BibTeX records: Antonio Lioy

download as .bib file

@article{DBLP:journals/fgcs/BenedictisJPAL24,
  author       = {Marco de Benedictis and
                  Ludovic Jacquin and
                  Ignazio Pedone and
                  Andrea S. Atzeni and
                  Antonio Lioy},
  title        = {A novel architecture to virtualise a hardware-bound trusted platform
                  module},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {150},
  pages        = {21--36},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2023.08.012},
  doi          = {10.1016/J.FUTURE.2023.08.012},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BenedictisJPAL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BerbecaruL24,
  author       = {Diana Gratiela Berbecaru and
                  Antonio Lioy},
  title        = {Threat-TLS: {A} Tool for Threat Identification in Weak, Malicious,
                  or Suspicious {TLS} Connections},
  booktitle    = {Proceedings of the 19th International Conference on Availability,
                  Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024
                  - 2 August 2024},
  pages        = {125:1--125:9},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3664476.3670945},
  doi          = {10.1145/3664476.3670945},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BerbecaruL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/FerroBSL24,
  author       = {Lorenzo Ferro and
                  Enrico Bravi and
                  Silvia Sisinni and
                  Antonio Lioy},
  editor       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Mir Mehedi A. Pritom and
                  Feras M. Awaysheh},
  title        = {{SAFEHIVE:} Secure Attestation Framework for Embedded and Heterogeneous
                  IoT Devices in Variable Environments},
  booktitle    = {Proceedings of the 2024 {ACM} Workshop on Secure and Trustworthy Cyber-Physical
                  Systems, SaT-CPS 2024, Porto, Portugal, 21 June 2024},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643650.3658609},
  doi          = {10.1145/3643650.3658609},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/FerroBSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/CiravegnaBL24,
  author       = {Flavio Ciravegna and
                  Giacomo Bruno and
                  Antonio Lioy},
  editor       = {Gianni D'Angelo and
                  Flaminia L. Luccio and
                  Francesco Palmieri},
  title        = {IKE-less IPsec: Enhancing Security for IoT Device Networks},
  booktitle    = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC}
                  2024), Salerno, Italy, April 8-12, 2024},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3731},
  publisher    = {CEUR-WS.org},
  year         = {2024},
  url          = {https://ceur-ws.org/Vol-3731/paper35.pdf},
  timestamp    = {Fri, 26 Jul 2024 13:58:33 +0200},
  biburl       = {https://dblp.org/rec/conf/itasec/CiravegnaBL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/FerroL24,
  author       = {Lorenzo Ferro and
                  Antonio Lioy},
  editor       = {Gianni D'Angelo and
                  Flaminia L. Luccio and
                  Francesco Palmieri},
  title        = {Standard-Based Remote Attestation: The Veraison Project},
  booktitle    = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC}
                  2024), Salerno, Italy, April 8-12, 2024},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3731},
  publisher    = {CEUR-WS.org},
  year         = {2024},
  url          = {https://ceur-ws.org/Vol-3731/paper28.pdf},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itasec/FerroL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/DOnghiaCBFPL24,
  author       = {Grazia D'Onghia and
                  Flavio Ciravegna and
                  Giacomo Bruno and
                  Mattin Antartiko Elorza Forcada and
                  Antonio Pastor and
                  Antonio Lioy},
  title        = {Securing 5G: Trusted Execution Environments for Centrally Controlled
                  IPsec Integrity},
  booktitle    = {{IFIP} Networking Conference, {IFIP} Networking 2024, Thessaloniki,
                  Greece, June 3-6, 2024},
  pages        = {595--597},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.23919/IFIPNetworking62109.2024.10619852},
  doi          = {10.23919/IFIPNETWORKING62109.2024.10619852},
  timestamp    = {Wed, 04 Sep 2024 21:11:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/DOnghiaCBFPL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/BraviLB24,
  author       = {Enrico Bravi and
                  Antonio Lioy and
                  Diana Gratiela Berbecaru},
  title        = {Integrity Management in Softwarized Networks},
  booktitle    = {{NOMS} 2024 {IEEE} Network Operations and Management Symposium, Seoul,
                  Republic of Korea, May 6-10, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/NOMS59830.2024.10574994},
  doi          = {10.1109/NOMS59830.2024.10574994},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/BraviLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BerbecaruSLRMV23,
  author       = {Diana Gratiela Berbecaru and
                  Silvia Sisinni and
                  Antonio Lioy and
                  Benoit Rat and
                  Davide Margaria and
                  Andrea Vesco},
  title        = {Mitigating Software Integrity Attacks With Trusted Computing in a
                  Time Distribution Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {50510--50527},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3276476},
  doi          = {10.1109/ACCESS.2023.3276476},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BerbecaruSLRMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BerbecaruL23,
  author       = {Diana Gratiela Berbecaru and
                  Antonio Lioy},
  title        = {An Evaluation of {X.509} Certificate Revocation and Related Privacy
                  Issues in the Web {PKI} Ecosystem},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {79156--79175},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3299357},
  doi          = {10.1109/ACCESS.2023.3299357},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BerbecaruL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/BraviBL23,
  author       = {Enrico Bravi and
                  Diana Gratiela Berbecaru and
                  Antonio Lioy},
  title        = {A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical
                  Infrastructures},
  booktitle    = {{IEEE} International Conference on Cloud Computing Technology and
                  Science, CloudCom 2023, Naples, Italy, December 4-6, 2023},
  pages        = {91--98},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CloudCom59040.2023.00027},
  doi          = {10.1109/CLOUDCOM59040.2023.00027},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/BraviBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/SettanniRBL23,
  author       = {Francesco Settanni and
                  Leonardo Regano and
                  Cataldo Basile and
                  Antonio Lioy},
  editor       = {Carlos J. Bernardos and
                  Barbara Martini and
                  Elisa Rojas and
                  F{\'{a}}bio Luciano Verdii and
                  Zuqing Zhu and
                  Eiji Oki and
                  Helge Parzyjegla},
  title        = {A Model for Automated Cybersecurity Threat Remediation and Sharing},
  booktitle    = {9th {IEEE} International Conference on Network Softwarization, NetSoft
                  2023, Madrid, Spain, June 19-23, 2023},
  pages        = {492--497},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/NetSoft57336.2023.10175486},
  doi          = {10.1109/NETSOFT57336.2023.10175486},
  timestamp    = {Thu, 20 Jul 2023 12:34:37 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/SettanniRBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersec4europe/2022,
  editor       = {Antonio F. Skarmeta and
                  Daniele Canavese and
                  Antonio Lioy and
                  Sara Nieves Matheu},
  title        = {Digital Sovereignty in Cyber Security: New Challenges in Future Vision
                  - First International Workshop, CyberSec4Europe 2022, Venice, Italy,
                  April 17-21, 2022, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1807},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-36096-1},
  doi          = {10.1007/978-3-031-36096-1},
  isbn         = {978-3-031-36095-4},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec4europe/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/CanaveseRBCL22,
  author       = {Daniele Canavese and
                  Leonardo Regano and
                  Cataldo Basile and
                  Gabriele Ciravegna and
                  Antonio Lioy},
  title        = {Encryption-agnostic classifiers of traffic originators and their application
                  to anomaly detection},
  journal      = {Comput. Electr. Eng.},
  volume       = {97},
  pages        = {107621},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compeleceng.2021.107621},
  doi          = {10.1016/J.COMPELECENG.2021.107621},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/CanaveseRBCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/PedoneL22,
  author       = {Ignazio Pedone and
                  Antonio Lioy},
  title        = {Quantum Key Distribution in Kubernetes Clusters},
  journal      = {Future Internet},
  volume       = {14},
  number       = {6},
  pages        = {160},
  year         = {2022},
  url          = {https://doi.org/10.3390/fi14060160},
  doi          = {10.3390/FI14060160},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/PedoneL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SisinniMPLV22,
  author       = {Silvia Sisinni and
                  Davide Margaria and
                  Ignazio Pedone and
                  Antonio Lioy and
                  Andrea Vesco},
  title        = {Integrity Verification of Distributed Nodes in Critical Infrastructures},
  journal      = {Sensors},
  volume       = {22},
  number       = {18},
  pages        = {6950},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22186950},
  doi          = {10.3390/S22186950},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SisinniMPLV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cesar/CompastieSGFJMS22,
  author       = {Maxime Compasti{\'{e}} and
                  Silvia Sisinni and
                  Supreshna Gurung and
                  Carolina Fern{\'{a}}ndez and
                  Ludovic Jacquin and
                  Izidor Mlakar and
                  Valentino Safran and
                  Antonio Lioy and
                  Ignazio Pedone},
  editor       = {Gurvan le Guernic},
  title        = {{PALANTIR:} Zero-Trust Architecture for Managed Security Service Provider},
  booktitle    = {Proceedings of the 29th Computer {\&} Electronics Security Application
                  Rendezvous co-located with the 7th European Cyber Week {(ECW} 2022),
                  Rennes, France, November 15-16, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3329},
  pages        = {83--98},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {http://ceur-ws.org/Vol-3329/paper-05.pdf},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cesar/CompastieSGFJMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec4europe/CanaveseRL22,
  author       = {Daniele Canavese and
                  Leonardo Regano and
                  Antonio Lioy},
  editor       = {Antonio F. Skarmeta and
                  Daniele Canavese and
                  Antonio Lioy and
                  Sara Nieves Matheu},
  title        = {Computer-Aided Reverse Engineering of Protected Software},
  booktitle    = {Digital Sovereignty in Cyber Security: New Challenges in Future Vision
                  - First International Workshop, CyberSec4Europe 2022, Venice, Italy,
                  April 17-21, 2022, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1807},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36096-1\_1},
  doi          = {10.1007/978-3-031-36096-1\_1},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec4europe/CanaveseRL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LioyPS22,
  author       = {Antonio Lioy and
