default search action
Luigi Romano
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c85]Luigi Coppolino, Alessandro De Crecchio, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Federica Uccello:
Exploiting Data Spaces to Enable Privacy Preserving Data Exchange in the Energy Supply Chain. ITASEC 2024 - [i4]Luigi Coppolino, Salvatore D'Antonio, Davide Iasio, Giovanni Mazzeo, Luigi Romano:
An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDX. CoRR abs/2408.00443 (2024) - 2023
- [j36]Luigi Romano, Michele Godio, Pär Johannesson, Fredrik Bruzelius, Toheed Ghandriz, Bengt Jacobson:
Development of the Västra Götaland Operating Cycle for Long-Haul Heavy-Duty Vehicles. IEEE Access 11: 73268-73302 (2023) - [c84]Luigi Coppolino, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Andrej Souvent:
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids. ARES 2023: 80:1-80:10 - [c83]Luigi Coppolino, Giovanni Mazzeo, Luigi Romano:
Awesome Trusted Execution Environment. DSN-S 2023: 5-6 - [c82]Luigi Coppolino, Roberto Nardone, Luigi Romano:
Securing FIWARE with TEE Technology. SoMeT 2023: 149-160 - 2022
- [j35]Luigi Romano, Pär Johannesson, Erik Nordström, Fredrik Bruzelius, Rickard Andersson, Bengt Jacobson:
A Classification Method of Road Transport Missions and Applications Using the Operating Cycle Format. IEEE Access 10: 73087-73121 (2022) - [j34]Luigi Coppolino, Salvatore D'Antonio, Vincenzo Giuliano, Giovanni Mazzeo, Luigi Romano:
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants. Comput. Ind. 136: 103589 (2022) - [j33]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
PriSIEM: Enabling privacy-preserving Managed Security Services. J. Netw. Comput. Appl. 203: 103397 (2022) - [j32]Luigi Coppolino, Luigi Sgaglione, Salvatore D'Antonio, Mario Magliulo, Luigi Romano, Roberto Pacelli:
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes. SN Comput. Sci. 3(1): 16 (2022) - [j31]Giovanni Mazzeo, Sergei Arnautov, Christof Fetzer, Luigi Romano:
SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization. IEEE Trans. Dependable Secur. Comput. 19(4): 2595-2608 (2022) - 2021
- [j30]Luigi Coppolino, Luigi Romano, Alessandro Scaletti, Luigi Sgaglione:
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study. Technol. Anal. Strateg. Manag. 33(8): 900-913 (2021) - [j29]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Giovanni Mazzeo, Luigi Romano:
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems. IEEE Trans. Computers 70(5): 711-724 (2021) - [c81]Lorenzo Andolfo, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Matthew Ficke, Arne Hollum, Darshan Vaydia:
Privacy-Preserving Credit Scoring via Functional Encryption. ICCSA (8) 2021: 31-43 - [c80]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Irene Bonetti, Elena Spagnuolo:
The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study. ISSRE Workshops 2021: 345-352 - [c79]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Paolo Campegiani:
Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing. ITASEC 2021: 298-308 - [i3]Lorenzo Andolfo, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Matthew Ficke, Arne Hollum, Darshan Vaydia:
Privacy-preserving Credit Scoring via Functional Encryption. CoRR abs/2109.10606 (2021)
2010 – 2019
- 2019
- [j28]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
A comparative analysis of emerging approaches for securing java software with Intel SGX. Future Gener. Comput. Syst. 97: 620-633 (2019) - [j27]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain. Int. J. Crit. Comput. Based Syst. 9(4): 293-317 (2019) - [j26]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
