATION PROCESSING
      In: Advanced Information Systems Engineering Workshops
      Springer International Publishing
      WISSE 2014: 4th International Workshop on Information Systems Security Engineering (Thessaloniki (Greece)) 17 June 2014
      pp.8 (pp.335-342) ISSN:1865-1348 DOI:10.1007/978-3-319-07869-4_31

    11. Experimenting MOC & MOOC in technical university
      Proceeding

      Castaldo, U.; Mezzalama, Marco; Venuto, Enrico
      In: DIDAMATICA Informatica per la Didattica
      AICA (ITALIA)
      Nuovi Processi e Paradigmi per la Didattica 28° EDIZIONE (Napoli) 7, 8 e 9 Maggio 2014
      pp.11 (pp.78-88)

    12. Developing secure‚ unified multi−device and multi−domain platforms: a case study from the webinos project
      Book chapter

      Atzeni, Andrea; Lyle, J.; Faily, S.
      Architectures and Protocols for Secure Information Technology
      IGI Global
      pp.24 (pp.310-333) ISBN:9781466645141 DOI:10.4018/978-1-4666-4514-1.ch012

    13. Can a Light Typing Discipline Be Compatible with an Efficient Implementation of Finite Fields Inversion?
      Proceeding

      Canavese, Daniele; Cesena, Emanuele; Ouchary, Rachid; Pedicini, M.; Roversi, L.
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Foundational and Practical Aspects of Resource Analysis
      Springer
      FOPARA 2013 (Bertinoro) August 2013
      Vol.8552 pp.20 (pp.38-57) ISSN:0302-9743 DOI:10.1007/978-3-319-12466-7_3

    2013
    1. Consulenza scientifica sul PIN delle carte di pagamento elettroniche a marchio BANCOMAT e PagoBANCOMAT
      Other

      Lioy, Antonio
      pp.18 DOI:10.6092/polito/porto/2539489

    2. Privacy-by-design cloud computing through decentralization and real life trust
      Proceeding

      Cutillo, LEUCIO ANTONIO; Lioy, Antonio
      In: Peer-to-Peer Computing
      P2P-2013: IEEE 13th International Conference on Peer-to-Peer Computing (Trento (Italy)) 9-11 September 2013
      pp.2 DOI:10.1109/P2P.2013.6688726

    3. The TClouds platform: concept, architecture and instantiations
      Proceeding

      Bessani, A.; Cutillo, LEUCIO ANTONIO; Ramunno, Gianluca; Schirmer, N.; Smiraglia, Paolo
      In: DISCCO'13: 2nd International Workshop on Dependability Issues in Cloud Computing
      ACM
      DISCCO'13: 2nd International Workshop on Dependability Issues in Cloud Computing (Braga (PT)) September 30, 2013
      pp.6 DOI:10.1145/2506155.2506156

    4. Towards a unified software attack model to assess software protections
      Proceeding

      Basile, Cataldo; Ceccato, M.
      In: Program Comprehension (ICPC), 2013 IEEE 21st International Conference on
      IEEE
      IEEE International Conference on Program Comprehension (ICPC) (San Francisco, California (USA)) May 20-21, 2013
      pp.4 (pp.219-222) DOI:10.1109/ICPC.2013.6613852

    5. Policy-driven system management
      Book chapter

      Platte, H.; Basile, Cataldo; Paraboschi, S.
      Computer and Information Security Handbook
      Morgan Kaufmann
      pp.20 (pp.773-792) ISBN:9780123943972

    6. Detection of conflicts in security policies
      Book chapter

      Basile, Cataldo; Casalino, M. M.; Mutti, S.; Paraboschi, S.
      Computer and Information Security Handbook
      Morgan Kaufmann
      pp.34 (pp.415-448) ISBN:9780123943972

    7. Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies
      Proceeding

      Faily, S.; Lyle, J.; Flechais, I.; Atzeni, Andrea; Cameroni, Cesare; Myrhaug, H.; Goker, A.; Kleinfeld, R.
      In: Proceedings of the workshop on Home Usable Privacy and Security (HUPS) 2013
      HUPS-2013: workshop on Home Usable Privacy and Security (Newcastle (UK)) 24-26/7/2013
      pp.6

    8. Continuous integration for web-based software infrastructures: lessons learned on the webinos project
      Proceeding

      Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Hardware and Software: Verification and Testing
      Springer
      HVC-2013: Ninth Haifa Verification Conference (Haifa (Israel)) 5-7/11/2013
      Vol.LNCS-8244 pp.6 (pp.145-150) ISSN:0302-9743 DOI:10.1007/978-3-319-03077-7_10

    9. The PP&S100 Project: Process Control as an Information System Instance
      Proceeding

      Demartini, Claudio Giovanni; Marina, Marchisio; Mezzalama, Marco; Claudio, Pardini; Amelio, Patrucco
      In: Titolo volume non avvalorato
      Congresso Nazionale AICA 2013
      pp.30

    10. Towards privacy-by-design peer-to-peer cloud computing
      Proceeding

      Cutillo, LEUCIO ANTONIO; Lioy, Antonio
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Trust, Privacy, and Security in Digital Business
      Springer
      TRUSTBUS-2013 (Prague (Czech Republic)) 28-29 August 2013
      Vol.8058 pp.12 (pp.85-96) ISSN:0302-9743 DOI:10.1007/978-3-642-40343-9_8

    11. Editoriale: la sicurezza nell'era digitale
      Article

      Mezzalama, Marco
      AEIT
      AEIT
      Vol.n. 6 pp.2 (pp.4-5) ISSN:1825-828X

    12. L'evoluzione del malware: dai personal computer ai dispositivi mobili
      Article

      Mezzalama, Marco
      AEIT
      AEIT
      Vol.n. 6 pp.7 (pp.16-22) ISSN:1825-828X

    13. Anatomia del malware
      Article

      Mezzalama, Marco; Lioy, Antonio; Metwalley, H.
      MONDO DIGITALE
      AICA
      pp.20 ISSN:1720-898X

    14. Sicurezza nelle reti: utilizzo di architetture multi-core per il monitoraggio del traffico IP
      Proceeding

      Mezzalama, Marco; Oglietti, Gianluca; Venuto, Enrico
      In: Frontiere Digitali: dal Digital Divide alla Smart Society
      AICA (ITALIA)
      Frontiere Digitali: dal Digital Divide alla Smart Society (Fisciano (ITA)) 18-19-20 Settembre 2013
      pp.10 (pp.176-185)

    15. Multicanalità e e-learning: nuovi scenari tecnologici e didattici
      Proceeding

      Castaldo, U.; Mezzalama, Marco; Venuto, Enrico
      In: Titolo volume non avvalorato
      AICA
      Didamatica 2013 (Pisa (Italia)) 7-8-9 Maggio 2013
      pp.10 (pp.359-368)

    16. Building a trusted environment for security applications
      Book chapter

      Cabiddu, Giovanni; Lioy, Antonio; Ramunno, Gianluca
      Theory and Practice of Cryptography Solutions for Secure Information Systems
      IGI Global (STATI UNITI D'AMERICA)
      pp.27 (pp.334-360) ISBN:9781466640306 DOI:10.4018/978-1-4666-4030-6.ch014

    17. Improved reachability analysis for security management
      Proceeding

      Basile, Cataldo; Canavese, Daniele; Lioy, Antonio; Pitscheider, Christian
      In: Titolo volume non avvalorato
      IEEE Computer Society Press (STATI UNITI D'AMERICA)
      PDP-2013: 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (Belfast (UK)) February 27 - March 1, 2013
      pp.8 (pp.534-541) ISBN:9781467353212 DOI:10.1109/PDP.2013.86

    18. Personal PKI for the smart device era
      Proceeding

      Lyle, J.; Paverd, A.; King Lacroix, J.; Atzeni, Andrea; Virji, H.; Flechais, I.; Faily, S.
      In: Public Key Infrastructures, Services and Applications
      Springer
      9th European Workshop EuroPKI 2012 (Pisa (Italy)) September 13-14, 2012
      pp.16 (pp.69-84) ISBN:9783642400117

    19. FcgiOCSP: a scalable OCSP-based Certificate Validation System exploitingthe FastCGI interface
      Article

      Berbecaru, DIANA GRATIELA; Casalino, MATTEO MARIA; Lioy, Antonio
      SOFTWARE-PRACTICE & EXPERIENCE
      John Wiley & Sons
      Vol.43 pp.30 (pp.1489-1518) ISSN:0038-0644 DOI:10.1002/spe.2148

    2012
    1. E-Learning at Politecnico di Torino: Moving to a Sustainable Large-Scale Multi-Channel System of Services
      Book chapter

      Barbagallo, Salvatore; Bertonasco, Roberto; Corno, Fulvio; Farinetti, Laura; Mezzalama, Marco; SONZA REORDA, Matteo; Venuto, Enrico
      Handbook of Research on Didactic Strategies and Technologies for Education: Incorporating Advancements
      Information Science Reference (an imprint of IGI Global) (STATI UNITI D'AMERICA)
      pp.13 (pp.690-702) ISBN:9781466621220 DOI:10.4018/978-1-4666-2122-0.ch060

    2. Model-driven architectural risk analysis using architectural and contextualised attack patterns
      Proceeding

      Faily, S.; Lyle, J.; Namiluko, C.; Atzeni, Andrea; Cameroni, Cesare
      In: Titolo volume non avvalorato
      ACM (STATI UNITI D'AMERICA)
      MDSec 2012: Workshop on Model-Driven Security, at the 15th ACM/IEEE International Conference on Model Driven Engineering Languages and System (Innsbruck (Austria)) October 1-5, 2012
      pp.6 ISBN:9781450318068 DOI:10.1145/2422498.2422501

    3. Requirements Sensemaking using Concept Maps
      Proceeding

      Faily, S.; Lyle, J.; Paul, A.; Atzeni, Andrea; Blomme, D.; Desruelle, H.; Bangalore, K.
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Titolo volume non avvalorato
      Springer
      HCSE-2012: 4th International Conference on Human-Centred Software Engineering (Toulouse (France)) October 29-31, 2012
      Vol.7623 pp.16 (pp.217-232) ISSN:0302-9743 ISBN:9783642343476 DOI:10.1007/978-3-642-34347-6_13

    4. iL SOFTWARE OPEN-SOURCE NEL SISTEMA UNIVERSITARIO ITALIANO
      Article

      Bogliolo, A.; Donzelli, P.; Mainetti, L.; Mezzalama, Marco; Stefanelli, C.
      ARCHIVI & COMPUTER
      TITIVILLUS
      Vol.XXIII pp.14 (pp.114-127) ISSN:1121-2462

    5. FPGA based remote code integrity verification of programs in distributed embedded systems
      Article

      Basile, Cataldo; DI CARLO, Stefano; Scionti, A.
      IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS. PART C, APPLICATIONS AND REVIEWS
      IEEE
      Vol.42 pp.13 (pp.187-200) ISSN:1094-6977 DOI:10.1109/TSMCC.2011.2106493

    6. Network-level access control policy analysis and transformation
      Article

      Basile, Cataldo; Cappadonia, Alberto; Lioy, Antonio
      IEEE-ACM TRANSACTIONS ON NETWORKING
      IEEE-ACM
      Vol.20 pp.14 (pp.985-998) ISSN:1063-6692 DOI:10.1109/TNET.2011.2178431

    2011
    1. The trusted platform agent
      Article

      Cabiddu, G.; Cesena, E.; Sassu, R.; Vernizzi, D.; Ramunno, G.; Lioy, A.
      IEEE SOFTWARE
      IEEE COMPUTER SOC
      Vol.28 pp.7 (pp.35-41) ISSN:0740-7459 DOI:10.1109/MS.2010.160

    2. Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment.
      Other

      Jim, Clarke; Marcos Gomez, Hidalgo; Lioy, Antonio; Louis, Marinos; Milan, Petkovic; Claire, Vishik; Jeremy, Ward
      ENISA (GRECIA)
      Vol.ENISA deliverable 2011-10-18 pp.51

    3. A unified ontology for the virtualization domain
      Proceeding

      Silvestro, Jacopo; Canavese, Daniele; Cesena, Emanuele; Smiraglia, Paolo
      In: OTM 2011: On the Move to Meaningful Internet Systems
      Springer
      DOA-SVI 2011: Distributed Objects and Applications and Secure Virtual Infrastructures (Hersonissos (Greece)) October 17-21, 2011
      pp.8 (pp.617-624) ISBN:9783642251054 DOI:10.1007/978-3-642-25106-1_14

    4. On scalability of remote attestation
      Proceeding

      Cesena, Emanuele; Ramunno, Gianluca; Sassu, Roberto; Vernizzi, Davide; Lioy, Antonio
      In: Titolo volume non avvalorato
      STC'11: 6th ACM workshop on Scalable Trusted Computing (Chicago (IL, USA)) October 17, 2011
      pp.6 (pp.25-30) DOI:10.1145/2046582.2046588

    5. Acquisizione del traffico IP da una rete ad elevato throughput utilizzando un sistema Open Source: tecnologie e problematiche
      Proceeding

      Mezzalama, Marco; Oglietti, Gianluca
      In: Convegno AICA 2011
      AICA (ITALIA)
      smart tech & smart innovation (Torino (IT)) 15-17 novembre 2011
      pp.18 (pp.1-18) ISBN:9788890540646

    6. Federating e-identities across Europe, or how to build cross-border e-services
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio; Mezzalama, Marco; Santiano, Giorgio; Venuto, Enrico; Oreglia, Marco
      In: Titolo volume non avvalorato
      AICA-2011 conference - Smart Tech & Smart Innovation (Torino (Italy)) 15-17/11/2011
      pp.10 ISBN:9788890540646

    7. Protezione dei sistemi informatici
      Book chapter

      Lioy, Antonio; Mezzalama, Marco
      Ingegneria forense : metodologie, protocolli, casi studio
      Flaccovio (ITALIA)
      pp.34 (pp.455-488) ISBN:9788857901015

    8. Exploiting proxy-based federated identity management in wireless roaming access
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio; Aime, MARCO DOMENICO
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Titolo volume non avvalorato
      Springer
      8th International Conference, TrustBus 2011 (Toulouse (FR)) August 29 - September 2, 2011
      Vol.6863 pp.11 (pp.13-23) ISSN:0302-9743 ISBN:9783642228896 DOI:10.1007/978-3-642-22890-2_2

    9. Here's Johnny: a methodology for developing attacker personas
      Proceeding

      Atzeni, Andrea; Faily, S.; Lyle, J.; Cameroni, Cesare; Flechais, I.
      In: Titolo volume non avvalorato
      ARES-2011: 6th Int. Conf. on Availability, Reliability and Security (Vienna (Austria)) 22-26 August 2011
      pp.6 (pp.722-727) ISBN:9781457709791 DOI:10.1109/ARES.2011.115

    10. La formazione a distanza al Politecnico di Torino: nuovi modelli e strumenti
      Proceeding

      Barbagallo, Salvatore; Bertonasco, Roberto; Corno, Fulvio; Mezzalama, Marco; SONZA REORDA, Matteo; Venuto, Enrico
      In: Titolo volume non avvalorato
      Didamatica 2011 (Torino (IT)) 4-6 maggio 2011
      pp.10 ISBN:9788890540622

    11. Security Plans for SaaS
      Book chapter

      Aime, MARCO DOMENICO; Lioy, Antonio; Pomi, PAOLO CARLO; Vallini, Marco
      New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud
      Springer (GERMANIA)
      pp.31 (pp.81-111) ISBN:9783642192937 DOI:10.1007/978-3-642-19294-4_4

    12. LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments
      Proceeding

      Berbecaru, DIANA GRATIELA
      In: Titolo volume non avvalorato
      IEEE Computer Society
      PDP 2011 - 19th International Euromicro Conference on Parallel, Distributed and Network-Based Computing (Ayia Napa (Cyprus)) 09 - 11 February 2011
      pp.5 (pp.141-145) ISBN:9780769543284 DOI:10.1109/PDP.2011.32

    13. Trusted Platform Agent
      Article

      Cabiddu, Giovanni; Cesena, Emanuele; Sassu, Roberto; Vernizzi, Davide; Ramunno, Gianluca; Lioy, Antonio
      IEEE SOFTWARE
      Vol.28 pp.7 (pp.35-41) ISSN:0740-7459 DOI:10.1109/MS.2010.160

    14. On the performance of secure vehicular communication systems
      Article

      Calandriello, Giorgio; Papadimitratos, Panagiotis; Hubaux, J. P.; Lioy, Antonio
      IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
      IEEE
      Vol.8 pp.15 (pp.898-912) ISSN:1545-5971 DOI:10.1109/TDSC.2010.58

    15. Automatic (re)configuration of IT systems for dependability
      Article

      Aime, MARCO DOMENICO; Lioy, Antonio; Pomi, PAOLO CARLO
      IEEE TRANSACTIONS ON SERVICES COMPUTING
      IEEE
      Vol.4 pp.15 (pp.110-124) ISSN:1939-1374 DOI:10.1109/TSC.2010.31

    2010
    1. A psychological approach to information technology security
      Proceeding

      Enrici, I.; Ancilli, M.; Lioy, Antonio
      In: Titolo volume non avvalorato
      IEEE
      HSI-2010: 3rd Int. Conf. on Human System Interactions (Rzeszow (Poland)) May 13-15, 2010
      pp.8 (pp.459-466) ISBN:9781424475605 DOI:10.1109/HSI.2010.5514528

    2. Capire l'informatica
      Book

      Mezzalama, Marco; Piccolo, Elio
      CittàStudi DeAgostini (ITALIA)
      pp.288 ISBN:9788825173611

    3. Performance of two one-time signature schemes in space/time constrained environments
      Proceeding

      Berbecaru, DIANA GRATIELA
      In: Titolo volume non avvalorato
      IEEE ISWPC 2010, 5th IEEE International Symposium on Wireless Pervasive Computing (Modena (Italy)) 5-7 May 2010
      pp.6 (pp.238-243) ISBN:9781424468553 DOI:10.1109/ISWPC.2010.5483755

    4. Towards a Network-Independent Policy Specification
      Proceeding

      Basile, Cataldo; Lioy, Antonio; Vallini, Marco
      In: Titolo volume non avvalorato
      IEEE
      PDP 2010, 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (Pisa (Italy)) 17-19 Feb. 2010
      pp.5 (pp.649-653) ISBN:9781424456727 DOI:10.1109/PDP.2010.45

    5. The ForwardDiffSig scheme for multicast authentication
      Article

      Berbecaru, DIANA GRATIELA; Albertalli, L.; Lioy, Antonio
      IEEE-ACM TRANSACTIONS ON NETWORKING
      IEEE
      Vol.18 pp.14 (pp.1855-1868) ISSN:1063-6692 DOI:10.1109/TNET.2010.2052927