                  Ignazio Pedone and
                  Silvia Sisinni},
  title        = {{(POSTER)} Using MACsec to protect a Network Functions Virtualisation
                  infrastructure},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2022, Rhodes,
                  Greece, June 30 - July 3, 2022},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISCC55528.2022.9912955},
  doi          = {10.1109/ISCC55528.2022.9912955},
  timestamp    = {Tue, 25 Oct 2022 21:20:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/LioyPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meditcom/FernandezSKSCPM22,
  author       = {Carolina Fern{\'{a}}ndez and
                  Davide Sanvito and
                  Orestis Kompougias and
                  Valentino Safran and
                  Maxime Compasti{\'{e}} and
                  Ignazio Pedone and
                  Antonio L{\'{o}}pez Mart{\'{\i}}nez and
                  Manuel Gil P{\'{e}}rez and
                  Akis Kourtis and
                  George Xylouris and
                  Izidor Mlakar and
                  Stylianos Tsarsitalidis and
                  Dimitrios Klonidis and
                  Daniele Canavese and
                  Vangelis Logothetis and
                  Diego R. L{\'{o}}pez and
                  Antonio Pastor and
                  Antonio Lioy and
                  Ludovic Jacquin and
                  Supreshna Gurung and
                  Roberto Bifulco and
                  Athanasios Priovolos and
                  Ilias Balampanis and
                  Theodoros Rokkas and
                  Nikolaos Papadakis and
                  Dimitris Paraschos and
                  Primoz Jeran and
                  George Athanasiou and
                  Dimitris Papadopoulos},
  title        = {{PALANTIR} demo: leveraging SecaaS model for managing threats in industrial
                  environments},
  booktitle    = {{IEEE} International Mediterranean Conference on Communications and
                  Networking, MeditCom 2022, Athens, Greece, September 5-8, 2022},
  pages        = {82--85},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MeditCom55741.2022.9928648},
  doi          = {10.1109/MEDITCOM55741.2022.9928648},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/meditcom/FernandezSKSCPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/BasileCRPL22,
  author       = {Cataldo Basile and
                  Daniele Canavese and
                  Leonardo Regano and
                  Ignazio Pedone and
                  Antonio Lioy},
  editor       = {Alexander Clemm and
                  Guido Maier and
                  Carmen Mas Machuca and
                  K. K. Ramakrishnan and
                  Fulvio Risso and
                  Prosper Chemouil and
                  Noura Limam},
  title        = {A model of capabilities of Network Security Functions},
  booktitle    = {8th {IEEE} International Conference on Network Softwarization, NetSoft
                  2022, Milan, Italy, June 27 - July 1, 2022},
  pages        = {474--479},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NetSoft54395.2022.9844057},
  doi          = {10.1109/NETSOFT54395.2022.9844057},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/BasileCRPL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PedoneACL21,
  author       = {Ignazio Pedone and
                  Andrea S. Atzeni and
                  Daniele Canavese and
                  Antonio Lioy},
  title        = {Toward a Complete Software Stack to Integrate Quantum Key Distribution
                  in a Cloud Environment},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {115270--115291},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3102313},
  doi          = {10.1109/ACCESS.2021.3102313},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PedoneACL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BerbecaruLC21,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Cesare Cameroni},
  title        = {On Enabling Additional Natural Person and Domain-Specific Attributes
                  in the eIDAS Network},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {134096--134121},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3115853},
  doi          = {10.1109/ACCESS.2021.3115853},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BerbecaruLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Masip-BruinMRJT21,
  author       = {Xavi Masip{-}Bruin and
                  Eva Mar{\'{\i}}n{-}Tordera and
                  Jos{\'{e}} Ruiz and
                  Admela Jukan and
                  Panagiotis Trakadas and
                  Ales Cernivec and
                  Antonio Lioy and
                  Diego R. L{\'{o}}pez and
                  Henrique Santos and
                  Antonis Gonos and
                  Ana Silva and
                  Jos{\'{e}} Soriano and
                  Grigorios Kalogiannis},
  title        = {Cybersecurity in {ICT} Supply Chains: Key Challenges and a Relevant
                  Architecture},
  journal      = {Sensors},
  volume       = {21},
  number       = {18},
  pages        = {6057},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21186057},
  doi          = {10.3390/S21186057},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/Masip-BruinMRJT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/BerbecaruL21,
  author       = {Diana Gratiela Berbecaru and
                  Antonio Lioy},
  editor       = {David Camacho and
                  Domenico Rosaci and
                  Giuseppe M. L. Sarn{\'{e}} and
                  Mario Versaci},
  title        = {Attack Strategies and Countermeasures in Transport-Based Time Synchronization
                  Solutions},
  booktitle    = {Intelligent Distributed Computing XIV, 14th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18
                  September 2021},
  series       = {Studies in Computational Intelligence},
  volume       = {1026},
  pages        = {203--213},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96627-0\_19},
  doi          = {10.1007/978-3-030-96627-0\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/BerbecaruL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meditcom/MantasPFOCMPKXM21,
  author       = {Evangelos Mantas and
                  Dimitris Papadopoulos and
                  Carolina Fern{\'{a}}ndez and
                  Nil Ortiz and
                  Maxime Compasti{\'{e}} and
                  Antonio L{\'{o}}pez Mart{\'{\i}}nez and
                  Manuel Gil P{\'{e}}rez and
                  Akis Kourtis and
                  George Xylouris and
                  Izidor Mlakar and
                  Stylianos Tsarsitalidis and
                  Dimitrios Klonidis and
                  Ignazio Pedone and
                  Daniele Canavese and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Davide Sanvito and
                  Vangelis Logothetis and
                  Diego R. L{\'{o}}pez and
                  Antonio Pastor and
                  Antonio Lioy and
                  Ludovic Jacquin and
                  Roberto Bifulco and
                  Angeliki Kapodistria and
                  Athanasios Priovolos and
                  Georgios Gardikis and
                  Ioannis Neokosmidis and
                  Theodoros Rokkas and
                  Nikolaos Papadakis and
                  Dimitris Paraschos and
                  Primoz Jeran and
                  Antonis Litke and
                  George Athanasiou},
  title        = {Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized
                  Enterprises},
  booktitle    = {{IEEE} International Mediterranean Conference on Communications and
                  Networking, MeditCom 2021, Athens, Greece, September 7-10, 2021},
  pages        = {500--505},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MeditCom49071.2021.9647609},
  doi          = {10.1109/MEDITCOM49071.2021.9647609},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/meditcom/MantasPFOCMPKXM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BerbecaruLC20,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Cesare Cameroni},
  title        = {Providing Login and Wi-Fi Access Services With the eIDAS Network:
                  {A} Practical Approach},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {126186--126200},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3007998},
  doi          = {10.1109/ACCESS.2020.3007998},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BerbecaruLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PastorMVCLRCL20,
  author       = {Antonio Pastor and
                  Alberto Mozo and
                  Stanislav Vakaruk and
                  Daniele Canavese and
                  Diego R. L{\'{o}}pez and
                  Leonardo Regano and
                  Sandra G{\'{o}}mez Canaval and
                  Antonio Lioy},
  title        = {Detection of Encrypted Cryptomining Malware Connections With Machine
                  and Deep Learning},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {158036--158055},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3019658},
  doi          = {10.1109/ACCESS.2020.3019658},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PastorMVCLRCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/BenedictisLS20,
  author       = {Marco de Benedictis and
                  Antonio Lioy and
                  Paolo Smiraglia},
  title        = {Towards a secure and lightweight network function virtualisation environment},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {243--252},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJGUC.2020.105539},
  doi          = {10.1504/IJGUC.2020.105539},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/BenedictisLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BerbecaruLC20,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Cesare Cameroni},
  title        = {Supporting Authorize-then-Authenticate for Wi-Fi access based on an
                  electronic identity infrastructure},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {34--54},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.034},
  doi          = {10.22667/JOWUA.2020.06.30.034},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BerbecaruLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/BenedictisL19,
  author       = {Marco de Benedictis and
                  Antonio Lioy},
  title        = {Integrity verification of Docker containers for a lightweight cloud
                  environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {97},
  pages        = {236--246},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.02.026},
  doi          = {10.1016/J.FUTURE.2019.02.026},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BenedictisL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/BerbecaruLC19,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Cesare Cameroni},
  title        = {Electronic Identification for Universities: Building Cross-Border
                  Services Based on the eIDAS Infrastructure},
  journal      = {Inf.},
  volume       = {10},
  number       = {6},
  pages        = {210},
  year         = {2019},
  url          = {https://doi.org/10.3390/info10060210},
  doi          = {10.3390/INFO10060210},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/BerbecaruLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PedoneLV19,
  author       = {Ignazio Pedone and
                  Antonio Lioy and
                  Fulvio Valenza},
  title        = {Towards an Efficient Management and Orchestration Framework for Virtual
                  Network Security Functions},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2425983:1--2425983:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2425983},
  doi          = {10.1155/2019/2425983},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PedoneLV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/BerbecaruLC19,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Cesare Cameroni},
  title        = {Providing digital identity and academic attributes through European
                  eID infrastructures: Results achieved, limitations, and future steps},
  journal      = {Softw. Pract. Exp.},
  volume       = {49},
  number       = {11},
  pages        = {1643--1662},
