Follow
Ignazio Pedone
Ignazio Pedone
Ph.D. in Computer Engineering, Politecnico di Torino
Verified email at polito.it
Title
Cited by
Cited by
Year
Towards an efficient management and orchestration framework for virtual network security functions
I Pedone, A Lioy, F Valenza
Security and Communication Networks 2019 (1), 2425983, 2019
192019
Toward a complete software stack to integrate quantum key distribution in a cloud environment
I Pedone, A Atzeni, D Canavese, A Lioy
Ieee Access 9, 115270-115291, 2021
142021
Practical autonomous cyberhealth for resilient micro, small and medium-sized enterprises
E Mantas, D Papadopoulos, C Fernández, N Ortiz, M Compastié, ...
2021 IEEE International Mediterranean Conference on Communications and …, 2021
102021
A model of capabilities of Network Security Functions
C Basile, D Canavese, L Regano, I Pedone, A Lioy
2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022
52022
A novel architecture to virtualise a hardware-bound trusted platform module
M De Benedictis, L Jacquin, I Pedone, A Atzeni, A Lioy
Future Generation Computer Systems 150, 21-36, 2024
42024
Integrity verification of distributed nodes in critical infrastructures
S Sisinni, D Margaria, I Pedone, A Lioy, A Vesco
Sensors 22 (18), 6950, 2022
42022
Quantum key distribution in Kubernetes clusters
I Pedone, A Lioy
Future Internet 14 (6), 160, 2022
32022
Verification of software integrity in distributed systems
S Sisinni
Politecnico di Torino, 2021
32021
Trusted computing technology and proposals for resolving cloud computing security problems
I Pedone, D Canavese, A Lioy
Cloud Computing Security, 373-386, 2020
32020
Use of Trusted Computing techniques to counteract Cybersecurity attacks in Critical Infrastructures
E Bravi
Politecnico di Torino, 2022
22022
Virtual network function embedding with quantum annealing
P Chiavassa, A Marchesin, I Pedone, MF Dacrema, P Cremonesi
2022 IEEE International Conference on Quantum Computing and Engineering (QCE …, 2022
22022
Zero Trust networks with Istio
M Pace
Politecnico di Torino, 2021
12021
Quantum Key Distribution in softwarised networks
C Ruggeri
Politecnico di Torino, 2020
12020
Protocollo MACsec applicato su canali di un cluster Kubernetes= MACsec-protected networks in Kubernetes clusters
C Bisceglia
Politecnico di Torino, 2023
2023
Cybersecurity and Quantum Computing: friends or foes?
I Pedone
Politecnico di Torino, 2023
2023
Use of SGX to protect network nodes
G D'Onghia
Politecnico di Torino, 2023
2023
Quantum-resistant Blockchain
C Michelagnoli
Politecnico di Torino, 2023
2023
Analysis of TEE technologies as trust anchors
S Vuillermoz
Politecnico di Torino, 2022
2022
Direct Anonymous Attestation
L De Siena
Politecnico di Torino, 2022
2022
PALANTIR: Zero-trust architecture for Managed Security Service Provider
M Compastié, S Sisinni, S Gurung, C Fernández, L Jacquin, I Mlakar, ...
C&ESAR 2022-29th Computer & Electronics Security Application Rendezvous (C …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20