    6. Ontology-based Security Policy Translation
      Article

      Basile, Cataldo; Lioy, Antonio; Scozzi, Salvatore; Vallini, Marco
      JOURNAL OF INFORMATION ASSURANCE AND SECURITY
      Dynamic Publishers
      Vol.5 pp.9 (pp.437-445) ISSN:1554-1010

    7. Ontology and algorithms for the dependable configuration of information systems
      Article

      Aime, MARCO DOMENICO; Pomi, PAOLO CARLO; Vallini, Marco
      INTERNATIONAL JOURNAL OF CRITICAL COMPUTER-BASED SYSTEMS
      Vol.1 pp.35 (pp.301-335) ISSN:1757-8779 DOI:10.1504/IJCCBS.2010.036603

    8. Trusted Computing
      Book chapter

      Lioy, Antonio; Ramunno, Gianluca
      Handbook of Information and Communication Security
      Springer
      pp.21 (pp.697-717) ISBN:9783642041167 DOI:10.1007/978-3-642-04117-4_32

    2009
    1. MagicNET: XACML authorization policies for mobile agents
      Proceeding

      Giambruno, Alessandro; Shibli, M. A.; Muftic, S.; Lioy, Antonio
      In: Titolo volume non avvalorato
      IEEE
      ICITST-2009: Int. Conf. for Internet Technology and Secured Transactions (London (UK)) 9-12 Nov. 2009
      pp.7 (pp.1-7) ISBN:9780954662820

    2. MagicNET: Security System for Development, Validation and Adoption of Mobile Agents
      Proceeding

      Shibli, M. A.; Muftic, S.; Giambruno, Alessandro; Lioy, Antonio
      In: Titolo volume non avvalorato
      IEEE
      NSS'09: Int. Conf. on Network and System Security (Gold Coast (Queensland, Australia)) 19-21 Oct. 2009
      pp.8 (pp.389-396) ISBN:9781424450879 DOI:10.1109/NSS.2009.33

    3. Efficient and Reliable Pseudonymous Authentication
      Book chapter

      Calandriello, Giorgio; Lioy, Antonio
      Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange
      IGI Global
      pp.17 (pp.247-263) ISBN:9781605663388 DOI:10.4018/978-1-60566-338-8.ch013

    4. Toward a formal framework to evaluate wireless sensor network security
      Proceeding

      ABOU EL KALAM, A; Atzeni, Andrea; Cappadonia, Alberto; Cesena, Emanuele; FISCHER HUBNER, S; Lindskog, S; Martucci, L. A.; Pastrone, C.
      In: NEWCOM++ - ACoRN Joint Workshop

    5. Automated Dependability Planning in Virtualised Information System
      Article

      Aime, MARCO DOMENICO; Pomi, PAOLO CARLO; Vallini, Marco
      INTERNATIONAL JOURNAL ON ADVANCES IN INTELLIGENT SYSTEMS
      Vol.2 pp.20 (pp.457-476) ISSN:1942-2679

    6. D06.c2: WYSIWYS application design specification
      Other

      Cabiddu, Giovanni; Ramunno, Gianluca; Vallini, Marco
      Vol.IST-027635/D06c.2/FINAL 1.10

    7. D03c.9 Enhancement of Key Management Adaptation (KMA) service source code and documentation
      Other

      Ramunno, Gianluca; Sassu, Roberto
      Vol.IST-027635/D03c.9/FINAL 1.10

    8. "Da Galileo Ferraris alle centrali odierne"
      Book chapter

      Mezzalama, Marco
      IL TERRITORIO DELLE GRANGE DI LUCEDIO
      EDIZIONI MERCURIO
      pp.12 (pp.81-92) ISBN:9788895522302

    9. Problemi di sicurezza delle comunicazioni a distanza
      Book chapter

      Atzeni, Andrea
      Nuove tecnologie e processo penale
      Giappichelli Editore (ITALIA)
      pp.7 (pp.102-108) ISBN:9788834877982

    10. Planning Dependability of Virtualised Networks
      Proceeding

      Aime, MARCO DOMENICO; Pomi, PAOLO CARLO; Vallini, Marco
      In: Second International Workshop on Dependability and Security in Complex and Critical Information Systems
      IEEE
      DEPEND'09 - 2nd Int. Conf. on Dependability (Athens (Greece)) 18-23 June 2009
      pp.6 (pp.46-51) ISBN:9780769536668 DOI:10.1109/DEPEND.2009.13

    11. Trusted-Computing Technologies for the Protection of Critical Information Systems
      Article

      Lioy, Antonio; Ramunno, Gianluca; Vernizzi, Davide
      JOURNAL OF INFORMATION ASSURANCE AND SECURITY
      Vol.4 pp.9 (pp.449-457) ISSN:1554-1010

    12. Ontology-based policy translation
      Proceeding

      Basile, Cataldo; Lioy, Antonio; Scozzi, Salvatore; Vallini, Marco
      In: Titolo volume non avvalorato
      Springer
      CISIS'09 - Int. Workshop on Computational Intelligence in Security for Information Systems (Burgos (Spain)) 23-26 September 2009
      pp.10 (pp.117-126) ISBN:9783642040900 DOI:10.1007/978-3-642-04091-7_15

    13. A unified and flexible solution for integrating CRL and OCSP into PKI applications
      Article

      Berbecaru, DIANA GRATIELA; Desai, AMARKUMAR GUNVANTRAI; Lioy, Antonio
      SOFTWARE-PRACTICE & EXPERIENCE
      Wiley
      Vol.39 pp.31 (pp.891-921) ISSN:0038-0644 DOI:10.1002/spe.918

    2008
    1. D03c.2 High-level key manager service design specification
      Other

      Ramunno, Gianluca; Sassu, Roberto
      Vol.IST-027635/D03c.2/FINAL 2.00

    2. Generation of Diagnostic Plans for Large ICT Systems
      Proceeding

      Aime, MARCO DOMENICO; Atzeni, Andrea
      In: Titolo volume non avvalorato
      Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE'08) (Cap Esterel, France) August 25-31, 2008
      pp.6 (pp.344-349) ISBN:9780769533292 DOI:10.1109/SECURWARE.2008.56

    3. Modern standard-based access control in network services: XACML in action
      Article

      Scaglioso, PIERVITO GIOVANNI; Basile, Cataldo; Lioy, Antonio
      INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY
      Vol.8, no. 12 pp.10 (pp.296-305) ISSN:1738-7906

    4. "Dopo le proteste, un passo avanti"
      Article

      Mezzalama, Marco
      IL GIORNALE DELL'ARCHITETTURA
      Vol.68 ISSN:1721-5463

    5. “Internet Story: i padri della rete”,
      Article

      Mezzalama, Marco
      IL GIORNALE DELL'ARCHITETTURA
      Vol.66 ISSN:1721-5463

    6. “Rapporto annuale: Reti elettriche e digitali”, Guest editor,
      Article

      Mezzalama, Marco
      IL GIORNALE DELL'ARCHITETTURA
      Vol.66 pp.16 (pp.51-66) ISSN:1721-5463

    7. Integrating Deployment Techniques with Monitoring: The Proactive Configuration Checker (PCC)
      Proceeding

      Basile, Cataldo; Pomi, PAOLO CARLO; Scaglioso, PIERVITO GIOVANNI
      In: PDP2008: 16th Euromicro Conference on Parallel, Distributed and Network- Based Processing
      Los Alamitos, CA (STATI UNITI D'AMERICA)
      PDP2008: 16th Euromicro Conference on Parallel, Distributed and Network- Based Processing (Toulouse, France) February 13-15, 2008
      (pp.611-615) ISBN:9780769530895

    8. Trusted-Computing Technologies forthe Protection of Critical Information Systems
      Proceeding

      Lioy, Antonio; Ramunno, Gianluca; Vernizzi, Davide
      In: Titolo volume non avvalorato
      Springer
      CISIS'08 - Int. Workshop on Computational Intelligence in Security for Information Systems (Genova (Italy)) 23-24 October 2008
      Vol.53 pp.7 (pp.77-83) ISBN:9783540881803 DOI:10.1007/978-3-540-88181-0_10

    9. The Risks With Security Metrics
      Proceeding

      Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
      In: Titolo volume non avvalorato
      ACM (STATI UNITI D'AMERICA)
      QoP 2008, ACM Workshop on Quality of Protection (Alexandria, VA, USA) 27 Oct 2008
      (pp.65-70) ISBN:9781605583211 DOI:10.1145/1456362.1456376

    10. On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks
      Proceeding

      Berbecaru, DIANA GRATIELA; Luca, Albertalli
      In: Titolo volume non avvalorato
      IEEE Computer Society (STATI UNITI D'AMERICA)
      WIMOB'08 - IEEE International Conference on Wireless and Mobile Networking and Communications 12-14 Oct. 2008, Avignon (France)
      (pp.234-240) ISBN:9780769533933 DOI:10.1109/WiMob.2008.14

    11. Geometric Interpretation of Policy Specification
      Proceeding

      Basile, Cataldo; Cappadonia, Alberto; Lioy, Antonio
      In: Titolo volume non avvalorato
      IEEE
      POLICY-2008: IEEE Int. workshop on Policies for Distributed Systems and Networks (Palisades (NY, USA)) June 2-4, 2008
      pp.4 (pp.78-81) ISBN:9780769531335 DOI:10.1109/POLICY.2008.36

