Towards an efficient management and orchestration framework for virtual network security functions I Pedone, A Lioy, F Valenza Security and Communication Networks 2019 (1), 2425983, 2019 | 19 | 2019 |
Toward a complete software stack to integrate quantum key distribution in a cloud environment I Pedone, A Atzeni, D Canavese, A Lioy Ieee Access 9, 115270-115291, 2021 | 14 | 2021 |
Practical autonomous cyberhealth for resilient micro, small and medium-sized enterprises E Mantas, D Papadopoulos, C Fernández, N Ortiz, M Compastié, ... 2021 IEEE International Mediterranean Conference on Communications and …, 2021 | 10 | 2021 |
A model of capabilities of Network Security Functions C Basile, D Canavese, L Regano, I Pedone, A Lioy 2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022 | 5 | 2022 |
A novel architecture to virtualise a hardware-bound trusted platform module M De Benedictis, L Jacquin, I Pedone, A Atzeni, A Lioy Future Generation Computer Systems 150, 21-36, 2024 | 4 | 2024 |
Integrity verification of distributed nodes in critical infrastructures S Sisinni, D Margaria, I Pedone, A Lioy, A Vesco Sensors 22 (18), 6950, 2022 | 4 | 2022 |
Quantum key distribution in Kubernetes clusters I Pedone, A Lioy Future Internet 14 (6), 160, 2022 | 3 | 2022 |
Verification of software integrity in distributed systems S Sisinni Politecnico di Torino, 2021 | 3 | 2021 |
Trusted computing technology and proposals for resolving cloud computing security problems I Pedone, D Canavese, A Lioy Cloud Computing Security, 373-386, 2020 | 3 | 2020 |
Use of Trusted Computing techniques to counteract Cybersecurity attacks in Critical Infrastructures E Bravi Politecnico di Torino, 2022 | 2 | 2022 |
Virtual network function embedding with quantum annealing P Chiavassa, A Marchesin, I Pedone, MF Dacrema, P Cremonesi 2022 IEEE International Conference on Quantum Computing and Engineering (QCE …, 2022 | 2 | 2022 |
Zero Trust networks with Istio M Pace Politecnico di Torino, 2021 | 1 | 2021 |
Quantum Key Distribution in softwarised networks C Ruggeri Politecnico di Torino, 2020 | 1 | 2020 |
Protocollo MACsec applicato su canali di un cluster Kubernetes= MACsec-protected networks in Kubernetes clusters C Bisceglia Politecnico di Torino, 2023 | | 2023 |
Cybersecurity and Quantum Computing: friends or foes? I Pedone Politecnico di Torino, 2023 | | 2023 |
Use of SGX to protect network nodes G D'Onghia Politecnico di Torino, 2023 | | 2023 |
Quantum-resistant Blockchain C Michelagnoli Politecnico di Torino, 2023 | | 2023 |
Analysis of TEE technologies as trust anchors S Vuillermoz Politecnico di Torino, 2022 | | 2022 |
Direct Anonymous Attestation L De Siena Politecnico di Torino, 2022 | | 2022 |
PALANTIR: Zero-trust architecture for Managed Security Service Provider M Compastié, S Sisinni, S Gurung, C Fernández, L Jacquin, I Mlakar, ... C&ESAR 2022-29th Computer & Electronics Security Application Rendezvous (C …, 2022 | | 2022 |