  year         = {2019},
  url          = {https://doi.org/10.1002/spe.2738},
  doi          = {10.1002/SPE.2738},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/BerbecaruLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/BasileVLLP19,
  author       = {Cataldo Basile and
                  Fulvio Valenza and
                  Antonio Lioy and
                  Diego R. L{\'{o}}pez and
                  Antonio Pastor Perales},
  title        = {Adding Support for Automatic Enforcement of Security Policies in {NFV}
                  Networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {27},
  number       = {2},
  pages        = {707--720},
  year         = {2019},
  url          = {https://doi.org/10.1109/TNET.2019.2895278},
  doi          = {10.1109/TNET.2019.2895278},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/BasileVLLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/BerbecaruLC19,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Cesare Cameroni},
  editor       = {Igor V. Kotenko and
                  Costin Badica and
                  Vasily Desnitsky and
                  Didier El Baz and
                  Mirjana Ivanovic},
  title        = {Authorize-then-Authenticate: Supporting Authorization Decisions Prior
                  to Authentication in an Electronic Identity Infrastructure},
  booktitle    = {Intelligent Distributed Computing XIII, 13th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg,
                  Russia, 7-9 October, 2019},
  series       = {Studies in Computational Intelligence},
  volume       = {868},
  pages        = {313--322},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32258-8\_37},
  doi          = {10.1007/978-3-030-32258-8\_37},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/BerbecaruLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/BenedictisL19,
  author       = {Marco de Benedictis and
                  Antonio Lioy},
  editor       = {Christian Jacquenet and
                  Filip De Turck and
                  Prosper Chemouil and
                  Flavio Esposito and
                  Olivier Festor and
                  Walter Cerroni and
                  Stefano Secci},
  title        = {A proposal for trust monitoring in a Network Functions Virtualisation
                  Infrastructure},
  booktitle    = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris,
                  France, June 24-28, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NETSOFT.2019.8806655},
  doi          = {10.1109/NETSOFT.2019.8806655},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netsoft/BenedictisL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-06641,
  author       = {Diana Berbecaru and
                  Antonio Lioy},
  title        = {Towards Simplifying {PKI} Implementation: Client-Server based Validation
                  of Public Key Certificates},
  journal      = {CoRR},
  volume       = {abs/1910.06641},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.06641},
  eprinttype    = {arXiv},
  eprint       = {1910.06641},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-06641.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-07930,
  author       = {Diana Berbecaru and
                  Antonio Lioy},
  title        = {Preliminary steps in designing and implementing a privilege verifier
                  for {PMI}},
  journal      = {CoRR},
  volume       = {abs/1910.07930},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.07930},
  eprinttype    = {arXiv},
  eprint       = {1910.07930},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-07930.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-07945,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Marius Marian},
  title        = {A Framework for Secure Digital Administration},
  journal      = {CoRR},
  volume       = {abs/1910.07945},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.07945},
  eprinttype    = {arXiv},
  eprint       = {1910.07945},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-07945.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-09027,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Marius Marian and
                  Diana Marano},
  title        = {Secure Digital Administration in Medical Environment},
  journal      = {CoRR},
  volume       = {abs/1910.09027},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.09027},
  eprinttype    = {arXiv},
  eprint       = {1910.09027},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-09027.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ValenzaL18,
  author       = {Fulvio Valenza and
                  Antonio Lioy},
  title        = {User-oriented Network Security Policy Specification},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {33--47},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.05.31.033},
  doi          = {10.22667/JISIS.2018.05.31.033},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ValenzaL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ViticchieBVL18,
  author       = {Alessio Viticchi{\'{e}} and
                  Cataldo Basile and
                  Fulvio Valenza and
                  Antonio Lioy},
  title        = {On the impossibility of effectively using likely-invariants for software
                  attestation purposes},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {2},
  pages        = {1--25},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.06.30.001},
  doi          = {10.22667/JOWUA.2018.06.30.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ViticchieBVL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/BenedictisLS18,
  author       = {Marco de Benedictis and
                  Antonio Lioy and
                  Paolo Smiraglia},
  title        = {Container-based design of a Virtual Network Security Function},
  booktitle    = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft
                  2018, Montreal, QC, Canada, June 25-29, 2018},
  pages        = {55--63},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NETSOFT.2018.8459903},
  doi          = {10.1109/NETSOFT.2018.8459903},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netsoft/BenedictisLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/BasileCPLV17,
  author       = {Cataldo Basile and
                  Daniele Canavese and
                  Christian Pitscheider and
                  Antonio Lioy and
                  Fulvio Valenza},
  title        = {Assessing network authorization policies via reachability analysis},
  journal      = {Comput. Electr. Eng.},
  volume       = {64},
  pages        = {110--131},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.compeleceng.2017.02.019},
  doi          = {10.1016/J.COMPELECENG.2017.02.019},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/BasileCPLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ValenzaSSLSV17,
  author       = {Fulvio Valenza and
                  Tao Su and
                  Serena Spinoso and
                  Antonio Lioy and
                  Riccardo Sisto and
                  Marco Vallini},
  title        = {A formal approach for network security policy validation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {1},
  pages        = {79--100},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.03.31.079},
  doi          = {10.22667/JOWUA.2017.03.31.079},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ValenzaSSLSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ValenzaBCL17,
  author       = {Fulvio Valenza and
                  Cataldo Basile and
                  Daniele Canavese and
                  Antonio Lioy},
  title        = {Classification and Analysis of Communication Protection Policy Anomalies},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {25},
  number       = {5},
  pages        = {2601--2614},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNET.2017.2708096},
  doi          = {10.1109/TNET.2017.2708096},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/ValenzaBCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/ViticchieBL17,
  author       = {Alessio Viticchi{\'{e}} and
                  Cataldo Basile and
                  Antonio Lioy},
  editor       = {Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Remotely Assessing Integrity of Software Applications by Monitoring
                  Invariants: Present Limitations and Future Directions},
  booktitle    = {Risks and Security of Internet and Systems - 12th International Conference,
                  CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10694},
  pages        = {66--82},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-76687-4\_5},
  doi          = {10.1007/978-3-319-76687-4\_5},
  timestamp    = {Fri, 27 Dec 2019 21:24:12 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/ViticchieBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/SmiragliaBALP17,
  author       = {Paolo Smiraglia and
                  Marco de Benedictis and
                  Andrea S. Atzeni and
                  Antonio Lioy and
                  Massimiliano Pucciarelli},
  editor       = {Sokratis K. Katsikas and
                  Vasilios Zorkadis},
  title        = {The {FICEP} Infrastructure - How We Deployed the Italian eIDAS Node
                  in the Cloud},
  booktitle    = {E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government
                  Services - 7th International Conference, E-Democracy 2017, Athens,
                  Greece, December 14-15, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {792},
  pages        = {196--210},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71117-1\_14},
  doi          = {10.1007/978-3-319-71117-1\_14},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edemocracy/SmiragliaBALP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/GardikisTTBCLGF17,
  author       = {Georgios Gardikis and
                  K. Tzoulas and
                  K. Tripolitis and
                  A. Bartzas and
                  Socrates Costicoglou and
                  Antonio Lioy and
                  Bernat Gast{\'{o}}n and
                  Carolina Fernandez and
                  Cristian D{\'{a}}vila and
                  Antonios Litke and
                  Nikolaos Papadakis and
                  Dimitris Papadopoulos and
                  Antonio Pastor and
                  Jer{\'{o}}nimo N{\'{u}}{\~{n}}ez and
                  Ludovic Jacquin and
                  Hamza Attak and
                  N. Davri and
                  George Xylouris and
                  M. Kafetzakis and
                  Dimitris Katsianis and
                  Ioannis Neokosmidis and
                  M. Terranova and
                  C. Giustozzi and
                  T. Batista and
                  R. Preto and
                  Eleni Trouva and
                  Y. Angelopoulos and
                  Akis Kourtis},
  title        = {{SHIELD:} {A} novel NFV-based cybersecurity framework},
  booktitle    = {2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna,
                  Italy, July 3-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NETSOFT.2017.8004228},
  doi          = {10.1109/NETSOFT.2017.8004228},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/GardikisTTBCLGF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfvsdn/LioyGGJBAX17,
  author       = {Antonio Lioy and
                  Georgios Gardikis and
                  Bernat Gast{\'{o}}n and
                  Ludovic Jacquin and
                  Marco de Benedictis and
                  Y. Angelopoulos and
                  C. Xylouris},
  title        = {NFV-based network protection: The {SHIELD} approach},
  booktitle    = {2017 {IEEE} Conference on Network Function Virtualization and Software
                  Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NFV-SDN.2017.8169869},
  doi          = {10.1109/NFV-SDN.2017.8169869},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nfvsdn/LioyGGJBAX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfvsdn/BenedictisL17,
  author       = {Marco de Benedictis and
                  Antonio Lioy},
  title        = {On the establishment of trust in the cloud-based {ETSI} {NFV} framework},
  booktitle    = {2017 {IEEE} Conference on Network Function Virtualization and Software
                  Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017},