    12. Learning to enhance dependability of information systems
      Proceeding

      Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
      In: Titolo volume non avvalorato
      IEEE
      SASO 2008, IEEE International Conference on Self-Adaptive and Self-Organizing Systems (Venezia) October 20-24, 2008
      (pp.483-484) ISBN:9780769534046 DOI:10.1109/SASO.2008.50

    13. Policy-Driven System Configuration for Dependability
      Proceeding

      Aime, MARCO DOMENICO; Pomi, PAOLO CARLO; Vallini, Marco
      In: Titolo volume non avvalorato
      IEEE
      SECUREWARE'08 - 2nd Int. Conf. on Emerging Security Information, Systems and Technologies (Cap Esterel (France)) 25-31 August 2008
      pp.6 (pp.420-425) ISBN:9780769533292 DOI:10.1109/SECURWARE.2008.54

    14. Trust, Privacy and Security in Digital Business
      Edited by

      Furnell, S; Katsikas, S. K.; Lioy, Antonio
      Springer (GERMANIA)
      pp.204 ISBN:9783540857341

    15. Impact of vehicular communication security on transportation safety
      Proceeding

      Papadimitratos, P.; Calandriello, Giorgio; Hubaux, J. P.; Lioy, Antonio
      In: Titolo volume non avvalorato
      IEEE
      MOVE 2008 - IEEE INFOCOM-2008 workshop on Mobile Networking for Vehicular Environments (Phoenix (AZ, USA)) 13-18 April 2008
      pp.6 (pp.1-6) ISBN:9781424422197 DOI:10.1109/INFOCOM.2008.4544663

    16. An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes
      Proceeding

      Berbecaru, DIANA GRATIELA; Luca, Albertalli
      In: Titolo volume non avvalorato
      IEEE Computer Society
      PDP 2008 - 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing 13-15 Feb. 2008, Toulouse (France)
      (pp.581-589) ISBN:9780769530895 DOI:10.1109/PDP.2008.64

    2007
    1. ICT e l'anima
      Book chapter

      Mezzalama, Marco
      LIVING NETWORK
      Il Sole 24 Ore (ITALIA)
      pp.7 (pp.147-153) ISBN:9788883638565

    2. Algebraic Models to Detect and Solve Policy Conflicts
      Proceeding

      Basile, Cataldo; Cappadonia, Alberto; Lioy, Antonio
      In: Titolo volume non avvalorato
      Springer (GERMANIA)
      MMM-ACNS 2007: 4th Int. Conf. on Mathematical Methods, Models, and Architectures for Computer Network Security (St. Petersburg (Russia)) September 13–15, 2007
      Vol.1 pp.6 (pp.242-247) ISBN:9783540739852 DOI:10.1007/978-3-540-73986-9_20

    3. On the robustness of applications based on the SSL and TLS security protocols
      Article

      Berbecaru, DIANA GRATIELA; Lioy, Antonio
      LECTURE NOTES IN COMPUTER SCIENCE
      Vol.4582 pp.17 (pp.248-264) ISSN:0302-9743 ISBN:9783540734079 DOI:10.1007/978-3-540-73408-6_18

    4. Efficient and robust pseudonymous authentication in VANET
      Proceeding

      Calandriello, Giorgio; Papadimitratos, P.; Hubaux, J. P.; Lioy, Antonio
      In: Titolo volume non avvalorato
      ACM
      VANET 2007 - 4th ACM international workshop on Vehicular ad-hoc networks (Montreal (Canada)) 10 September 2007
      pp.10 (pp.19-28) ISBN:9781595937391 DOI:10.1145/1287748.1287752

    5. AMBRA - Automated Model-Based Risk Analysis
      Proceeding

      Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
      In: Titolo volume non avvalorato
      ACM
      QoP-2007, ACM workshop on Quality of Protection (Alexandria, VA, USA) October 29, 2007
      (pp.43-48) ISBN:9781595938855 DOI:10.1145/1314257.1314272

    6. An estimation of attack surface to evaluate network (in)security
      Proceeding

      Atzeni, Andrea; Lioy, Antonio
      In: Titolo volume non avvalorato
      ICEIS 2007 - 9th International Conference on Enterprise Information Systems (Funchal (Portugal)) 12-16 June 2007
      (pp.493-498) ISBN:9789728865900

    7. Dependability in wireless networks: can we rely on WiFi?
      Article

      Aime, MARCO DOMENICO; Calandriello, Giorgio; Lioy, Antonio
      IEEE SECURITY & PRIVACY
      IEEE
      Vol.5 pp.7 (pp.23-29) ISSN:1540-7993 DOI:10.1109/MSP.2007.4

    2006
    1. Public Key Infrastructure - theory and practice
      Edited by

      Atzeni, Andrea; Lioy, Antonio
      Springer (GERMANIA)
      pp.261 (pp.1-261) ISBN:9783540351511

    2. Fighting e-mail abuses: the EMPE approach
      Proceeding

      Lioy, Antonio; Pala, Massimiliano
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Titolo volume non avvalorato
      Springer
      Third European PKI Workshop: Theory and Practice, EuroPKI 2006 (Turin (Italy)) June 19-20, 2006
      Vol.4043 pp.15 (pp.130-144) ISSN:0302-9743 ISBN:9783540351511 DOI:10.1007/11774716_11

    3. A wireless distributed intrusion detection system and a new attack model
      Proceeding

      Aime, MARCO DOMENICO; Calandriello, Giorgio; Lioy, Antonio
      In: Titolo volume non avvalorato
      ISCC-2006: 11th IEEE Int. Symp. on Computers and Communications (Cagliari (Italy)) June 26-29, 2006
      pp.6 (pp.35-40) ISBN:9780769525884 DOI:10.1109/ISCC.2006.22

    4. On the Tradeoff between Performance and Security in OCSP-Based Certificate Revocation Systems for Wireless Environments
      Proceeding

      Berbecaru, DIANA GRATIELA
      In: Proceedings of the Eleventh IEEE Symposium on Computers and Communications (ISCC'06)
      ISCC 2006 (Pula-Cagliari, Sardegna (Italia)) 26-29 Giugno 2006
      (pp.340-346) DOI:10.1109/ISCC.2006.114

    5. Opaque channel: contrasting information leakage in wireless scenarios
      Proceeding

      Aime, MARCO DOMENICO; Atzeni, Andrea
      In: Titolo volume non avvalorato
      AICA-2006 (Cesena (Italy)) September 21-22, 2006
      (pp.481-490) ISBN:9788860550750

    6. PKI past, present and future
      Article

      Lioy, Antonio; Marian, Marius Adrian; Moltchanova, N.; Pala, Massimiliano
      INTERNATIONAL JOURNAL OF INFORMATION SECURITY
      Vol.5 pp.12 (pp.18-29) ISSN:1615-5262 DOI:10.1007/s10207-005-0077-9

    2005
    1. The wireless opaque channel to contrast information leakage
      Proceeding

      Aime, MARCO DOMENICO; Atzeni, Andrea; Lioy, Antonio
      In: Titolo volume non avvalorato
      WoWMoM-2005, IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (Taormina, Italy) June 13-16, 2005
      Vol.3 (pp.570-575) ISBN:9780769523422 DOI:10.1109/WOWMOM.2005.104

    2. Motivations for a theoretical approach to WYSIWYS
      Proceeding

      Lioy, Antonio; Ramunno, Gianluca; Aime, MARCO DOMENICO; Pala, Massimiliano
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Titolo volume non avvalorato
      Springer
      9th IFIP TC-6 TC-11International Conference, CMS 2005 (Salzburg (AT)) September 19 – 21, 2005
      Vol.3677 pp.2 (pp.289-290) ISSN:0302-9743 ISBN:9783540287919 DOI:10.1007/11552055_38

    3. La sicurezza informatica:dai virus ai cavalli di Troia
      Article

      Mezzalama, Marco
      QUADERNI - ACCADEMIA DELLE SCIENZE DI TORINO
      Accademia delle Scienze di Torino
      Vol.13 pp.11 (pp.3-13) ISSN:1125-0402

    4. On Measuring SSL-based Secure Data Transfer with Handheld Devices
      Proceeding

      Berbecaru, DIANA GRATIELA
      In: Proceedings of 2nd IEEE International Symposium on Wireless Communication Systems 2005 (ISWCS 2005)
      ISWCS 2005 (Siena, Italia) 5-7 Settembre 2005
      (pp.409-413) ISBN:9780780392076 DOI:10.1109/ISWCS.2005.1547731

    5. FIrDA-SSL: Experiments with securing communication in PANs
      Proceeding

      Berbecaru, DIANA GRATIELA
      In: Proceedings of First IEEE/CREATE-NET Workshop on Security and QoS in Communications Networks (SeCQoS 2005), held in conjunction with SecureComm-2005: IEEE/Create-Net International Conference on Security and Privacy for Emerging Areas in Communication Networks
      SeCQoS 2005 (Atene, Grecia) 5-9 Settembre 2005
      (pp.295-305) ISBN:9780780394698 DOI:10.1109/SECCMW.2005.1588324

    6. Why to adopt a security metric? A little survey
      Proceeding

      Atzeni, Andrea; Lioy, Antonio
      In: Titolo volume non avvalorato
      Springer
      QoP-2005: Quality of Protection workshop (Milano (Italy)) September 15, 2005
      pp.12 (pp.1-12) ISBN:9780387290164 DOI:10.1007/978-0-387-36584-8_1