A comprehensive survey of hardware-assisted security: From the edge to the cloud. Internet Things 6 (2019) - [c78]Sotiris Diamantopoulos, Marco Nalin, Ilaria Baroni, Fabrizio Clemente, Giuliana Faiella, Charis Mesaritakis, Evangelos Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, Elisa Puigdomènech, Dimitris Karamitros, Erol Gelenbe, Jos Dumortier, Maja Voss-Knude Voronkov, Luigi Romano, Luigi Coppolino, Vassilis Koutkias, Kostas Votis, Oana Stan, Paolo Campegiani, David Mari Martinez:
Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach. EDCC 2019: 73-74 - [c77]Sotiris Diamantopoulos, Dimitris Karamitros, Luigi Romano, Luigi Coppolino, Vassilis Koutkias, Kostas Votis, Oana Stan, Paolo Campegiani, David Mari Martinez, Marco Nalin, Ilaria Baroni, Fabrizio Clemente, Giuliana Faiella, Charis Mesaritakis, Evangelos Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, Elisa Puigdomènech, Erol Gelenbe, Jos Dumortier, Maja Voss-Knude:
Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach. IDCS 2019: 318-327 - [c76]Luigi Romano, Salvatore Strano, Mario Terzo:
A Model-Based Observer for Intelligent Tire Concepts. RTSI 2019: 447-452 - [c75]Giovanni Breglio, Andrea Irace, Vincenzo Romano Marrazzo, Michele Riccio, Luigi Romano, Salvatore Strano, Mario Terzo:
Feel-tire Unina: Development and Modeling of a Sensing System for Intelligent Tires. RTSI 2019: 453-458 - [c74]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Luigi Sgaglione, Mario Magliulo, Roberto Pacelli:
Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks. SITIS 2019: 363-367 - [c73]Luigi Sgaglione, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Domenico Cotroneo, Andrea Scognamiglio:
Privacy Preserving Intrusion Detection Via Homomorphic Encryption. WETICE 2019: 321-326 - 2018
- [j25]Mariacarla Staffa, Luigi Sgaglione, Giovanni Mazzeo, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Erol Gelenbe, Oana Stan, Sergiu Carpov, Evangelos Grivas, Paolo Campegiani, Luigi Castaldo, Konstantinos Votis, Vassilis Koutkias, Ioannis Komnios:
An OpenNCP-based Solution for Secure eHealth Data Exchange. J. Netw. Comput. Appl. 116: 65-85 (2018) - [j24]Pantelis Natsiavas, Janne Rasmussen, Maja Voss-Knude, Konstantinos Votis, Luigi Coppolino, Paolo Campegiani, Isaac Cano, David Marí, Giuliana Faiella, Fabrizio Clemente, Marco Nalin, Evangelos Grivas, Oana Stan, Erol Gelenbe, Jos Dumortier, Jan Petersen, Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios, Vassilis Koutkias:
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange. BMC Medical Informatics Decis. Mak. 18(1): 85:1-85:16 (2018) - [j23]Giovanni Mazzeo, Luigi Coppolino, Salvatore D'Antonio, Claudio Mazzariello, Luigi Romano:
SIL2 assessment of an Active/Standby COTS-based Safety-Related system. Reliab. Eng. Syst. Saf. 176: 125-134 (2018) - [c72]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project. AINA Workshops 2018: 573-578 - [c71]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level. EDCC 2018: 17-24 - [c70]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems. NBiS 2018: 952-959 - [e1]Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokratis K. Katsikas, Ioannis Komnios, Luigi Romano, Dimitrios Tzovaras:
Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers. Communications in Computer and Information Science 821, Springer 2018, ISBN 978-3-319-95188-1 [contents] - 2017
- [j22]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
Cloud security: Emerging threats and current solutions. Comput. Electr. Eng. 59: 126-140 (2017) - [j21]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Fotis Aisopos, Konstantinos Tserpes:
Real-time QoS monitoring from the end user perspective in large scale social networks. Int. J. Comput. Sci. Eng. 14(2): 93-104 (2017) - [c69]Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano, Martijn Verburg:
Integrating Reactive Cloud Applications in SERECA. ARES 2017: 39:1-39:8 - [c68]Raffaele Martino, Salvatore D'Antonio, Luigi Coppolino, Luigi Romano:
Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements. COMPSAC (2) 2017: 317-322 - [c67]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Luigi Sgaglione, Mariacarla Staffa:
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions. COMPSAC (2) 2017: 510-515 - [c66]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Mariacarla Staffa:
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level Among eHealth Services Across Europe. iThings/GreenCom/CPSCom/SmartData 2017: 342-347 - [c65]Ferdinando Campanile, Luigi Coppolino, Salvatore D'Antonio, Leonid Lev, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione, Francesco Tessitore:
Cloudifying Critical Applications: A Use Case from the Power Grid Domain. PDP 2017: 363-370 - 2016
- [j20]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
A framework for mastering heterogeneity in multi-layer security information and event correlation. J. Syst. Archit. 62: 78-88 (2016) - 2015
- [j19]Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
How to monitor QoS in cloud infrastructures: the QoSMONaaS approach. Int. J. Comput. Sci. Eng. 11(1): 29-45 (2015) - [j18]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures. Int. J. Distributed Sens. Networks 11: 980629:1-980629:16 (2015) - [j17]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services. J. Ambient Intell. Humaniz. Comput. 6(6): 753-762 (2015) - [j16]Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 4-20 (2015) - [c64]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile:
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns. 3PGCIC 2015: 713-717 - [c63]Do Le Quoc, Valerio D'Alessandro, Byungchul Park, Luigi Romano, Christof Fetzer:
Scalable Network Traffic Classification Using Distributed Support Vector Machines. CLOUD 2015: 1008-1012 - [c62]Luigi Coppolino, Valerio D'Alessandro, Salvatore D'Antonio, Leonid Lev, Luigi Romano:
My Smart Home is Under Attack. CSE 2015: 145-151 - [c61]Salvatore D'Antonio, Giuliano Gugliara, Carlo Francesco Romano, Luigi Romano:
A Workflow Service Mediator for Automated Information Processing and Scheduling Delivery to an Archive. ESOCC Workshops 2015: 126-140 - [c60]Luigi Coppolino, Salvatore D'Antonio, Carmine Massei, Luigi Romano:
Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems. SoMeT 2015: 378-387 - 2014
- [j15]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Exposing vulnerabilities in electric power grids: An experimental approach. Int. J. Crit. Infrastructure Prot. 7(1): 51-60 (2014) - [c59]Luigi Romano:
A Tool for Assessing Collaborative Learning - At School and Online. ICALT 2014: 310-314 - [c58]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Real-time Security & Dependability monitoring: Make it a bundle. ICCST 2014: 1-6 - [c57]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study. IDC 2014: 465-474 - [c56]Francesco Buccafurri, Luigi Coppolino, Salvatore D'Antonio, Alessia Garofalo, Gianluca Lax, Antonino Nocera, Luigi Romano:
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks. SAFECOMP 2014: 214-229 - [i2]Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking. CoRR abs/1405.0327 (2014) - 2013
- [c55]Luigi Coppolino, Salvatore D'Antonio, Alessia Garofalo, Luigi Romano:
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks. 3PGCIC 2013: 247-254 - [c54]Luigi Romano:
Methodology and Software Support for Evaluating Teams' level of collaboration. DMS 2013: 118-121 - [c53]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Fotis Aisopos, Konstantinos Tserpes:
Effective QoS Monitoring in Large Scale Social Networks. IDC 2013: 249-259 - 2012