  pages        = {280--285},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NFV-SDN.2017.8169864},
  doi          = {10.1109/NFV-SDN.2017.8169864},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nfvsdn/BenedictisL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/ReganoCBL17,
  author       = {Leonardo Regano and
                  Daniele Canavese and
                  Cataldo Basile and
                  Antonio Lioy},
  title        = {Towards Optimally Hiding Protected Assets in Software Applications},
  booktitle    = {2017 {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2017, Prague, Czech Republic, July 25-29, 2017},
  pages        = {374--385},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/QRS.2017.47},
  doi          = {10.1109/QRS.2017.47},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/ReganoCBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/LioySSALP17,
  author       = {Antonio Lioy and
                  Tao Su and
                  Adrian L. Shaw and
                  Hamza Attak and
                  Diego R. L{\'{o}}pez and
                  Antonio Pastor},
  editor       = {Shao Ying Zhu and
                  Sandra Scott{-}Hayward and
                  Ludovic Jacquin and
                  Richard Hill},
  title        = {Trust in {SDN/NFV} Environments},
  booktitle    = {Guide to Security in {SDN} and {NFV} - Challenges, Opportunities,
                  and Applications},
  series       = {Computer Communications and Networks},
  pages        = {103--124},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64653-4\_4},
  doi          = {10.1007/978-3-319-64653-4\_4},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/LioySSALP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/AttakMDDFGGJLLPPNT17,
  author       = {Hamza Attak and
                  Marco Casassa Mont and
                  Cristian D{\'{a}}vila and
                  Eleni{-}Constantina Davri and
                  Carolina Fernandez and
                  Georgios Gardikis and
                  Bernat Gast{\'{o}}n and
                  Ludovic Jacquin and
                  Antonio Lioy and
                  Antonis Litke and
                  Nikolaos K. Papadakis and
                  Dimitris Papadopoulos and
                  Jer{\'{o}}nimo N{\'{u}}{\~{n}}ez and
                  Eleni Trouva},
  editor       = {Shao Ying Zhu and
                  Sandra Scott{-}Hayward and
                  Ludovic Jacquin and
                  Richard Hill},
  title        = {{SHIELD:} Securing Against Intruders and Other Threats Through an
                  NFV-Enabled Environment},
  booktitle    = {Guide to Security in {SDN} and {NFV} - Challenges, Opportunities,
                  and Applications},
  series       = {Computer Communications and Networks},
  pages        = {197--225},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64653-4\_8},
  doi          = {10.1007/978-3-319-64653-4\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/AttakMDDFGGJLLPPNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-02175,
  author       = {Fulvio Valenza and
                  Cataldo Basile and
                  Daniele Canavese and
                  Antonio Lioy},
  title        = {Classification and Analysis of Communication Protection Policy Anomalies},
  journal      = {CoRR},
  volume       = {abs/1708.02175},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.02175},
  eprinttype    = {arXiv},
  eprint       = {1708.02175},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-02175.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BasileCLPV16,
  author       = {Cataldo Basile and
                  Daniele Canavese and
                  Antonio Lioy and
                  Christian Pitscheider and
                  Fulvio Valenza},
  title        = {Inter-function anomaly analysis for correct {SDN/NFV} deployment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {25--43},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1917},
  doi          = {10.1002/NEM.1917},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BasileCLPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ValenzaVL16,
  author       = {Fulvio Valenza and
                  Marco Vallini and
                  Antonio Lioy},
  editor       = {Ilsun You and
                  Elisa Bertino},
  title        = {Online and Offline Security Policy Assessment},
  booktitle    = {Proceedings of the 8th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October
                  28, 2016},
  pages        = {101--104},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2995970},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ValenzaVL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/BerbecaruL16,
  author       = {Diana Berbecaru and
                  Antonio Lioy},
  title        = {On the design, implementation and integration of an Attribute Provider
                  in the Pan-European eID infrastructure},
  booktitle    = {{IEEE} Symposium on Computers and Communication, {ISCC} 2016, Messina,
                  Italy, June 27-30, 2016},
  pages        = {1263--1269},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCC.2016.7543910},
  doi          = {10.1109/ISCC.2016.7543910},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/BerbecaruL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/BerbecaruL16,
  author       = {Diana Berbecaru and
                  Antonio Lioy},
  title        = {Efficient Attribute Management in a Federated Identity Management
                  Infrastructure},
  booktitle    = {24th Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2016, Heraklion, Crete, Greece,
                  February 17-19, 2016},
  pages        = {590--595},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/PDP.2016.102},
  doi          = {10.1109/PDP.2016.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/BerbecaruL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ReganoCBVL16,
  author       = {Leonardo Regano and
                  Daniele Canavese and
                  Cataldo Basile and
                  Alessio Viticchi{\'{e}} and
                  Antonio Lioy},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Towards Automatic Risk Analysis and Mitigation of Software Applications},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_8},
  doi          = {10.1007/978-3-319-45931-8\_8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ReganoCBVL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/MonteroYSJPSLRB15,
  author       = {Diego Montero and
                  Marcelo Yannuzzi and
                  Adrian L. Shaw and
                  Ludovic Jacquin and
                  Antonio Pastor and
                  Ren{\'{e}} Serral{-}Graci{\`{a}} and
                  Antonio Lioy and
                  Fulvio Risso and
                  Cataldo Basile and
                  Roberto Sassu and
                  Mario Nemirovsky and
                  Francesco Ciaccia and
                  Michael Georgiades and
                  Savvas Charalambides and
                  Jarkko Kuusij{\"{a}}rvi and
                  Francesca Bosco},
  title        = {Virtualized security at the network edge: a user-centric approach},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {53},
  number       = {4},
  pages        = {176--186},
  year         = {2015},
  url          = {https://doi.org/10.1109/MCOM.2015.7081092},
  doi          = {10.1109/MCOM.2015.7081092},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/MonteroYSJPSLRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/BerbecaruL15,
  author       = {Diana Berbecaru and
                  Antonio Lioy},
  title        = {Exploiting the European Union trusted service status list for certificate
                  validation in {STORK:} design, implementation, and lessons learnt},
  journal      = {Softw. Pract. Exp.},
  volume       = {45},
  number       = {11},
  pages        = {1457--1477},
  year         = {2015},
  url          = {https://doi.org/10.1002/spe.2292},
  doi          = {10.1002/SPE.2292},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/BerbecaruL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/BasileL15,
  author       = {Cataldo Basile and
                  Antonio Lioy},
  title        = {Analysis of Application-Layer Filtering Policies With Application
                  to {HTTP}},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {23},
  number       = {1},
  pages        = {28--41},
  year         = {2015},
  url          = {https://doi.org/10.1109/TNET.2013.2293625},
  doi          = {10.1109/TNET.2013.2293625},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/BasileL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cspf/JacquinLLSS15,
  author       = {Ludovic Jacquin and
                  Antonio Lioy and
                  Diego R. L{\'{o}}pez and
                  Adrian L. Shaw and
                  Tao Su},
  editor       = {Frances Cleary and
                  Massimo Felici},
  title        = {The Trust Problem in Modern Network Infrastructures},
  booktitle    = {Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation
                  Forum, {CSP} Innovation Forum 2015, Brussels, Belgium, April 28-29,
                  2015, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {530},
  pages        = {116--127},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25360-2\_10},
  doi          = {10.1007/978-3-319-25360-2\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cspf/JacquinLLSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/BasileLPVV15,
  author       = {Cataldo Basile and
                  Antonio Lioy and
                  Christian Pitscheider and
                  Fulvio Valenza and
                  Marco Vallini},
  title        = {A novel approach for integrating security policy enforcement with
                  dynamic network virtualization},
  booktitle    = {Proceedings of the 1st {IEEE} Conference on Network Softwarization,
                  NetSoft 2015, London, United Kingdom, April 13-17, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NETSOFT.2015.7116152},
  doi          = {10.1109/NETSOFT.2015.7116152},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netsoft/BasileLPVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/BonafigliaCLNRS15,
  author       = {Roberto Bonafiglia and
                  Francesco Ciaccia and
                  Antonio Lioy and
                  Mario Nemirovsky and
                  Fulvio Risso and
                  Tao Su},
  title        = {Offloading personal security applications to a secure and trusted
                  network node},
  booktitle    = {Proceedings of the 1st {IEEE} Conference on Network Softwarization,
                  NetSoft 2015, London, United Kingdom, April 13-17, 2015},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NETSOFT.2015.7116171},
  doi          = {10.1109/NETSOFT.2015.7116171},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netsoft/BonafigliaCLNRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/BasileLPZ15,
  author       = {Cataldo Basile and
                  Antonio Lioy and
                  Christian Pitscheider and
                  Shilong Zhao},
  editor       = {Masoud Daneshtalab and
                  Marco Aldinucci and
                  Ville Lepp{\"{a}}nen and
                  Johan Lilius and
                  Mats Brorsson},
  title        = {A Formal Model of Policy Reconciliation},
  booktitle    = {23rd Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2015, Turku, Finland, March 4-6,
                  2015},
  pages        = {587--594},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PDP.2015.42},
  doi          = {10.1109/PDP.2015.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/BasileLPZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtsi/ValenzaSBSL15,
  author       = {Fulvio Valenza and
                  Serena Spinoso and
                  Cataldo Basile and
                  Riccardo Sisto and
                  Antonio Lioy},
  title        = {A formal model of network policy analysis},
  booktitle    = {1st {IEEE} International Forum on Research and Technologies for Society
                  and Industry Leveraging a better tomorrow, {RTSI} 2015, Torino, Italy,
                  September 16-18, 2015},
  pages        = {516--522},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/RTSI.2015.7325150},
  doi          = {10.1109/RTSI.2015.7325150},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rtsi/ValenzaSBSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BasileCLV14,
  author       = {Cataldo Basile and
                  Daniele Canavese and
                  Antonio Lioy and
                  Fulvio Valenza},
  editor       = {Javier L{\'{o}}pez and
                  Indrajit Ray and
                  Bruno Crispo},
  title        = {Inter-technology Conflict Analysis for Communication Protection Policies},
  booktitle    = {Risks and Security of Internet and Systems - 9th International Conference,
                  CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8924},
  pages        = {148--163},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17127-2\_10},
  doi          = {10.1007/978-3-319-17127-2\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/BasileCLV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cspf/DaltonLLRS14,
  author       = {Chris Dalton and
                  Antonio Lioy and
                  Diego R. L{\'{o}}pez and
                  Fulvio Risso and
                  Roberto Sassu},
  editor       = {Frances Cleary and
                  Massimo Felici},
  title        = {Exploiting the Network for Securing Personal Devices},
  booktitle    = {Cyber Security and Privacy - Third Cyber Security and Privacy {EU}
                  Forum, {CSP} Forum 2014, Athens, Greece, May 21-22, 2014, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {470},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12574-9\_2},
  doi          = {10.1007/978-3-319-12574-9\_2},
  timestamp    = {Mon, 29 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cspf/DaltonLLRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SassuRL14,
  author       = {Roberto Sassu and
                  Gianluca Ramunno and
                  Antonio Lioy},
  title        = {Practical Assessment of Biba Integrity for TCG-Enabled Platforms},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {495--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.63},
  doi          = {10.1109/TRUSTCOM.2014.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SassuRL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/BerbecaruCL13,
  author       = {Diana Berbecaru and
                  Matteo Maria Casalino and
                  Antonio Lioy},
  title        = {FcgiOCSP: a scalable OCSP-based certificate validation system exploiting
                  the FastCGI interface},
  journal      = {Softw. Pract. Exp.},
  volume       = {43},
  number       = {12},
  pages        = {1489--1518},
  year         = {2013},
  url          = {https://doi.org/10.1002/spe.2148},
  doi          = {10.1002/SPE.2148},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/BerbecaruCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/CutilloL13,
  author       = {Leucio Antonio Cutillo and
                  Antonio Lioy},
  title        = {Privacy-by-design cloud computing through decentralization and real
                  life trust},
  booktitle    = {13th {IEEE} International Conference on Peer-to-Peer Computing, {IEEE}
                  {P2P} 2013, Trento, Italy, September 9-11, 2013, Proceedings},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/P2P.2013.6688726},
  doi          = {10.1109/P2P.2013.6688726},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/CutilloL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/BasileCLP13,
  author       = {Cataldo Basile and
                  Daniele Canavese and
                  Antonio Lioy and
                  Christian Pitscheider},
  title        = {Improved Reachability Analysis for Security Management},
  booktitle    = {21st Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2013, Belfast, United Kingdom,
                  February 27 - March 1, 2013},
  pages        = {534--541},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PDP.2013.86},
  doi          = {10.1109/PDP.2013.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/BasileCLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/CutilloL13,
  author       = {Leucio Antonio Cutillo and
                  Antonio Lioy},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {Towards Privacy-by-Design Peer-to-Peer Cloud Computing},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 10th International
                  Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8058},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40343-9\_8},
  doi          = {10.1007/978-3-642-40343-9\_8},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/CutilloL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/BasileCL12,
  author       = {Cataldo Basile and
                  Alberto Cappadonia and
                  Antonio Lioy},
  title        = {Network-Level Access Control Policy Analysis and Transformation},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {20},
  number       = {4},
  pages        = {985--998},
  year         = {2012},
  url          = {https://doi.org/10.1109/TNET.2011.2178431},
  doi          = {10.1109/TNET.2011.2178431},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/BasileCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/BasileLP12,
  author       = {Cataldo Basile and
                  Antonio Lioy and
                  Stefano Paraboschi},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {The PoSecCo Security Decision Support System},
  booktitle    = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2012 Conference, Brussels,
                  Belgium, October 23-24, 2012},
  pages        = {64--74},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-658-00333-3\_7},
  doi          = {10.1007/978-3-658-00333-3\_7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/BasileLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisec/2011,
  editor       = {Ramjee Prasad and
                  K{\'{a}}roly Farkas and
                  Andreas U. Schmidt and
                  Antonio Lioy and
                  Giovanni Russello and
                  Flaminia L. Luccio},
  title        = {Security and Privacy in Mobile Information and Communication Systems
                  - Third International {ICST} Conference, MobiSec 2011, Aalborg, Denmark,
                  May 17-19, 2011, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {94},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30244-2},
  doi          = {10.1007/978-3-642-30244-2},
  isbn         = {978-3-642-30243-5},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/CabidduCSVRL11,
  author       = {Giovanni Cabiddu and
                  Emanuele Cesena and
                  Roberto Sassu and
                  Davide Vernizzi and
                  Gianluca Ramunno and
                  Antonio Lioy},
  title        = {The Trusted Platform Agent},
  journal      = {{IEEE} Softw.},
  volume       = {28},
  number       = {2},
  pages        = {35--41},
  year         = {2011},
  url          = {https://doi.org/10.1109/MS.2010.160},
  doi          = {10.1109/MS.2010.160},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/CabidduCSVRL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CalandrielloPHL11,
  author       = {Giorgio Calandriello and
                  Panos Papadimitratos and
                  Jean{-}Pierre Hubaux and
                  Antonio Lioy},
  title        = {On the Performance of Secure Vehicular Communication Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {6},
  pages        = {898--912},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2010.58},
  doi          = {10.1109/TDSC.2010.58},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CalandrielloPHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/AimeLP11,
  author       = {Marco Domenico Aime and
                  Antonio Lioy and
                  Paolo Carlo Pomi},
  title        = {Automatic (Re)Configuration of {IT} Systems for Dependability},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {110--124},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSC.2010.31},
  doi          = {10.1109/TSC.2010.31},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/AimeLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CesenaRSVL11,
  author       = {Emanuele Cesena and
                  Gianluca Ramunno and
                  Roberto Sassu and
                  Davide Vernizzi and
                  Antonio Lioy},
  editor       = {Yan Chen and
                  Shouhuai Xu and
                  Ahmad{-}Reza Sadeghi and
                  Xinwen Zhang},
  title        = {On scalability of remote attestation},
  booktitle    = {Proceedings of the sixth {ACM} workshop on Scalable trusted computing,
                  STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046582.2046588},
  doi          = {10.1145/2046582.2046588},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CesenaRSVL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/BerbecaruLA11,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Marco Domenico Aime},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {Exploiting Proxy-Based Federated Identity Management in Wireless Roaming
                  Access},
  booktitle    = {Trust, Privacy and Security in Digital Business - 8th International
                  Conference, TrustBus 2011, Toulouse, France, August 29 - September
                  2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6863},
  pages        = {13--23},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22890-2\_2},
  doi          = {10.1007/978-3-642-22890-2\_2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/BerbecaruLA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/BerbecaruAL10,
  author       = {Diana Berbecaru and
                  Luca Albertalli and
                  Antonio Lioy},
  title        = {The ForwardDiffSig Scheme for Multicast Authentication},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {18},
  number       = {6},
  pages        = {1855--1868},
  year         = {2010},
  url          = {https://doi.org/10.1109/TNET.2010.2052927},
  doi          = {10.1109/TNET.2010.2052927},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/BerbecaruAL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/BasileLV10,
  author       = {Cataldo Basile and
                  Antonio Lioy and
                  Marco Vallini},
  editor       = {Marco Danelutto and
                  Julien Bourgeois and
                  Tom Gross},
  title        = {Towards a Network-Independent Policy Specification},
  booktitle    = {Proceedings of the 18th Euromicro Conference on Parallel, Distributed
                  and Network-based Processing, {PDP} 2010, Pisa, Italy, February 17-19,
                  2010},
  pages        = {649--653},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PDP.2010.45},
  doi          = {10.1109/PDP.2010.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/BasileLV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/icsec/LioyR10,
  author       = {Antonio Lioy and
                  Gianluca Ramunno},
  editor       = {Peter P. Stavroulakis and
                  Mark Stamp},
  title        = {Trusted Computing},
  booktitle    = {Handbook of Information and Communication Security},
  pages        = {697--717},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-04117-4\_32},
  doi          = {10.1007/978-3-642-04117-4\_32},
  timestamp    = {Mon, 13 Mar 2023 20:54:16 +0100},
  biburl       = {https://dblp.org/rec/reference/icsec/LioyR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisec/2010,
  editor       = {Andreas U. Schmidt and
                  Giovanni Russello and
                  Antonio Lioy and
                  Neeli R. Prasad and
                  Shiguo Lian},
  title        = {Security and Privacy in Mobile Information and Communication Systems
                  - Second International {ICST} Conference, MobiSec 2010, Catania, Sicily,
                  Italy, May 27-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {47},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17502-2},
  doi          = {10.1007/978-3-642-17502-2},
  isbn         = {978-3-642-17501-5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/BerbecaruDL09,
  author       = {Diana Berbecaru and
                  Amarkumar Desai and
                  Antonio Lioy},
  title        = {A unified and flexible solution for integrating {CRL} and {OCSP} into
                  {PKI} applications},
  journal      = {Softw. Pract. Exp.},
  volume       = {39},
  number       = {10},
  pages        = {891--921},
  year         = {2009},
  url          = {https://doi.org/10.1002/spe.918},
  doi          = {10.1002/SPE.918},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/BerbecaruDL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis-spain/BasileLSV09,
  author       = {Cataldo Basile and
                  Antonio Lioy and
                  Salvatore Scozzi and
                  Marco Vallini},
  editor       = {{\'{A}}lvaro Herrero and
                  Paolo Gastaldo and
                  Rodolfo Zunino and
                  Emilio Corchado},
  title        = {Ontology-Based Policy Translation},
  booktitle    = {Computational Intelligence in Security for Information Systems - CISIS'09,
                  2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {63},
  pages        = {117--126},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04091-7\_15},
  doi          = {10.1007/978-3-642-04091-7\_15},
  timestamp    = {Fri, 12 Aug 2022 13:44:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis-spain/BasileLSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GiambrunoSML09,
  author       = {Alessandro Giambruno and
                  Muhammad Awais Shibli and
                  Sead Muftic and
                  Antonio Lioy},
  title        = {MagicNET: {XACML} authorization policies for mobile agents},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402600},
  doi          = {10.1109/ICITST.2009.5402600},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GiambrunoSML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ShibliMGL09,
  author       = {Muhammad Awais Shibli and
                  Sead Muftic and
                  Alessandro Giambruno and
                  Antonio Lioy},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  Haining Wang and
                  Wanlei Zhou},
  title        = {MagicNET: Security System for Development, Validation and Adoption
                  of Mobile Agents},
  booktitle    = {Third International Conference on Network and System Security, {NSS}
                  2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  pages        = {389--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NSS.2009.33},
  doi          = {10.1109/NSS.2009.33},
  timestamp    = {Thu, 15 Aug 2024 07:54:34 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ShibliMGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis-spain/LioyRV08,
  author       = {Antonio Lioy and
                  Gianluca Ramunno and
                  Davide Vernizzi},
  editor       = {Emilio Corchado and
                  Rodolfo Zunino and
                  Paolo Gastaldo and
                  {\'{A}}lvaro Herrero},
  title        = {Trusted-Computing Technologies for the Protection of Critical Information
                  Systems},
  booktitle    = {Proceedings of the International Workshop on Computational Intelligence
                  in Security for Information Systems, CISIS'08, Genova, Italy, October
                  23-24, 2008},
  series       = {Advances in Soft Computing},
  volume       = {53},
  pages        = {77--83},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88181-0\_10},
  doi          = {10.1007/978-3-540-88181-0\_10},
  timestamp    = {Fri, 12 Aug 2022 13:44:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis-spain/LioyRV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/BasileCL08,
  author       = {Cataldo Basile and
                  Alberto Cappadonia and
                  Antonio Lioy},
  title        = {Geometric Interpretation of Policy Specification},
  booktitle    = {9th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
                  {USA}},
  pages        = {78--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/POLICY.2008.36},
  doi          = {10.1109/POLICY.2008.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/BasileCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2008,
  editor       = {Steven Furnell and
                  Sokratis K. Katsikas and
                  Antonio Lioy},
  title        = {Trust, Privacy and Security in Digital Business, 5th International
                  Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5185},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85735-8},
  doi          = {10.1007/978-3-540-85735-8},
  isbn         = {978-3-540-85734-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0808-2666,
  author       = {Panos Papadimitratos and
                  Giorgio Calandriello and
                  Jean{-}Pierre Hubaux and
                  Antonio Lioy},
  title        = {Impact of Vehicular Communications Security on Transportation Safety},
  journal      = {CoRR},
  volume       = {abs/0808.2666},
  year         = {2008},
  url          = {http://arxiv.org/abs/0808.2666},
  eprinttype    = {arXiv},
  eprint       = {0808.2666},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0808-2666.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AimeCL07,
  author       = {Marco Domenico Aime and
                  Giorgio Calandriello and
                  Antonio Lioy},
  title        = {Dependability in Wireless Networks: Can We Rely on WiFi?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {1},
  pages        = {23--29},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.4},
  doi          = {10.1109/MSP.2007.4},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AimeCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/BerbecaruL07,
  author       = {Diana Berbecaru and
                  Antonio Lioy},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati and
                  Josep L. Ferrer},
  title        = {On the Robustness of Applications Based on the {SSL} and {TLS} Security
                  Protocols},
  booktitle    = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4582},
  pages        = {248--264},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73408-6\_18},
  doi          = {10.1007/978-3-540-73408-6\_18},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/BerbecaruL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/AtzeniL07,
  author       = {Andrea S. Atzeni and
                  Antonio Lioy},
  editor       = {Jorge Cardoso and
                  Jos{\'{e}} Cordeiro and
                  Joaquim Filipe},
  title        = {An Estimation of Attack Surface to Evaluate Network (in)security},
  booktitle    = {{ICEIS} 2007 - Proceedings of the Ninth International Conference on
                  Enterprise Information Systems, Volume EIS, Funchal, Madeira, Portugal,
                  June 12-16, 2007},
  pages        = {493--497},
  year         = {2007},
  timestamp    = {Thu, 03 Feb 2022 09:27:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/AtzeniL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/CalandrielloPHL07,
  author       = {Giorgio Calandriello and
                  Panos Papadimitratos and
                  Jean{-}Pierre Hubaux and
                  Antonio Lioy},
  editor       = {Wieland Holfelder and
                  Paolo Santi and
                  Yih{-}Chun Hu and
                  Jean{-}Pierre Hubaux},
  title        = {Efficient and robust pseudonymous authentication in {VANET}},
  booktitle    = {Proceedings of the Fourth International Workshop on Vehicular Ad Hoc
                  Networks, {VANET} 2007, Montr{\'{e}}al, Qu{\'{e}}bec, Canada,
                  September 10, 2007},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1287748.1287752},
  doi          = {10.1145/1287748.1287752},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/CalandrielloPHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/BasileLPCG07,
  author       = {Cataldo Basile and
                  Antonio Lioy and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  F{\'{e}}lix J. Garc{\'{\i}}a Clemente and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {{POSITIF:} {A} Policy-Based Security Management System},
  booktitle    = {8th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy},
  pages        = {280},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/POLICY.2007.37},
  doi          = {10.1109/POLICY.2007.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/BasileLPCG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LioyMMP06,
  author       = {Antonio Lioy and
                  Marius Marian and
                  Natalia Moltchanova and
                  Massimiliano Pala},
  title        = {{PKI} past, present and future},
  journal      = {Int. J. Inf. Sec.},
  volume       = {5},
  number       = {1},
  pages        = {18--29},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10207-005-0077-9},
  doi          = {10.1007/S10207-005-0077-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/LioyMMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/PalaL06,
  author       = {Massimiliano Pala and
                  Antonio Lioy},
  editor       = {Andrea S. Atzeni and
                  Antonio Lioy},
  title        = {Fighting E-Mail Abuses: The {EMPE} Approach},
  booktitle    = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4043},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11774716\_11},
  doi          = {10.1007/11774716\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/PalaL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/AimeCL06,
  author       = {Marco Domenico Aime and
                  Giorgio Calandriello and
                  Antonio Lioy},
  editor       = {Paolo Bellavista and
                  Chi{-}Ming Chen and
                  Antonio Corradi and
                  Mahmoud Daneshmand},
  title        = {A Wireless Distributed Intrusion Detection System and a New Attack
                  Model},
  booktitle    = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy},
  pages        = {35--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCC.2006.22},
  doi          = {10.1109/ISCC.2006.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/AimeCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Lioy06,
  author       = {Antonio Lioy},
  editor       = {Sachar Paulus and
                  Norbert Pohlmann and
                  Helmut Reimer},
  title        = {Security Analysis and Configuration of Large Networks},
  booktitle    = {{ISSE} 2006 - Securing Electronic Busines Processes, Highlights of
                  the Information Security Solutions Europe 2006 Conference, 10-12 October
                  2006, Rome, Italy},
  pages        = {259--265},
  publisher    = {Vieweg},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-8348-9195-2\_28},
  doi          = {10.1007/978-3-8348-9195-2\_28},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/Lioy06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AtzeniL06,
  author       = {Andrea S. Atzeni and
                  Antonio Lioy},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Why to adopt a security metric? {A} brief survey},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_1},
  doi          = {10.1007/978-0-387-36584-8\_1},
  timestamp    = {Sun, 02 Oct 2022 16:18:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AtzeniL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2006,
  editor       = {Andrea S. Atzeni and
                  Antonio Lioy},
  title        = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4043},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11774716},
  doi          = {10.1007/11774716},
  isbn         = {3-540-35151-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/AimeLR05,
  author       = {Marco Domenico Aime and
                  Antonio Lioy and
                  Gianluca Ramunno},
  editor       = {Jana Dittmann and
                  Stefan Katzenbeisser and
                  Andreas Uhl},
  title        = {Decentralised Access Control in 802.11 Networks},
  booktitle    = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2005, Salzburg, Austria, September
                  19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3677},
  pages        = {180--190},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552055\_18},
  doi          = {10.1007/11552055\_18},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/AimeLR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/LioyRAP05,
  author       = {Antonio Lioy and
                  Gianluca Ramunno and
                  Marco Domenico Aime and
                  Massimiliano Pala},
  editor       = {Jana Dittmann and
                  Stefan Katzenbeisser and
                  Andreas Uhl},
  title        = {Motivations for a Theoretical Approach to {WYSIWYS}},
  booktitle    = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2005, Salzburg, Austria, September
                  19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3677},
  pages        = {289--290},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552055\_38},
  doi          = {10.1007/11552055\_38},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/LioyRAP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/AimeAL05,
  author       = {Marco Domenico Aime and
                  Andrea S. Atzeni and
                  Antonio Lioy},
  title        = {The Wireless Opaque Channel to Contrast Information Leakage},
  booktitle    = {2005 International Conference on a World of Wireless, Mobile and Multimedia
                  Networks {(WOWMOM} 2005), 13-16 June 2005, Taormina, Italy, Proceedings},
  pages        = {570--575},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WOWMOM.2005.104},
  doi          = {10.1109/WOWMOM.2005.104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/AimeAL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/AimeL05,
  author       = {Marco Domenico Aime and
                  Antonio Lioy},
  title        = {Incremental Trust: Building Trust from Past Experience},
  booktitle    = {2005 International Conference on a World of Wireless, Mobile and Multimedia
                  Networks {(WOWMOM} 2005), 13-16 June 2005, Taormina, Italy, Proceedings},
  pages        = {603--608},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WOWMOM.2005.54},
  doi          = {10.1109/WOWMOM.2005.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/AimeL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egcdmas/LioyR04,
  author       = {Antonio Lioy and
                  Gianluca Ramunno},
  editor       = {Mohammad S. Obaidat and
                  Noureddine Boudriga},
  title        = {Multiple electronic signatures on multiple documents},
  booktitle    = {Electronic Government and Commerce: Design, Modeling, Analysis and
                  Security - Proceedings of the 1st International Workshop on Electronic
                  Government and Commerce: Design, Modeling, Analysis and Security,
                  {EGCDMAS} 2004, In conjunction with {ICETE} 2004, Set{\'{u}}bal,
                  Portugal, August 2004},
  pages        = {24--34},
  publisher    = {{INSTICC} Press},
  year         = {2004},
  timestamp    = {Wed, 15 Dec 2004 14:13:59 +0100},
  biburl       = {https://dblp.org/rec/conf/egcdmas/LioyR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LioyMMP04,
  author       = {Antonio Lioy and
                  Marius Marian and
                  Natalia Moltchanova and
                  Massimiliano Pala},
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {The EuroPKI Experience},
  booktitle    = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25980-0\_2},
  doi          = {10.1007/978-3-540-25980-0\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europki/LioyMMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iadis/BerbecaruL04,
  author       = {Diana Berbecaru and
                  Antonio Lioy},
  editor       = {Pedro T. Isa{\'{\i}}as and
                  Nitya Karmakar and
                  Lu{\'{\i}}s E. T. Rodrigues and
                  Patr{\'{\i}}cia Barbosa},
  title        = {Preliminary Steps in Designing and Implementing a Privilege Verifier
                  for {PMI}},
  booktitle    = {Proceedings of the {IADIS} International Conference WWW/Internet 2004,
                  Madrid, Spain, 2 Volumes},
  pages        = {317--324},
  publisher    = {{IADIS}},
  year         = {2004},
  timestamp    = {Wed, 01 Apr 2015 20:06:19 +0200},
  biburl       = {https://dblp.org/rec/conf/iadis/BerbecaruL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2003,
  editor       = {Antonio Lioy and
                  Daniele Mazzocchi},
  title        = {Communications and Multimedia Security - Advanced Techniques for Network
                  and Data Protection, 7th {IFIP} {TC-6} {TC-11} International Conference,
                  {CMS} 2003, Torino, Italy, October 2-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2828},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b13863},
  doi          = {10.1007/B13863},
  isbn         = {3-540-20185-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iadis/BerbecaruLMM02,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Marius Marian and
                  Diana Marano},
  title        = {Secure Digital Administration in Medical Environment},
  booktitle    = {Proceedings of the {IADIS} International Conference WWW/Internet 2002,
                  {ICWI} 2002, Lisbon, Portugal, November 13-15, 2002},
  pages        = {299--306},
  publisher    = {{IADIS}},
  year         = {2002},
  timestamp    = {Tue, 30 Dec 2003 11:36:37 +0100},
  biburl       = {https://dblp.org/rec/conf/iadis/BerbecaruLMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/BerbecaruLM02,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Marius Marian},
  title        = {Security aspects in standard certificate revocation mechanisms: a
                  case study for {OCSP}},
  booktitle    = {Proceedings of the Seventh {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2002), 1-4 July 2002, Taormina, Italy},
  pages        = {484--489},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ISCC.2002.1021719},
  doi          = {10.1109/ISCC.2002.1021719},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/BerbecaruLM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/BeniniMLMOP01,
  author       = {Luca Benini and
                  Giovanni De Micheli and
                  Antonio Lioy and
                  Enrico Macii and
                  Giuseppe Odasso and
                  Massimo Poncino},
  title        = {Synthesis of power-managed sequential components based oncomputational
                  kernel extraction},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {20},
  number       = {9},
  pages        = {1118--1131},
  year         = {2001},
  url          = {https://doi.org/10.1109/43.945307},
  doi          = {10.1109/43.945307},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/BeniniMLMOP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/BaltatuLLM01,
  author       = {Madalina Baltatu and
                  Antonio Lioy and
                  Dario Lombardo and
                  Daniele Mazzocchi},
  title        = {Towards a policy system for IPsec: issues and an experimental implementation},
  booktitle    = {Proceedings 9th {IEEE} International Conference on Networks, {ICON}
                  2001, Bangkok, Thailand, October 10-11, 2001},
  pages        = {146--151},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICON.2001.962332},
  doi          = {10.1109/ICON.2001.962332},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/BaltatuLLM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BerbecaruLM01,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Marius Marian},
  editor       = {George I. Davida and
                  Yair Frankel},
  title        = {On the Complexity of Public-Key Certificate Validation},
  booktitle    = {Information Security, 4th International Conference, {ISC} 2001, Malaga,
                  Spain, October 1-3, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2200},
  pages        = {183--203},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45439-X\_13},
  doi          = {10.1007/3-540-45439-X\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/BerbecaruLM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BaltatuLMM00,
  author       = {Madalina Baltatu and
                  Antonio Lioy and
                  Fabio Maino and
                  Daniele Mazzocchi},
  title        = {Security issues in control, management and routing protocols},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {881--894},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00159-6},
  doi          = {10.1016/S1389-1286(00)00159-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BaltatuLMM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/BaltatuLM00,
  author       = {Madalina Baltatu and
                  Antonio Lioy and
                  Daniele Mazzocchi},
  title        = {Security policy system: status and perspective},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networks 2000:
                  Networking Trends and Challenges in the New Millennium, {ICON} 2000,
                  Singapore, September 5-8, 2000},
  pages        = {278--284},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICON.2000.875802},
  doi          = {10.1109/ICON.2000.875802},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/BaltatuLM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CorradiMSBLM00,
  author       = {Antonio Corradi and
                  Rebecca Montanari and
                  Cesare Stefanelli and
                  Diana Berbecaru and
                  Antonio Lioy and
                  Fabio Maino},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {A Flexible Management Framework for Certificate Status Validation},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {481--490},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CorradiMSBLM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BeniniMLMOP99,
  author       = {Luca Benini and
                  Giovanni De Micheli and
                  Antonio Lioy and
                  Enrico Macii and
                  Giuseppe Odasso and
                  Massimo Poncino},
  title        = {Automatic Synthesis of Large Telescopic Units Based on Near-Minimum
                  Timed Supersetting},
  journal      = {{IEEE} Trans. Computers},
  volume       = {48},
  number       = {8},
  pages        = {769--779},
  year         = {1999},
  url          = {https://doi.org/10.1109/12.795120},
  doi          = {10.1109/12.795120},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/BeniniMLMOP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/CostinescuDLM99,
  author       = {Bogdan Costinescu and
                  Dan Dragomirescu and
                  Antonio Lioy and
                  Cristian Marinescu},
  editor       = {Hamid R. Arabnia},
  title        = {A Component-based Infrastructure for Building Cluster Management and
                  Monitoring Tools},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 1999, June 28 - July
                  1, 1999, Las Vegas, Nevada, {USA}},
  pages        = {2041--2047},
  publisher    = {{CSREA} Press},
  year         = {1999},
  timestamp    = {Tue, 30 Jul 2024 10:34:32 +0200},
  biburl       = {https://dblp.org/rec/conf/pdpta/CostinescuDLM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/BeniniMLMOP98,
  author       = {Luca Benini and
                  Giovanni De Micheli and
                  Antonio Lioy and
                  Enrico Macii and
                  Giuseppe Odasso and
                  Massimo Poncino},
  editor       = {Basant R. Chawla and
                  Randal E. Bryant and
                  Jan M. Rabaey},
  title        = {Computational Kernels and their Application to Sequential Power Optimization},
  booktitle    = {Proceedings of the 35th Conference on Design Automation, Moscone center,
                  San Francico, California, USA, June 15-19, 1998},
  pages        = {764--769},
  publisher    = {{ACM} Press},
  year         = {1998},
  url          = {https://doi.org/10.1145/277044.277237},
  doi          = {10.1145/277044.277237},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/BeniniMLMOP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/BeniniMLMOP98,
  author       = {Luca Benini and
                  Giovanni De Micheli and
                  Antonio Lioy and
                  Enrico Macii and
                  Giuseppe Odasso and
                  Massimo Poncino},
  title        = {Timed Supersetting and the Synthesis of Telescopic Units},
  booktitle    = {8th Great Lakes Symposium on {VLSI} {(GLS-VLSI} '98), 19-21 February
                  1998, Lafayette, LA, {USA}},
  pages        = {331--337},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/GLSV.1998.665289},
  doi          = {10.1109/GLSV.1998.665289},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/BeniniMLMOP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/charme/CabodiCLPQ97,
  author       = {Gianpiero Cabodi and
                  Paolo Camurati and
                  Antonio Lioy and
                  Massimo Poncino and
                  Stefano Quer},
  editor       = {Hon Fung Li and
                  David K. Probst},
  title        = {A parallel approach to symbolic traversal based on set partitioning},
  booktitle    = {Advances in Hardware Design and Verification, {IFIP} {WG} 10.5 International
                  Conference on Correct Hardware Design and Verification Methods, 16-18
                  October 1997, Montr{\'{e}}al, Qu{\'{e}}bec, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {105},
  pages        = {167--184},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Thu, 18 Feb 2010 08:37:22 +0100},
  biburl       = {https://dblp.org/rec/conf/charme/CabodiCLPQ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/LioyMPR97,
  author       = {Antonio Lioy and
                  Enrico Macii and
                  Massimo Poncino and
                  Massimo Rossello},
  title        = {Accurate Entropy Calculation for Large Logic Circuits Based on Output
                  Clustering},
  booktitle    = {7th Great Lakes Symposium on {VLSI} {(GLS-VLSI} '97), 13-15 March
                  1997, Urbana, IL, {USA}},
  pages        = {70},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/GLSV.1997.580413},
  doi          = {10.1109/GLSV.1997.580413},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/LioyMPR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LioyMM97,
  author       = {Antonio Lioy and
                  Fabio Maino and
                  Marco Mezzalama},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Secure document management and distribution in an open network environment},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {109--117},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028467},
  doi          = {10.1007/BFB0028467},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LioyMM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/GallianoLM97,
  author       = {Daniel Alberto Galliano and
                  Antonio Lioy and
                  Fabio Maino},
  editor       = {Louise Yngstr{\"{o}}m and
                  Jan Carlsen},
  title        = {Non-intrusive authentication},
  booktitle    = {Information Security in Research and Business, Proceedings of the
                  {IFIP} {TC11} 13th International Conference on Information Security
                  {(SEC} '97), 14-16 May 1997, Copenhagen, Denmark},
  series       = {{IFIP} Conference Proceedings},
  volume       = {92},
  pages        = {440--451},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Thu, 03 Jan 2002 12:08:24 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/GallianoLM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurodac/LavagnoLK94,
  author       = {Luciano Lavagno and
                  Antonio Lioy and
                  Michael Kishinevsky},
  editor       = {Jean Mermet},
  title        = {Testing redundant asynchronous circuits by variable phase splitting},
  booktitle    = {Proceedings EURO-DAC'94, European Design Automation Conference, Grenoble,
                  France, September 19-22, 1994},
  pages        = {328--333},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {http://dl.acm.org/citation.cfm?id=198278},
  timestamp    = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl       = {https://dblp.org/rec/conf/eurodac/LavagnoLK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/LioyP93,
  author       = {Antonio Lioy and
                  Massimo Poncino},
  title        = {A study of the resetability of synchronous sequential circuits},
  journal      = {Microprocess. Microprogramming},
  volume       = {38},
  number       = {1-5},
  pages        = {395--402},
  year         = {1993},
  url          = {https://doi.org/10.1016/0165-6074(93)90173-I},
  doi          = {10.1016/0165-6074(93)90173-I},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/LioyP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Lioy93,
  author       = {Antonio Lioy},
  title        = {On the Equivalence of Fanout-Point Faults},
  journal      = {{IEEE} Trans. Computers},
  volume       = {42},
  number       = {3},
  pages        = {268--271},
  year         = {1993},
  url          = {https://doi.org/10.1109/12.210169},
  doi          = {10.1109/12.210169},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/Lioy93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LioyP93,
  author       = {Antonio Lioy and
                  Massimo Poncino},
  title        = {On the Resetability of Synchronous Sequential Circuits},
  booktitle    = {1993 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  1993, Chicago, Illinois, USA, May 3-6, 1993},
  pages        = {1507--1510},
  publisher    = {{IEEE}},
  year         = {1993},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/LioyP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/Lloy92,
  author       = {Antonio Lioy},
  title        = {Advanced Fault Collapsing (Logic Circuits Testing)},
  journal      = {{IEEE} Des. Test Comput.},
  volume       = {9},
  number       = {1},
  pages        = {64--71},
  year         = {1992},
  url          = {https://doi.org/10.1109/54.124518},
  doi          = {10.1109/54.124518},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/Lloy92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/FarhatFL92,
  author       = {Hassan A. Farhat and
                  Steven G. From and
                  Antonio Lioy},
  title        = {A quadratic programming approach to estimating the testability and
                  coverage distributions of a {VLSI} circuit},
  journal      = {Microprocess. Microprogramming},
  volume       = {35},
  number       = {1-5},
  pages        = {479--483},
  year         = {1992},
  url          = {https://doi.org/10.1016/0165-6074(92)90357-D},
  doi          = {10.1016/0165-6074(92)90357-D},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/FarhatFL92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/LioyP91,
  author       = {Antonio Lioy and
                  Massimo Poncino},
  title        = {A hierarchical multi-level test generation system},
  booktitle    = {First Great Lakes Symposium on VLSI, 1991, Kalamazoo, MI, USA, March
                  1-2, 1991},
  pages        = {54--59},
  publisher    = {{IEEE}},
  year         = {1991},
  url          = {https://doi.org/10.1109/GLSV.1991.143942},
  doi          = {10.1109/GLSV.1991.143942},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/LioyP91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/LioyMMR91,
  author       = {Antonio Lioy and
                  Enrico Macii and
                  Angelo Raffaele Meo and
                  Matteo Sonza Reorda},
  title        = {An algebraic approach to test generation for sequential circuits},
  booktitle    = {First Great Lakes Symposium on VLSI, 1991, Kalamazoo, MI, USA, March
                  1-2, 1991},
  pages        = {115--120},
  publisher    = {{IEEE}},
  year         = {1991},
  url          = {https://doi.org/10.1109/GLSV.1991.143952},
  doi          = {10.1109/GLSV.1991.143952},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/LioyMMR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/Lioy91,
  author       = {Antonio Lioy},
  title        = {Looking for Functional Fault Equivalence},
  booktitle    = {Proceedings {IEEE} International Test Conference 1991, Test: Faster,
                  Better, Sooner, Nashville, TN, USA, October 26-30, 1991},
  pages        = {858--863},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/TEST.1991.519751},
  doi          = {10.1109/TEST.1991.519751},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/itc/Lioy91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spdp/CaliaL91,
  author       = {E. Calia and
                  Antonio Lioy},
  title        = {Test generation in a distributed environment},
  booktitle    = {Proceedings of the Third {IEEE} Symposium on Parallel and Distributed
                  Processing, {SPDP} 1991, 2-5 December 1991, Dallas, Texas, {USA}},
  pages        = {700--707},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SPDP.1991.218194},
  doi          = {10.1109/SPDP.1991.218194},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spdp/CaliaL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/CamuratiLPR90,
  author       = {Paolo Camurati and
                  Antonio Lioy and
                  Paolo Prinetto and
                  Matteo Sonza Reorda},
  title        = {Assessing the diagnostic power of test pattern sets},
  journal      = {Microprocessing and Microprogramming},
  volume       = {30},
  number       = {1-5},
  pages        = {413--419},
  year         = {1990},
  url          = {https://doi.org/10.1016/0165-6074(90)90276-F},
  doi          = {10.1016/0165-6074(90)90276-F},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/CamuratiLPR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/LioyM90,
  author       = {Antonio Lioy and
                  Marco Mezzalama},
  title        = {Automatic compaction of microcode},
  journal      = {Microprocess. Microsystems},
  volume       = {14},
  number       = {1},
  pages        = {21--29},
  year         = {1990},
  url          = {https://doi.org/10.1016/0141-9331(90)90010-S},
  doi          = {10.1016/0141-9331(90)90010-S},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/LioyM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurodac/CamuratiLPR90,
  author       = {Paolo Camurati and
                  Antonio Lioy and
                  Paolo Prinetto and
                  Matteo Sonza Reorda},
  editor       = {Gordon Adshead and
                  Jochen A. G. Jess},
  title        = {Diagnosis oriented test pattern generation},
  booktitle    = {European Design Automation Conference, {EURO-DAC} 1990, Glasgow, Scotland,
                  UK, March 12-15, 1990},
  pages        = {470--474},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/EDAC.1990.136693},
  doi          = {10.1109/EDAC.1990.136693},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurodac/CamuratiLPR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/GaiL89,
  author       = {S. Gai and
                  Antonio Lioy},
  title        = {A multilevel hardware description language},
  journal      = {Microprocess. Microprogramming},
  volume       = {25},
  number       = {1-5},
  pages        = {183--187},
  year         = {1989},
  url          = {https://doi.org/10.1016/0165-6074(89)90193-2},
  doi          = {10.1016/0165-6074(89)90193-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/GaiL89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/Lioy88,
  author       = {Antonio Lioy},
  title        = {Adaptative backtrace and dynamic partitioning enhance {ATPG}},
  booktitle    = {Computer Design: {VLSI} in Computers and Processors, {ICCD} 1988.,
                  Proceedings of the 1988 {IEEE} International Conference on, Rye Brook,
                  NY, USA, October 3-5, 1988},
  pages        = {62--65},
  publisher    = {{IEEE}},
  year         = {1988},
  url          = {https://doi.org/10.1109/ICCD.1988.25660},
  doi          = {10.1109/ICCD.1988.25660},
  timestamp    = {Mon, 18 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccd/Lioy88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee-sej/LioyM84,
  author       = {Antonio Lioy and
                  Marco Mezzalama},
  title        = {A testability measure to improve algebraic test generation},
  journal      = {Softw. Microsystems},
  volume       = {3},
  number       = {2},
  pages        = {37--41},
  year         = {1984},
  url          = {https://doi.org/10.1049/sm.1984.0013},
  doi          = {10.1049/SM.1984.0013},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iee-sej/LioyM84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}