    7. A generic overall framework for network security evaluation
      Proceeding

      Atzeni, Andrea; Lioy, Antonio; Tamburino, Lucia
      In: Titolo volume non avvalorato
      AICA-2005 (Udine (Italy)) October 5-7, 2005
      pp.11 (pp.605-615) ISBN:9788884202871

    8. POSITIF: un approccio olistico alla sicurezza basato su politiche formali
      Proceeding

      Basile, Cataldo; Lioy, Antonio; Marian, Marius Adrian
      In: Titolo volume non avvalorato
      AICA-2005 (Udine (Italy)) October 5-7, 2005
      pp.10 (pp.710-719) ISBN:9788884202871

    9. Incremental trust: building trust from past experience
      Proceeding

      Aime, MARCO DOMENICO; Lioy, Antonio
      In: Titolo volume non avvalorato
      WoWMoM 2005: IEEE Int. Symp. on a World of Wireless Mobile and Multimedia Networks (Taormina (Italy)) June 13-16, 2005
      pp.6 (pp.603-608) ISBN:9780769523422 DOI:10.1109/WOWMOM.2005.54

    10. Decentralised access control in 802.11 networks
      Proceeding

      Aime, MARCO DOMENICO; Lioy, Antonio; Ramunno, Gianluca
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Titolo volume non avvalorato
      Springer
      9th IFIP TC-6 TC-11International Conference, CMS 2005 (Salzburg (AT)) September 19 – 21, 2005
      Vol.3677 pp.11 (pp.180-190) ISSN:0302-9743 ISBN:9783540287919 DOI:10.1007/11552055_18

    2004
    1. MBS-OCSP: An OCSP based certificate revocation system for wireless environments
      Proceeding

      Berbecaru, DIANA GRATIELA
      In: Proceedings of the 4th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2004)
      IEEE ISSPIT 2004 (Roma, Italia) 18-21 Dicembre 2004
      (pp.267-272) ISBN:9780780386891 DOI:10.1109/ISSPIT.2004.1433737

    2. Multiple electronic signatures on multiple documents
      Proceeding

      Lioy, Antonio; Ramunno, Gianluca
      In: Titolo volume non avvalorato
      ICETE'04: IADIS Int. Conf. on E-Business and Telecommunication Networks (Setubal (Portugal)) August 24-28, 2004
      pp.11 (pp.24-34) ISBN:9789728865177

    3. Towards an algebraic approach to solve policy conflicts
      Proceeding

      Basile, Cataldo; Lioy, Antonio
      In: Titolo volume non avvalorato
      FCS'04: Foundations of Computer Security (Turku (Finland)) July 12-13, 2004
      pp.20 (pp.319-338) ISBN:9789521213724

    4. Preliminary steps in designing and implementing a privilege verifier for PMI
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio
      In: Titolo volume non avvalorato
      ICWI-2004: IADIS International Conference on WWW/Internet (Madrid (Spain)) October 6-9, 2004
      pp.8 (pp.317-324) ISBN:9789729935305

    5. The EuroPKI experience
      Proceeding

      Lioy, Antonio; Marian, M.; Moltchanova, N.; Pala, M.
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Titolo volume non avvalorato
      First European PKI Workshop: Research and Applications, EuroPKI 2004 (Samos Island (GR)) June 25-26, 2004
      Vol.3093 pp.14 (pp.14-27) ISSN:0302-9743 ISBN:9783540222163 DOI:10.1007/978-3-540-25980-0_2

    6. Digital certificates and public-key infrastructures
      Book chapter

      Berbecaru, DIANA GRATIELA; Derenale, Corrado; Lioy, Antonio
      Information Security Policies and Actions in Modern Integrated Systems
      IDEA group publishing
      pp.34 (pp.65-98) ISBN:9781591401865

    7. Security of 802.11 wireless networks
      Book chapter

      Aime, MARCO DOMENICO; Lioy, Antonio; Mazzocchi, Daniele
      Security and privacy in advanced networking technologies
      IOS Press (PAESI BASSI)
      pp.50 (pp.51-100) ISBN:9781586034306

    2003
    1. DNS-based implementation of a PKI repository
      Other

      Berbecaru, DIANA GRATIELA; Marius, Marian
      (pp.157-165)

    2. A practical approach to expressing digitally signed documents
      Other

      Berbecaru, DIANA GRATIELA; Marius, Marian
      (pp.79-86)

    3. “Sicurezza e business in rete”
      Article

      Mezzalama, Marco; E., Calia
      MONDO DIGITALE
      Vol.2 ISSN:1720-898X

    4. Communications and Multimedia Security - Advanced Techniques for Network and Data Protection
      Edited by

      Lioy, Antonio; Mazzocchi, D.
      Springer (GERMANIA)
      Vol.LNCS-2828 pp.263 (pp.1-263) ISBN:9783540201854

    5. Support for public-key infrastructures in DNS
      Proceeding

      Marius, Marian; Berbecaru, DIANA GRATIELA
      In: Proceedings of the International Symposium on systems theory, automation, robotics, computers, informatics, electronics and instrumentation, SINTES 11 – XIth edition, Vol II, Software engineering, Computer engineering and Electronics
      SINTES 11 - XI th edition (Craiova) 23-24 Ottobre 2003
      Vol.II pp.6 (pp.451-456)

    6. Representation of E-documents in AIDA Project
      Proceeding

      Berbecaru, DIANA GRATIELA; Marius, Marian
      In: Proceedings of the International Symposium on systems theory, automation, robotics, computers, informatics, electronics and instrumentation, SINTES 11 – XIth edition, Vol II, Software engineering, Computer engineering and Electronics
      SINTES 11 - XI th edition (Craiova) 23-24 Ottobre 2003
      Vol.II pp.6 (pp.393-398)

    2002
    1. Management of attribute certificates for access control, Scientific Journal of the University of Craiova, Analele UNIVERSITATII DIN CRAIOVA, seria: Inginerie Electrica, Nr. 26/2002, Volumul II ISSN 1223-530X
      Other

      Berbecaru, DIANA GRATIELA; Marius, Marian
      (pp.10-21)

    2. Towards Simplifying PKI Implementation: Client-Server based Validation of Public Key Certificates
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio
      In: Titolo volume non avvalorato
      IEEE Int. Symp. on Signal Processing and Information Technology (ISSPIT-2002) (Marrakech (Marocco)) December 18-21, 2002
      pp.6 (pp.277-282) ISBN:9780972718608

    3. Security aspects in standard certificate revocation mechanisms: a case study for OCSP
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian
      In: Titolo volume non avvalorato
      7th IEEE Symp. on Computers and Communications (ISCC-2002) (Taormina/Giardini Naxos (Italy)) 1 - 4 July 2002
      pp.6 (pp.484-489) ISBN:9780769516714 DOI:10.1109/ISCC.2002.1021719

    4. Verso applicazioni concrete della firma digitale (II parte)
      Article

      Lioy, Antonio; Berbecaru, DIANA GRATIELA; Mazzocchi, Daniele; Maino, Fabio Rodolfo; Ramunno, Gianluca
      IGED.IT
      Vol.1 pp.9 (pp.26-34) ISSN:1720-6618

    5. Wireless security: current status and future evolution
      Proceeding

      Aime, MARCO DOMENICO; Lioy, Antonio; D., Mazzocchi
      In: Titolo volume non avvalorato
      AICA 2002 (Conversano (BA), Italy) September 25-27, 2002
      pp.14 (pp.1-14)

    6. Secure digital administration in medical environment
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian; Marano, D.
      In: Titolo volume non avvalorato
      ICWI-2002: IADIS Int. Conf. on WWW/Internet (Lisbon (Portugal)) November 13-15, 2002
      pp.8 (pp.299-306) ISBN:9789729027536

    7. Towards simplifying PKI implementation: client-server based validation of public-key certificates
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio
      In: Titolo volume non avvalorato
      ISSPIT-2002: IEEE Int. Symp. on Signal Processing and Information Technology (Marrakesh (Marocco)) December 18-21, 2002
      pp.6 (pp.277-282) ISBN:9780972718608

    2001
    1. A Framework for Secure Digital Administration
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian
      In: Titolo volume non avvalorato
      EuroWeb 2001 - the web in Public Administration (Pisa (Italy)) December 18-20, 2001
      pp.15 (pp.119-133) ISBN:9788888327334

    2. PKI-based System Management
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian
      In: Titolo volume non avvalorato
      SACCS 2001 - 7th Int. Symp. on Automatic Control and Computer Science (Iasi (Romania)) 26-27 October 2001
      pp.16

    3. On the complexity of public-key certificate validation
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio; Marian, Marius Adrian
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Titolo volume non avvalorato
      Springer
      Information Security 4th International Conference, ISC 2001 (Malaga (ESP)) October 1–3, 2001
      Vol.2200 pp.21 (pp.183-203) ISSN:0302-9743 ISBN:9783540426622 DOI:10.1007/3-540-45439-X_13

    4. Verso applicazioni concrete della firma digitale (I parte)
      Article

      Lioy, Antonio; Berbecaru, DIANA GRATIELA; Mazzocchi, Daniele; Maino, Fabio Rodolfo; Ramunno, Gianluca
      IGED.IT
      Vol.4 pp.6 (pp.32-37) ISSN:1720-6618

    5. Towards a Policy System for IPsec: issues and an experimental implementation
      Proceeding

      Baltatu, Madalina; Lioy, Antonio; Mazzocchi, Daniele
      In: Titolo volume non avvalorato
      ICON-2001: IEEE Int. Conf. on Networks (Bangkok (Thailand)) October 10-12
      pp.6 (pp.146-151) ISBN:9780769511863 DOI:10.1109/ICON.2001.962332

    6. Synthesis of Power-Managed Sequential Components Based on Computational Kernel Extraction
      Article

      Benini, L.; DE MICHELI, G.; Lioy, Antonio; Macii, Enrico; Odasso, Giuseppe; Poncino, Massimo
      IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
      Vol.20 pp.14 (pp.1118-1131) ISSN:0278-0070 DOI:10.1109/43.945307

    7. Sicurezza dei sistemi informativi
      Book chapter

      Lioy, Antonio; Mezzalama, Marco
      Sistemi informativi
      Franco Angeli (ITALIA)
      Vol.5 pp.86 (pp.124-209) ISBN:9788846432704

    8. IP security
      Book chapter

      Baltatu, Madalina; Lioy, Antonio
      Advanced Security Technologies in Networking
      IOS press (PAESI BASSI)
      pp.14 (pp.95-108) ISBN:9781586031565

    2000
    1. Struttura, organizzazione e progetto dei calcolatori. Interdipendenza fra hardware e software – Seconda Edizione
      Book

      Mezzalama, Marco; Corno, Fulvio; Farinetti, Laura; SONZA REORDA, Matteo
      Jackson Libri (ITALIA)
      pp.896 ISBN:9788825615173

    2. A flexible management framework for certificate status validation
      Proceeding

      Berbecaru, DIANA GRATIELA; Corradi, A.; Lioy, Antonio; Maino, Fabio Rodolfo; Montanari, R.; Stefanelli, C.
      In: Titolo volume non avvalorato
      Kluwer
      IFIP/SEC-2000: 15th IFIP Int. Conf. on Information Security (Bejing (China)) August 22-24, 2000
      pp.10 (pp.481-490) ISBN:9780792379140

    3. Towards concrete application of electronic signature
      Proceeding

      Berbecaru, DIANA GRATIELA; Lioy, Antonio; Mazzocchi, Daniele; Maino, Fabio Rodolfo; Ramunno, Gianluca
      In: Titolo volume non avvalorato
      AICA conference 2000 (Taormina (Italy)) 27-30 September 2000
      pp.19 (pp.543-561)

    4. DNS security
      Proceeding

      Lioy, Antonio; Maino, Fabio Rodolfo; Marian, Marius Adrian; Mazzocchi, Daniele
      In: Titolo volume non avvalorato
      TNC-2000: Terena Networking Conf. (Lisbon (Portugal)) May 22-25, 2000
      pp.13

    5. Security Policy System: status and perspective
      Proceeding

      Baltatu, Madalina; Lioy, Antonio; Mazzocchi, Daniele
      In: Titolo volume non avvalorato
      ICON-2000: IEEE Int. Conf. On Networks (Singapore) September 5-8, 2000
      pp.7 (pp.278-284) ISBN:9780769507774 DOI:10.1109/ICON.2000.875802

    6. Security issues in control, management and routing protocols
      Proceeding

      Baltatu, Madalina; Lioy, Antonio; Maino, Fabio Rodolfo; Mazzocchi, Daniele
      In: Titolo volume non avvalorato
      TNC-2000: Terena Networking Conference 2000 (Lisbon (Portugal)) May 22-25, 2000
      pp.12

    7. Security issues in control, management, and routing protocols
      Article

      Baltatu, Madalina; Lioy, Antonio; Maino, Fabio Rodolfo; Mazzocchi, Daniele
      COMPUTER NETWORKS
      Vol.34, no.6 pp.14 (pp.881-894) ISSN:1389-1286

    1999
    1. Computational Kernels and their Application to Sequential Power Optimization
      Proceeding

      Benini, L; DE MICHELI, G; Lioy, Antonio; Macii, Enrico; Odasso, G; Poncino, Massimo
      In: Titolo volume non avvalorato
      DAC-35: ACM/IEEE Design Automation Conference (San Francisco, CA)
      (pp.764-769) ISBN:9780897919647 DOI:10.1145/277044.277237

    2. Il PC e Internet
      Book

      A. R., Meo; Mezzalama, Marco; F., Peiretti
      UTET (ITALIA)

    3. Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting
      Article

      Benini, I. L.; DE MICHELI, G.; Lioy, Antonio; Macii, Enrico; Odasso, G.; Poncino, Massimo
      IEEE TRANSACTIONS ON COMPUTERS
      Vol.48 pp.11 (pp.769-779) ISSN:0018-9340 DOI:10.1109/12.795120

    1998
    1. Timed Supersetting and the Synthesis of Large Telescopic Units
      Proceeding

      Benini, L; DE MICHELI, G; Lioy, Antonio; Macii, Enrico; Odasso, G; Poncino, Massimo
      In: Titolo volume non avvalorato
      GLS-VLSI-98: IEEE/ACM 8th Great Lakes Symposium on VLSI (Lafayette, LA)
      (pp.331-337) ISBN:9780818684098 DOI:10.1109/GLSV.1998.665289

    2. “1887-1897: Galileo Ferraris Amministratore
      Book

      Mezzalama, Marco; R., Roccia; P., Uscello
      Archivio Storico della Città di Torino (ITALIA)

    3. Providing X.509-based user access control to web servers
      Proceeding

      Lioy, Antonio; Maino, F.
      In: Titolo volume non avvalorato
      SEC'98: IFIP Int. Information Security Conf. Aug. 31 - Sep. 4
      (pp.61-71)

    4. Security aspects of IPv6
      Book chapter

      Lioy, Antonio
      Internetworking IPv6 with Cisco routers
      McGraw-Hill (STATI UNITI D'AMERICA)
      (pp.151-166) ISBN:9780070228368

    5. La sicurezza nelle reti di calcolatori: dai firewall alla firmadigitale
      Other

      Lioy, Antonio; Mezzalama, M.

    1997
    1. A Parallel Approach to Symbolic Traversal Based on Set Partitioning
      Proceeding

      Cabodi, Gianpiero; Camurati, Paolo Enrico; Lioy, Antonio; Poncino, M.; Quer, Stefano
      In: Titolo volume non avvalorato
      CHARME’97: Correct Hardware Methodologies
      ISBN:9780412813306

    2. Accurate entropy calculation for large logic circuits based on output clustering
      Proceeding

      Lioy, Antonio; Macii, Enrico; Poncino, Massimo; M., Rossello
      In: Titolo volume non avvalorato
      IEEE
      7th Great Lakes Symposium on VLSI (Urbana-Champaign, IL (USA)) 13-15 Mar 1997
      (pp.70-75) ISBN:9780818679049 DOI:10.1109/GLSV.1997.580413

    3. Formazione continua e didattica a distanza
      Proceeding

      Farinetti, Laura; Malnati, Giovanni; Mezzalama, Marco
      In: Titolo volume non avvalorato
      Simposio Didattica e Informatica

    4. Providing security to the building licenses delivering process in the city of Torino
      Proceeding

      Lioy, Antonio; Maino, F.
      In: Titolo volume non avvalorato
      JENC8: 8th Joint European Networking Conf. May 12-15
      (pp.432.1-432.6)

    5. Non-intrusive authentication
      Proceeding

      Galliano, D. A.; Lioy, Antonio; Maino, F.
      In: Titolo volume non avvalorato
      SEC'97: IFIP Int. Information Security Conf.
      (pp.440-451)

    6. Secure document management and distribution in an open network environment
      Proceeding

      Lioy, Antonio; Maino, F.; Mezzalama, Marco
      LECTURE NOTES IN COMPUTER SCIENCE
      In: Titolo volume non avvalorato
      Springer
      Information and Communications Security First International Conference, ICIS '97 (Beijing (CHN)) November 11–14, 1997
      Vol.1334 pp.9 (pp.109-117) ISSN:0302-9743 ISBN:9783540636960 DOI:10.1007/BFb0028467

    7. Aspetti di sicurezza in IPv6
      Book chapter

      Lioy, Antonio
      IPv6: il nuovo protocollo per Internet e le Intranet
      McGraw-Hill Italia (ITALIA)
      (pp.139-151) ISBN:9788838632099

    1995
    1. Testing Hyperactive Faults in Asynchronous Circuits
      Proceeding

      Lioy, Antonio; Maino, F.; Odasso, G.; Poncino, Massimo
      In: Titolo volume non avvalorato
      IEEE Pacific Rim Conference on Communications, Computer and Signal Processing
      ISBN:9780780325531 DOI:10.1109/PACRIM.1995.519572

    2. Exact Functional Redundancy Identification
      Proceeding

      Lioy, Antonio; Poncino, Massimo
      In: Titolo volume non avvalorato
      IEEE Pacific Rim Conference on Communications, Computer and Signal Processing
      ISBN:9780780325531 DOI:10.1109/PACRIM.1995.519570

    3. Insegnamento a distanza presso il Politecnico di Torino: esperienze nell'ambito del Consorzio Nettuno
      Proceeding

      Mezzalama, Marco; F., Profumo; L., Pozzolo
      In: Titolo volume non avvalorato
      Terzo Convegno Universita` ed Evoluzione Tecnologie Informatiche giugno

    1993
    1. On the equivalence of fanout-point faults
      Article

      Lioy, Antonio
      IEEE TRANSACTIONS ON COMPUTERS
      IEEE
      Vol.42 pp.4 (pp.268-271) ISSN:0018-9340 DOI:10.1109/12.210169

    2. Exact Computation of Detectability Profile,''
      Proceeding

      Fahrat, H.; Lioy, Antonio; Poncino, Massimo
      In: Titolo volume non avvalorato
      CICC'93: IEEE Custom Integrated Circuits Conference
      ISBN:9780780312814 DOI:10.1109/ISCAS.1993.394021

    3. On the Resetability of Synchronous Sequential Circuits
      Proceeding

      Lioy, Antonio; Poncino, Massimo
      In: Titolo volume non avvalorato
      ISCAS'93: IEEE Int. Symposium on Circuits and Systems
      ISBN:9780780312814 DOI:10.1109/ISCAS.1993.394021

    1992
    1. Advanced Fault Collapsing
      Article

      Lioy, A.
      IEEE DESIGN & TEST OF COMPUTERS
      IEEE
      Vol.9 pp.8 (pp.64-71) ISSN:0740-7475 DOI:10.1109/54.124518

    2. Test Generation for Gate Level Sequential Machines: Algorithms and Implementation Issues
      Proceeding

      Lioy, Antonio; Macii, Enrico; Meo, A. R.
      In: Titolo volume non avvalorato
      CompEuro'92: IEEE 1992 International Conference on Software Engineering (Den Haag, The Netherlands)
      (pp.262-267) ISBN:9780818627606 DOI:10.1109/CMPEUR.1992.218499

    1991
    1. An Algebraic Approach to Test Generation for Sequential Circuits
      Proceeding

      Lioy, Antonio; Macii, Enrico; Meo, A. R.; SONZA REORDA, Matteo
      In: Titolo volume non avvalorato
      GLS-VLSI-91: IEEE/ACM 1st Great Lakes Symposium on VLSI (Kalamazoo, MI)
      (pp.115-120) ISBN:9780818621703 DOI:10.1109/GLSV.1991.143952

    2. Automatic compaction of microcode
      Article

      Lioy, Antonio; Mezzalama, Marco
      MICROPROCESSORS AND MICROSYSTEMS
      Vol.14 ISSN:0141-9331

    3. A Hierarchical Multi-Level Test Generation System
      Proceeding

      Lioy, Antonio; Poncino, Massimo
      In: Titolo volume non avvalorato
      GLS-VLSI'91: 1st Great Lake State Symposium
      ISBN:9780818621703 DOI:10.1109/GLSV.1991.143942

    4. Optimal Absolute Error Starting Values for Newton-Raphson Calculation of Square Root
      Article

      Montuschi, Paolo; Mezzalama, Marco
      COMPUTING
      Vol.46 pp.20 (pp.67-86) ISSN:0010-485X DOI:10.1007/BF02239012

    1990
    1. Diagnosis Oriented Test Pattern Generation
      Proceeding

      Camurati, Paolo Enrico; Lioy, Antonio; Prinetto, Paolo Ernesto; SONZA REORDA, Matteo
      In: Titolo volume non avvalorato
      IEEE / Institute of Electrical and Electronics Engineers Incorporated:445 Hoes Lane:Piscataway, NJ 08854:(800)701-4333, (732)981-0060, EMAIL: subscription-service@ieee.org, INTERNET: http://www.ieee.org, Fax: (732)981-9667
      IEEE European Design Automation Conference
      pp.5 (pp.470-474) ISBN:9780818620249 DOI:10.1109/EDAC.1990.136693

    2. Exact Probabilistic Testability Measures for Multi-Output Circuits
      Article

      Camurati, P; Lioy, A; Prinetto, Paolo Ernesto; SONZA REORDA, Matteo
      JOURNAL OF ELECTRONIC TESTING
      Kluwer Academic Publishers
      Vol.1, Number 3, October 1990 pp.6 (pp.229-234) ISSN:0923-8174 DOI:10.1007/BF00938686

    3. Survey of Square Rooting Algorithms
      Article

      Montuschi, Paolo; Mezzalama, Marco
      IEE PROCEEDINGS. PART E. COMPUTERS AND DIGITAL TECHNIQUES
      Institution of Electrical Engineers
      Vol.137 pp.10 (pp.31-40) ISSN:0143-7062

    1989
    1. Aritmetica dei Calcolatori e Codifica dell'Informazione
      Book

      Mezzalama, Marco; N., Montefusco; Prinetto, Paolo Ernesto
      UTET (ITALIA)

    1987
    1. Improving Diagnostic capabilities of ATEs via AI techniques
      Proceeding

      Camurati, Paolo Enrico; Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: 2nd European Workshop on Fault Diagnostics, Reliability and Related Knowledge-based Approaches
      Pergamon (REGNO UNITO DI GRAN BRETAGNA)
      2nd European Workshop on Fault Diagnostics, Reliability and Related Knowledge-based Approaches (Manchester (UK)) April 1987
      ISBN:9780080349220

    1985
    1. Testing Strategy and Technique for Macro-Based Circuits
      Article

      Somenzi, F; Gai, S; Mezzalama, Marco; Prinetto, Paolo Ernesto
      IEEE TRANSACTIONS ON COMPUTERS
      Vol.C-34, Issue 1, Jan. 1985 (pp.85-90) ISSN:0018-9340 DOI:10.1109/TC.1985.1676519

    2. Dynamic Storage Allocation: Experiments using the C Language
      Article

      S., Gai; Mezzalama, Marco
      SOFTWARE-PRACTICE & EXPERIENCE
      Vol.15 ISSN:0038-0644

    1984
    1. Microprogram Simulation Using a Structured Microcode Model
      Article

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      MICROPROCESSORS AND MICROSYSTEMS
      Butterworth Heinemann
      Vol.13 pp.16 (pp.299-314) ISSN:0141-9331

    2. PART: Programmable Array Testing Based on a Partitioning Algorithm
      Article

      Somenzi, F.; Gai, Silvano; Mezzalama, Marco; Prinetto, Paolo Ernesto
      IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
      IEEE
      Vol.3 pp.8 (pp.142-149) ISSN:0278-0070 DOI:10.1109/TCAD.1984.1270068

    1983
    1. ``Experiments in Automatic Classification of Laringeal Pathology
      Article

      B., Morra; Mezzalama, Marco; Prinetto, Paolo Ernesto
      MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING
      Peter Peregrinus
      Vol.21 pp.9 (pp.603-611) ISSN:0140-0118

    2. A Review of Fault Models for LSI/VLSI Devices
      Article

      S., Gai; Mezzalama, Marco; Prinetto, Paolo Ernesto
      SOFTWARE & MICROSYSTEMS
      stevenage
      Vol.2 pp.10 (pp.44-53) ISSN:0261-3182

    3. ORION: an integrated system for LSI-VLSI automated synthesis
      Proceeding

      Gai, S.; Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: MELECON '83: 2nd IEEE Mediterranean Electrotechnical Conference
      IEEE Computer Society (STATI UNITI D'AMERICA)
      MELECON '83: 2nd IEEE Mediterranean Electrotechnical Conference (Athens (Greece)) May 24-26, 1983
      ISBN:9789994603565

    4. PLA simulation in a RTL environment
      Proceeding

      Gai, S.; Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: MELECON '83: 2nd IEEE Mediterranean Electrotechnical Conference
      IEEE Computer Society (STATI UNITI D'AMERICA)
      MELECON '83: 2nd IEEE Mediterranean Electrotechnical Conference (Athens (Greece)) May 24-26, 1983
      ISBN:9789994603565

    5. PART: Programmable ARray Testing based on PARTitioning algorithm
      Proceeding

      Somenzi, F.; Gai, S.; Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: Titolo volume non avvalorato
      IEEE Computer Society (STATI UNITI D'AMERICA)
      ISCAS'83: IEEE 1983 International Symposium on Circuits and Systems. (Newport Beach, CA (USA).) May 2-4, 1983
      pp.4 (pp.1298-1301) ISBN:9789993993957

    6. Testing strategies for PLA based circuits
      Proceeding

      Somenzi, F.; Gai, S.; Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: ISCAS'83: IEEE 1983 International Symposium on Circuits and Systems
      IEEE Computer Society (STATI UNITI D'AMERICA)
      ISCAS'83: IEEE 1983 International Symposium on Circuits and Systems (Newport Beach, CA (USA)) May 2-4, 1983
      pp.4 (pp.1302-1305) ISBN:9789993993957

    7. Testable design with PLA macros
      Proceeding

      Gai, S.; Mezzalama, Marco; Prinetto, Paolo Ernesto; Somenzi, F.
      In: VLSI'83: IFIP TC 10/WG 10.5 International Conference on Very Large Scale Integration, 1983
      North-Holland Publishing Co. (PAESI BASSI)
      VLSI'83: IFIP TC 10/WG 10.5 International Conference on Very Large Scale Integration, 1983 (Trondheim (Norway),) Aug 16-19, 1983
      pp.10 (pp.373-382) ISBN:9780444883445

    8. PART: Programmable ARray Testing based on PARTitioning algorithm
      Proceeding

      Somenzi, F.; Gai, S.; Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: FTCS-13: IEEE 13th International Conference on Fault Tolerant Computing
      IEEE Computer Society (STATI UNITI D'AMERICA)
      FTCS-13: IEEE 13th International Conference on Fault Tolerant Computing (Milano (Italy)) June 1983
      pp.4 (pp.430-433) ISBN:9780818600203

    9. A New Integrated System for PLA Testing and Verification
      Proceeding

      Somenzi, F.; Gai, S.; Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: DAC 1983 : 20th Conference on Design Automation 1983
      IEEE Computer Society (STATI UNITI D'AMERICA)
      DAC 1983 : 20th Conference on Design Automation 1983 (Miami, FL (USA)) 27-29 June 1983
      pp.7 (pp.57-63) ISBN:9780818600265

    10. A Hierarchical Description Model for Microcode
      Article

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      IEEE TRANSACTIONS ON COMPUTERS
      Vol.C-32, Issue 5, May 1983 (pp.478-487) ISSN:0018-9340 DOI:10.1109/TC.1983.1676259

    1982
    1. A Machine-Independent Approach to Microprogram Synthesis
      Article

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      SOFTWARE-PRACTICE & EXPERIENCE
      WILEY
      Vol.12 pp.26 (pp.985-1010) ISSN:0038-0644

    2. A Microcomputer-based eye movement automatic analysis system
      Proceeding

      Albera, R.; Massia, G.; Mezzalama, Marco; Monetti, M.; Morra, B.; Prinetto, Paolo Ernesto
      In: MEDCOMP '82: first IEEE Computer Society International Conference on Medical Computer Science/Computational Medicine
      IEEE Computer Society (STATI UNITI D'AMERICA)
      MEDCOMP '82: first IEEE Computer Society International Conference on Medical Computer Science/Computational Medicine (Philadelphia PE (USA),) Sept 23-25, 1982
      pp.6 (pp.248-253)

    3. Microcode compaction via microblock definition
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto; Filippi, G.
      In: MICRO 15 : IEEE 15th annual workshop on Microprogramming
      IEEE Computer Society (STATI UNITI D'AMERICA)
      MICRO 15 : IEEE 15th annual workshop on Microprogramming
      pp.9 (pp.134-142)

    4. Eye Movement Automated Analysis: A New Improved Approach
      Proceeding

      Morra, B.; Albera, R.; Massia, G.; Mezzalama, Marco; Monetti, M.; Prinetto, Paolo Ernesto
      In: ISMII’82: IEEE 1st International Symposium on Medical Imaging and Image Interpretation
      ISMII’82: IEEE 1st International Symposium on Medical Imaging and Image Interpretation (Berlin (Germany)) Oct 1982
      pp.7 (pp.203-209) ISBN:9780892524105 DOI:10.1117/12.934629

    5. Distortions in Non-Harmonic Speech Analysis Via FFT
      Article

      Mezzalama, Marco
      SIGNAL PROCESSING
      ISSN:0165-1684

    1981
    1. A Strategy for Simulating Bit-Slice Based Microprogrammable Systems
      Article

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      MICROPROCESSING AND MICROPROGRAMMING
      ELSEVIER
      Vol.7 pp.10 (pp.334-343) ISSN:0165-6074

    2. DEFASM: a Microprogram Meta-assembler With Semantic Capability
      Article

      Mezzalama, Marco; Prinetto, Paolo Ernesto; S., Romani
      SOFTWARE & MICROSYSTEMS
      Stevenage, Herts.: Institution of Electrical Engineers
      Vol.128 pp.10 (pp.133-142) ISSN:0261-3182

    3. Microinstruction Modeling using timing and semantic constraints
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: SMD’81 : Simulation, Modeling and Development
      Acta Press (STATI UNITI D'AMERICA)
      SMD’81 : Simulation, Modeling and Development (Cairo (Egypt)) Sep 1-3, 1981
      pp.4 (pp.32-35) ISBN:9780889860308

    4. A hierarchical integrated system for microcode development
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto; Visintin, I.
      In: EUROMICRO `81: 7th Euromicro Symposium on Implementing Functions: Microprocessing and Firmware
      Elsevier Science Ltd
      EUROMICRO `81: 7th Euromicro Symposium on Implementing Functions: Microprocessing and Firmware (Paris (France)) Sept 1981
      pp.10 (pp.251-260) ISBN:9780444862822

    5. Testing strategies for VLSI’s
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: ICCSCS 1981: 4th Int. Conference on Control System and Computer Science
      I.P.B. Centrul de multiplicare - Str Splaiul Independentei, 313 (ROMANIA)
      ICCSCS 1981: 4th Int. Conference on Control System and Computer Science (Bucharest (Rumania)) June 17-20, 1981
      Vol.1 pp.7 (pp.287-293)

    6. Firmware description languages for a microprogram meta assembler
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: CHDL'81: IFIP TC-10 Fifth International Conference on Computer Hardware Description Languages and Their Applications, 1981
      North-Holland Publishing Co. (PAESI BASSI)
      CHDL'81: IFIP TC-10 Fifth International Conference on Computer Hardware Description Languages and Their Applications, 1981 (Kaiserslautern (Germany)) Sept 7-9, 1981
      pp.14 (pp.267-280) ISBN:9780444862792

    7. Timing analysis and logic verification via user selectable multiple value logics
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto; Visintin, I.
      In: ECCTD’81
      Delft University Press - North-Holland Publishing Company
      ECCTD’81 : IEEE European Conference on Circuit Theory and Design (The Hague (The Netherlands)) August 1981
      pp.6 (pp.346-351)

    8. Needs and trends on host computer organization to aid VLSI design
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: MELECON `81 : IEEE 1st Mediterranean Electrotechnical Conference
      IEEE (STATI UNITI D'AMERICA)
      MELECON `81 : IEEE 1st Mediterranean Electrotechnical Conference (Tel Aviv (Israel)) May 24-28, 1981
      pp.1 ISBN:9789991737010

    9. Optimal choice of multiple value sets for logic design verification
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto; Visintin, I.
      In: APCMS 1981 : 12th annual Pittsburg Conference on Modelling and Simulation
      School of Engineering, University of Pittsburgh (STATI UNITI D'AMERICA)
      APCMS 1981 : 12th annual Pittsburg Conference on Modelling and Simulation (Pittsburg PE (USA)) Apr 30-May 1, 1981
      Vol.12 - part 4 pp.7 (pp.1513-1519) ISBN:9780876645628

    1980
    1. A machine instruction level concurrent simulator for multiprocessor systems
      Proceeding

      Meo, ANGELO RAFFAELE; Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: EUROMICRO’80 : Microprocessor systems
      EUROMICRO’80 : Microprocessor systems (London (U.K.)) September 1980
      pp.10 (pp.125-134)

    2. DESMI: a procedual H.D.L. for machine instruction specification
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: MIMI’80 : Mini and microcomputers and their applications
      Acta Press (STATI UNITI D'AMERICA)
      MIMI’80 : Mini and microcomputers and their applications (Budapest (Hungary)) September 1980
      pp.7 (pp.302-308) ISBN:9780889860247

    1979
    1. Influence of the Position of the Analysis Frame in LPC Pitch-Synchronous Analysis
      Article

      Mezzalama, Marco
      PATTERN RECOGNITION
      ELSEVIER
      Vol.1 pp.13 (pp.191-203) ISSN:0031-3203

    2. Design and implementation of a flexible and interactive microprogram simulator
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: MICRO 12 : IEEE 12th Annual Microprogramming Workshop
      IEEE Computer Society (STATI UNITI D'AMERICA)
      MICRO 12 : IEEE 12th Annual Microprogramming Workshop (Hershey, PE (USA)) Nov 18-21, 1979
      pp.7 (pp.42-48)

    3. Hardware-software trade-offs in evaluation of mathematical functions in microcomputers
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: Informatica 1979 : XIV Yugoslav International Symposium on Information Processing
      INFORMATIKA, Slovene Computer Society
      Informatica 1979 : XIV Yugoslav International Symposium on Information Processing (Bled (Yugoslavia)) Oct 1-6, 1979

    4. An interactive microprogram simulator
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: MIMI 1979 : IEEE 1st International Micro and Mini Computer Conference
      IEEE Computer Society (STATI UNITI D'AMERICA)
      MIMI 1979 : IEEE 1st International Micro and Mini Computer Conference (Houston, TX (USA)) November 1979
      pp.6 (pp.159-164)

    1978
    1. A Micro-processor Executive for Real-time Process Control
      Article

      Mezzalama, Marco; P., Torasso
      EUROMICRO JOURNAL
      North Holland
      Vol.4 pp.6 (pp.109-114) ISSN:0167-3858

    2. MAP: a proposal for a microprogrammable arithmetic processor
      Proceeding

      Mezzalama, Marco; Prinetto, Paolo Ernesto
      In: Informatica 1978 : XIII Yugoslav International Symposium on Information Processing
      Informatica 1978 : XIII Yugoslav International Symposium on Information Processing (Bled (Yugoslavia)) Oct 2-7, 1978

    1977
    1. A Syntactic Procedure for the Recognition of Glottal Pulse in Continuous Speech
      Article

      R., De Mori; Laface, Pietro; V. A., Makhonice; Mezzalama, Marco
      PATTERN RECOGNITION
      Elsevier
      Vol.9 pp.9 (pp.181-189) ISSN:0031-3203

    1975
    1. The influence of phase and windowing in pitch-synchronous analysis of speech
      Proceeding

      Mezzalama, Marco; Piccolo, Elio; Rusconi, E.
      In: Titolo volume non avvalorato
      Audio Engineering Society 50th Convention (London)

    2. Un sistema per l'analisi del linguaggio parlato
      Proceeding

      Mezzalama, Marco; Piccolo, Elio
      In: Titolo volume non avvalorato
      Seminario sulla Sintesi della Voce (Padova) 16-17 maggio
      pp.18 (pp.107-124)

    1974
    1. A general speech analysis system
      Proceeding

      Mezzalama, Marco; Piccolo, Elio; Rusconi, E.
      In: Titolo volume non avvalorato
      Informatica 1974 (Bled (JU)) 7-12 Oct.
      pp.3 (pp.6.6-6.8)