Minority becomes majority in social networks V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano International conference on web and internet economics, 74-88, 2015 | 62 | 2015 |
Neural network techniques for proactive password checking A Ciaramella, P D'Arco, A De Santis, C Galdi, R Tagliaferri IEEE Transactions on Dependable and Secure Computing 3 (4), 327-339, 2006 | 56 | 2006 |
Hypergraph decomposition and secret sharing G Di Crescenzo, C Galdi Discrete Applied Mathematics 157 (5), 928-946, 2009 | 49 | 2009 |
Hyppocrates: a new proactive password checker C Blundo, P D’Arco, A De Santis, C Galdi Journal of Systems and Software 71 (1-2), 163-175, 2004 | 37 | 2004 |
Generalized Discrete Preference Games. V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano IJCAI 16, 53-59, 2016 | 36 | 2016 |
ERBAC: event-driven RBAC P Bonatti, C Galdi, D Torres Proceedings of the 18th ACM symposium on Access control models and …, 2013 | 35 | 2013 |
Robustness in discrete preference games V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano Proceedings of the 16th Conference on Autonomous Agents and MultiAgent …, 2017 | 34 | 2017 |
Information retention in heterogeneous majority dynamics V Auletta, I Caragiannis, D Ferraioli, C Galdi, G Persiano Web and Internet Economics: 13th International Conference, WINE 2017 …, 2017 | 30 | 2017 |
e-Auctions for multi-cloud service provisioning M Anisetti, CA Ardagna, PA Bonatti, E Damiani, M Faella, C Galdi, ... 2014 IEEE International Conference on Services Computing, 35-42, 2014 | 27 | 2014 |
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices L Catuogno, C Galdi IFIP International Workshop on Information Security Theory and Practices, 16-35, 2008 | 25 | 2008 |
Network load games I Caragiannis, C Galdi, C Kaklamanis Algorithms and Computation: 16th International Symposium, ISAAC 2005, Sanya …, 2005 | 25 | 2005 |
Recommendation in museums: paths, sequences, and group satisfaction maximization S Rossi, F Barile, C Galdi, L Russo Multimedia Tools and Applications 76, 26031-26055, 2017 | 23 | 2017 |
Analysis of a two-factor graphical password scheme L Catuogno, C Galdi International journal of information security 13, 421-437, 2014 | 23 | 2014 |
On the evaluation of security properties of containerized systems L Catuogno, C Galdi 2016 15th International Conference on Ubiquitous Computing and …, 2016 | 20 | 2016 |
On the security of a two-factor authentication scheme L Catuogno, C Galdi Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010 | 19 | 2010 |
An effective methodology for measuring software resource usage L Catuogno, C Galdi, N Pasquino IEEE Transactions on Instrumentation and Measurement 67 (10), 2487-2494, 2018 | 18 | 2018 |
Towards a mechanism for incentivating privacy PA Bonatti, M Faella, C Galdi, L Sauro Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 17 | 2011 |
Event-driven RBAC P Bonatti, C Galdi, D Torres Journal of Computer Security 23 (6), 709-757, 2015 | 16 | 2015 |
Certified e-mail with temporal authentication: An improved optimistic protocol C Galdi, R Giordano International Conference on Trust, Privacy and Security in Digital Business …, 2004 | 14 | 2004 |
Basic computations in wireless networks I Caragiannis, C Galdi, C Kaklamanis Algorithms and Computation: 16th International Symposium, ISAAC 2005, Sanya …, 2005 | 13 | 2005 |