[go: up one dir, main page]

Follow
Antonio Lioy
Antonio Lioy
Full Professor of Computer Engineering, Politecnico di Torino
Verified email at polito.it
Title
Cited by
Cited by
Year
Efficient and robust pseudonymous authentication in VANET
G Calandriello, P Papadimitratos, JP Hubaux, A Lioy
Proceedings of the fourth ACM international workshop on Vehicular ad hoc …, 2007
7752007
On the performance of secure vehicular communication systems
G Calandriello, P Papadimitratos, JP Hubaux, A Lioy
IEEE transactions on dependable and secure computing 8 (6), 898-912, 2010
1362010
Integrity verification of Docker containers for a lightweight cloud environment
M De Benedictis, A Lioy
Future generation computer systems 97, 236-246, 2019
1052019
Dependability in wireless networks: Can we rely on WiFi?
MD Aime, G Calandriello, A Lioy
IEEE Security & Privacy 5 (1), 23-29, 2007
882007
Adding support for automatic enforcement of security policies in NFV networks
C Basile, F Valenza, A Lioy, DR Lopez, AP Perales
IEEE/ACM Transactions on Networking 27 (2), 707-720, 2019
822019
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
772020
Impact of vehicular communications security on transportation safety
P Papadimitratos, G Calandriello, JP Hubaux, A Lioy
IEEE INFOCOM Workshops 2008, 1-6, 2008
772008
Virtualized security at the network edge: A user-centric approach
D Montero, M Yannuzzi, A Shaw, L Jacquin, A Pastor, R Serral-Gracia, ...
IEEE Communications Magazine 53 (4), 176-186, 2015
722015
Diagnosis oriented test pattern generation
P Camurati, A Lioy, P Prinetto, MS Reorda
Proceedings of the European Design Automation Conference, 470-474, 1990
701990
A novel approach for integrating security policy enforcement with dynamic network virtualization
C Basile, A Lioy, C Pitscheider, F Valenza, M Vallini
Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015
672015
Network-level access control policy analysis and transformation
C Basile, A Cappadonia, A Lioy
IEEE/ACM Transactions On Networking 20 (4), 985-998, 2011
602011
Why to adopt a security metric? A brief survey
A Atzeni, A Lioy
Quality of Protection: Security Measurements and Metrics, 1-12, 2006
562006
Advanced fault collapsing
A Lioy
IEEE Design & Test of Computers 9 (1), 64-71, 1992
541992
Automatic synthesis of large telescopic units based on near-minimum timed supersetting
L Benini, G De Micheli, A Lioy, E Macii, G Odasso, M Poncino
IEEE Transactions on Computers 48 (8), 769-779, 2002
512002
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017
472017
Cybersecurity in ICT supply chains: key challenges and a relevant architecture
X Masip-Bruin, E Marín-Tordera, J Ruiz, A Jukan, P Trakadas, A Cernivec, ...
Sensors 21 (18), 6057, 2021
452021
PKI past, present and future
A Lioy, M Marian, N Moltchanova, M Pala
International Journal of Information Security 5 (1), 18-29, 2006
452006
Providing login and Wi-Fi access services with the eIDAS network: A practical approach
DG Berbecaru, A Lioy, C Cameroni
IEEE Access 8, 126186-126200, 2020
442020
A complexity analysis of sequential ATPG
A Lioy, PL Montessoro, S Gai
IEEE International Symposium on Circuits and Systems,, 1946-1949, 1989
441989
Security issues in control, management and routing protocols
M Baltatu, A Lioy, F Maino, D Mazzocchi
Computer Networks 34 (6), 881-894, 2000
432000
The system can't perform the operation now. Try again later.
Articles 1–20