Follow
Clemente Galdi
Clemente Galdi
Associate Professor of Computer Science, Universita' di Salerno
Verified email at unisa.it
Title
Cited by
Cited by
Year
Minority becomes majority in social networks
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
International conference on web and internet economics, 74-88, 2015
462015
Hypergraph decomposition and secret sharing
G Di Crescenzo, C Galdi
Discrete Applied Mathematics 157 (5), 928-946, 2009
462009
Neural network techniques for proactive password checking
A Ciaramella, P D'Arco, A De Santis, C Galdi, R Tagliaferri
IEEE Transactions on Dependable and Secure Computing 3 (4), 327-339, 2006
462006
Hyppocrates: a new proactive password checker
C Blundo, P D’Arco, A De Santis, C Galdi
Journal of Systems and Software 71 (1-2), 163-175, 2004
332004
ERBAC: event-driven RBAC
P Bonatti, C Galdi, D Torres
Proceedings of the 18th ACM symposium on Access control models andá…, 2013
322013
Generalized Discrete Preference Games.
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
IJCAI 16, 53-59, 2016
282016
e-Auctions for multi-cloud service provisioning
M Anisetti, CA Ardagna, PA Bonatti, E Damiani, M Faella, C Galdi, ...
2014 IEEE International Conference on Services Computing, 35-42, 2014
262014
Network load games
I Caragiannis, C Galdi, C Kaklamanis
International Symposium on Algorithms and Computation, 809-818, 2005
252005
Robustness in discrete preference games
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
Proceedings of the 16th Conference on Autonomous Agents and MultiAgentá…, 2017
242017
Information retention in heterogeneous majority dynamics
V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano
International Conference on Web and Internet Economics, 30-43, 2017
212017
Analysis of a two-factor graphical password scheme
L Catuogno, C Galdi
International journal of information security 13 (5), 421-437, 2014
212014
On the security of a two-factor authentication scheme
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practicesá…, 2010
192010
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
L Catuogno, C Galdi
IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008
192008
Recommendation in museums: paths, sequences, and group satisfaction maximization
S Rossi, F Barile, C Galdi, L Russo
Multimedia Tools and Applications 76 (24), 26031-26055, 2017
182017
On the evaluation of security properties of containerized systems
L Catuogno, C Galdi
2016 15th International Conference on Ubiquitous Computing andá…, 2016
172016
Towards a mechanism for incentivating privacy
PA Bonatti, M Faella, C Galdi, L Sauro
European Symposium on Research in Computer Security, 472-488, 2011
172011
Event-driven RBAC
P Bonatti, C Galdi, D Torres
Journal of Computer Security 23 (6), 709-757, 2015
162015
Certified e-mail with temporal authentication: An improved optimistic protocol
C Galdi, R Giordano
International Conference on Trust, Privacy and Security in Digital Businessá…, 2004
142004
An effective methodology for measuring software resource usage
L Catuogno, C Galdi, N Pasquino
IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018
112018
Validating orchestration of web services with bpel and aggregate signatures
C Blundo, E De Cristofaro, C Galdi, G Persiano
2008 Sixth European Conference on Web Services, 205-214, 2008
112008
The system can't perform the operation now. Try again later.
Articles 1–20