- [j14]Luigi Coppolino, Luigi Romano, Andrea Bondavalli, Alessandro Daidone:
A hidden Markov model based intrusion detection system for wireless sensor networks. Int. J. Crit. Comput. Based Syst. 3(3): 210-228 (2012) - [c52]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Enhancing SIEM Technology to Protect Critical Infrastructures. CRITIS 2012: 10-21 - [c51]Muhammad Afzaal, Cesario Di Sarno, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures. HASE 2012: 48-55 - [c50]Luigi Romano, Salvatore D'Antonio, Valerio Formicola, Luigi Coppolino:
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology. SAFECOMP Workshops 2012: 222-234 - [c49]Craig Gibson, Matteo Melideo, Luigi Romano, Salvatore D'Antonio:
International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead. SAFECOMP Workshops 2012: 259-270 - [c48]Ornella Adinolfi, Rosario Cristaldi, Luigi Coppolino, Luigi Romano:
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud. SITIS 2012: 527-532 - [c47]Muhammad Afzaal, Cesario Di Sarno, Salvatore D'Antonio, Luigi Romano:
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System. SITIS 2012: 579-586 - 2011
- [j13]Luigi Coppolino, Luigi Romano, Valerio Vianello:
Security Engineering of SOA Applications Via Reliability Patterns. J. Softw. Eng. Appl. 4(1): 1-8 (2011) - [c46]Luigi Romano, Danilo De Mari, Zbigniew Jerzak, Christof Fetzer:
A Novel Approach to QoS Monitoring in the Cloud. CCP 2011: 45-51 - [c45]Massimo Ficco, Luigi Romano:
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing. CCP 2011: 275-284 - [c44]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Francesco Oliviero, Luigi Romano:
On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project. CRiSIS 2011: 94-99 - [c43]Luigi Romano:
Tool and Method for Evaluating Students Working on E-Learning Platforms. DMS 2011: 200-203 - [c42]Giuseppe Cicotti, Luigi Coppolino, Rosario Cristaldi, Salvatore D'Antonio, Luigi Romano:
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach. Euro-Par Workshops (1) 2011: 15-24 - [c41]Massimo Ficco, Alessandro Daidone, Luigi Coppolino, Luigi Romano, Andrea Bondavalli:
An event correlation approach for fault diagnosis in SCADA infrastructures. EWDC 2011: 15-20 - [c40]Elsa Prieto, Rodrigo Diaz, Luigi Romano, Roland Rieke, Mohammed Achemlal:
MASSIF: A Promising Solution to Enhance Olympic Games IT Security. ICGS3/e-Democracy 2011: 139-147 - [c39]Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano:
Security Analysis of Smart Grid Data Collection Technologies. SAFECOMP 2011: 143-156 - [c38]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study. SAFECOMP 2011: 199-212 - 2010
- [c37]Luigi Coppolino, Danilo De Mari, Luigi Romano, Valerio Vianello:
SLA compliance monitoring through semantic processing. GRID 2010: 252-258 - [c36]Massimo Ficco, Luigi Romano:
A Correlation Approach to Intrusion Detection. MOBILIGHT 2010: 203-215
2000 – 2009
- 2009
- [j12]Salvatore D'Antonio, Luigi Romano, Abdelmajid Khelil, Neeraj Suri:
Increasing security and protection of SCADA systems through infrastructure resilience. Int. J. Syst. Syst. Eng. 1(4): 401-413 (2009) - [c35]Luigi Romano:
Fast Abstracts. DSN 2009: 593 - [c34]Luigi Romano, Luigi Coppolino, Ivano Alessandro Elia, Gianluigi Spagnuolo:
A healthcare real-time monitoring system for multiple sensors data collection and correlation. KES IIMSS 2009: 455-464 - [c33]Massimo Ficco, Luigi Coppolino, Luigi Romano:
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks. LADC 2009: 9-16 - [c32]Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano:
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. SEUS 2009: 192-202 - 2008
- [j11]Ferdinando Campanile, Luigi Coppolino, Salvatore Giordano, Luigi Romano:
A business process monitor for a mobile phone recharging system. J. Syst. Archit. 54(9): 843-848 (2008) - [c31]Salvatore D'Antonio, Luigi Romano, Abdelmajid Khelil, Neeraj Suri:
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project. CRITIS 2008: 109-118 - [c30]Massimo Magaldi, Roberto Russo, Luca Bevilacqua, Stefania Pierno, Vladimiro Scotto di Carlo, Fabio Corvino, Luigi Romano, Luisa Capuano, Ivano De Furio:
A GRID Approach to Providing Multimodal Context-Sensitive Social Service to Mobile Users. OTM Workshops 2008: 528-537 - [c29]Stefania Pierno, Luigi Romano, Luisa Capuano, Massimo Magaldi, Luca Bevilacqua:
Software Innovation for E-Government Expansion. OTM Conferences (1) 2008: 822-832 - 2007
- [j10]Alessandro Cilardo, Domenico Cotroneo, Cristiano di Flora, Antonino Mazzeo, Luigi Romano, Stefano Russo:
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices. Comput. Syst. Sci. Eng. 22(3) (2007) - [c28]Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano:
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security. PDP 2007: 381-386 - [c27]Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano:
Performance Evaluation of Security Services: An Experimental Approach. PDP 2007: 387-394 - [c26]Ferdinando Campanile, Alessandro Cilardo, Luigi Coppolino, Luigi Romano:
Adaptable Parsing of Real-Time Data Streams. PDP 2007: 412-418 - [c25]Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, G. Di Matteo, Luigi Romano:
iToken: aWireless smart card reader which provides handhelds with desk top equivalent security. SecureComm 2007: 98-106 - [c24]Luigi Coppolino, Luigi Romano, Nicola Mazzocca, Sergio Salvi:
Web Services workflow reliability estimation through reliability patterns. SecureComm 2007: 107-115 - [i1]Mohamed Kaâniche, Luigi Romano, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Richard M. Karcich:
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture. CoRR abs/0704.0879 (2007) - 2006
- [j9]Alessandro Cilardo, Luigi Coppolino, Nicola Mazzocca, Luigi Romano:
Elliptic Curve Cryptography Engineering. Proc. IEEE 94(2): 395-406 (2006) - [c23]Giovanni Frattini, Luigi Romano, Vladimiro Scotto di Carlo, Pierpaolo Petriccione, Gianluca Supino, Giuseppe Leone, Ciro Autiero:
Multimodal Architectures: Issues and Experiences. OTM Workshops (1) 2006: 974-983 - [c22]Marcello Melgara, Luigi Romano, Fabio Rocca, Alberto Sanna, Daniela Marino, Riccardo Serafin:
Innovative Healthcare Services for Nomadic Users. OTM Workshops (1) 2006: 994-1002 - 2005
- [c21]Alessandro Cilardo, Antonino Mazzeo, Nicola Mazzocca, Luigi Romano:
A Novel Unified Architecture for Public-Key Cryptography. DATE 2005: 52-57 - [c20]Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano:
High-Performance and Interoperable Security Services for Mobile Environments. HPCC 2005: 1064-1069 - [c19]Alessandro Cilardo, Antonino Mazzeo, Luigi Romano:
An FPGA-based Key-Store for Improving the Dependability of Security Services. WORDS 2005: 389-396 - 2004
- [j8]Giacinto Paolo Saggese, Luigi Romano, Nicola Mazzocca, Antonino Mazzeo:
A tamper resistant hardware accelerator for RSA cryptographic applications. J. Syst. Archit. 50(12): 711-727 (2004) - [j7]Alessandro Cilardo, Antonino Mazzeo, Luigi Romano, Giacinto Paolo Saggese, Giuseppe Cattaneo:
A Web Services Based Architecture for Digital Time Stamping. J. Web Eng. 2(3): 148-175 (2004) - [j6]Alessandro Cilardo, Antonino Mazzeo, Luigi Romano, Giacinto Paolo Saggese:
Exploring the design-space for FPGA-based implementation of RSA. Microprocess. Microsystems 28(4): 183-191 (2004) - [j5]Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo, Luigi Romano:
Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications. IEEE Trans. Dependable Secur. Comput. 1(4): 223-237 (2004) - [c18]Alessandro Cilardo, Antonino Mazzeo, Luigi Romano, Giacinto Paolo Saggese:
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware. DATE 2004: 206-211 - [c17]Giacinto Paolo Saggese, Claudio Basile, Luigi Romano, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Hardware Support for High Performance, Intrusion- and Fault-Tolerant Systems. SRDS 2004: 195-204 - [c16]Jie Xu, Graeme Dixon, Priya Narasimhan, Luigi Romano, Rob Smith:
Dependability in Web Services. SRDS 2004: 206 - 2003
- [j4]Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo:
An architecture for security-oriented perfective maintenance of legacy software. Inf. Softw. Technol. 45(9): 619-631 (2003) - [j3]Antonio Coronato, Giuseppe De Pietro, Antonino Mazzeo, Luigi Romano:
Improving the QoS of MPEG2 streaming over wireless LANs. Simul. Model. Pract. Theory 11(7-8): 533-555 (2003) - [c15]Antonino Mazzeo, Luigi Romano, Giacinto Paolo Saggese, Nicola Mazzocca:
FPGA-Based Implementation of a Serial RSA Processor. DATE 2003: 10582-10589 - [c14]Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo, Luigi Romano:
A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation. LADC 2003: 303-320 - [c13]Alessandro Cilardo, Antonino Mazzeo, Luigi Romano, Giacinto Paolo Saggese, Giuseppe Cattaneo:
Using Web Services Technology for Inter-enterprise Integration of Digital Time Stamping. OTM Workshops 2003: 960-974 - [c12]Domenico Cotroneo, Cristiano di Flora, Antonino Mazzeo, Luigi Romano, Stefano Russo, Giacinto Paolo Saggese:
Providing Digital Time Stamping Services to Mobile Devices. WORDS Fall 2003: 94-100 - 2002
- [j2]Domenico Cotroneo, Nicola Mazzocca, Luigi Romano, Stefano Russo:
A fault tolerant access to legacy database systems using CORBA technology. Comput. Syst. Sci. Eng. 17(6): 335-342 (2002) - [j1]Domenico Cotroneo, Nicola Mazzocca, Luigi Romano, Stefano Russo:
Building a dependable system from a legacy application with CORBA. J. Syst. Archit. 48(1-3): 81-98 (2002) - [c11]Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo:
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications. OTM 2002: 723-736 - [c10]Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo:
Integration of Legacy Client-Server Applications in a Secure Multi-Tier Architecture. PDP 2002: 269-276 - [c9]Luigi Romano, Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo:
Implementation of Threshold-based Diagnostic Mechanisms for COTS-Based Applications. SRDS 2002: 296-303 - 2001
- [c8]Giovanni Battista Barone, N. Margarita, Antonino Mazzeo, Nicola Mazzocca, Luigi Romano:
Secure Access to Personalized Web Services. PRDC 2001: 266-272 - 2000
- [c7]Luigi Romano, Nicola Mazzocca, Antonio Coronato, Giuseppe De Pietro:
Experimental Evaluation of the Recovery Strategies of a Distributed VoD Application. PDPTA 2000 - [c6]Domenico Cotroneo, Luigi Romano, Stefano Russo, Nicola Mazzocca:
A CORBA-Based Architecture for Adding Dependability to Legacy Servers. PDSE 2000: 76-82 - [c5]Luigi Romano, Nicola Mazzocca, Antonio Coronato, Giuseppe De Pietro:
Dependability analysis of transmission techniques for MPEG-2 streams. PRDC 2000: 120-127
1990 – 1999
- 1999
- [c4]Luigi Romano, Antonino Mazzeo, Nicola Mazzocca:
SECURE: A Simulation Tool for PKI Design. CQRE 1999: 17-29 - [c3]Luigi Romano, Antonio Coronato, Antonino Mazzeo, Nicola Mazzocca:
A Design Tool for Dependable Video on Demand Applications. EUROMICRO 1999: 2150- - [c2]Luigi Romano, G. Capuozzo, Antonino Mazzeo, Nicola Mazzocca:
A Simulated Fault Injection Tool for Dependable VoD Application Design. PRDC 1999: 170-177 - 1998
- [c1]Mohamed Kaâniche, Luigi Romano, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Richard M. Karcich:
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture. FTCS 1998: 6-15
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint