Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Manuel Leone is active.

Publication


Featured researches published by Manuel Leone.


IEEE Transactions on Computers | 2002

On the inherent space complexity of fast parallel multipliers for GF(2/sup m/)

Michele Elia; Manuel Leone

A lower bound to the number of AND gates used in parallel multipliers for GF(2/sup m/), under the condition that time complexity be minimum, is determined. In particular, the exact minimum number of AND gates for primitive normal bases and optimal normal bases of Type II multipliers is evaluated. This result indirectly suggests that space complexity is essentially a quadratic function of m when time complexity is kept minimum.


cryptographic hardware and embedded systems | 2001

A New Low Complexity Parallel Multiplier for a Class of Finite Fields

Manuel Leone

In this paper a new low complexity parallel multiplier for characteristic two finite fields GF(2m) is proposed. In particular our multiplier works with field elements represented through both Canonical Basis and Type I Optimal Normal Basis (ONB), provided that the irreducible polynomial generating the field is an All One Polynomial (AOP). The main advantage of the scheme is the resulting space complexity, significantly lower than the one provided by the other fast parallel multipliers currently available in the open literature and belonging to the same class.


Innovations in Systems and Software Engineering | 2011

A Mechanism for e-Banking Frauds Prevention and User Privacy Protection

Rosalia D’Alessandro; Manuel Leone

In this paper we will discuss how recent trends in malware evolution will probably require a change of the internet banking security paradigms currently in use. Specifically, we will demonstrate how next generation malware may defeat the most recent strong authentication mechanisms put in place by several financial institutions. These new attacks clearly require a change on current schemes and, at the same time, a definitive reduction in the final user responsibility. Too often the user’s behavior adds a weak layer which can be exploited by several techniques, such as Social Engineering attacks. Therefore, a new generation of automatic and hardware-based mechanisms should be deployed, in order to both increase the security level intrinsically offered by the technology, and reducing the exposure to Social Engineering risks. They have to work transparently, minimizing any kind of misuse that could be source of vulnerabilities.


european workshop on system security | 2008

SC@CCO: a Graphic-Based Authentication System

Rosalia D'Alessandro; M. Ghirardi; Manuel Leone

At the present time, phishing attacks are more and more sophisticated and they continue to be an issue, especially for financial institutes. The most common defense mechanisms used today are effective if the phishing attack is passive, while completely useless in the case of active phishing attacks. To face both threats, we propose SC@CCO, an innovative system combining the security of challenge-response and two factor authentication mechanisms. SC@CCO uses an untrustworthy terminal, such as a shared computer, and an insecure channel, such as the Internet, to carry a graphic challenge from which a trusted mobile terminal computes the expected authentication response. The latter is shown to the user and subsequently submitted to the server, along with a personal identification number, in order to complete the authentication. The graphic challenge is obtained by encoding a challenge into a bi-dimensional barcode image. The trusted mobile terminal of the user must be equipped with a common digital camera and an appropriate client application. In the present approach, the personal mobile device plays the role of a security token able to authenticate, on one hand, who is issuing a transaction, and, on the other hand, the transaction data, with the advantage that the user does not have to install devices and/or software on an untrustworthy computer.


Archive | 2006

System for enforcing security policies on mobile communications devices

Carlo Aldera; Lutiis Paolo De; Maria Teresa Grillo; Manuel Leone; Alessandro Basso; Michele Miraglia


Archive | 2006

System for implementing security on telecommunications terminals

Manuel Leone


Archive | 2003

Method and apparatus for monitoring operation of processing systems, related network and computer program product therefor

Gianluca Cangini; Gerardo Lamastra; Francesco Coda Zabetta; Paolo Abeni; Madalina Baltatu; Rosalia D'Alessandro; Stefano Brusotti; Sebastiano Di Paola; Manuel Leone; Federico Frosali


Archive | 2004

Method and system for a secure connection in communication networks

Manuel Leone; Ettore Elio Caprella


Archive | 2003

Method and system for protecting data, related communication network and computer program product

Manuel Leone; Ettore Elio Caprella


Archive | 2005

Group Signature Scheme With Improved Efficiency, in Particular in a Join Procedure

Pier Luigi Zaccone; Manuel Leone; Ettore Elio Caprella; Francesco Bergadano; Davide Cavagnino; Paolo Dal Checco

Collaboration


Dive into the Manuel Leone's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge