Fabio Maino

Learn More
— The TCP/IP suite, the basis for today's Inter-net, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-in security becomes more and more problematic. This paper describes serious attacks against IP control and management protocols with an accent on the ICMP protocol, as well as some of the(More)
The current Internet architecture was not designed to easily accommodate mobility because IP addresses are used both to identify and locate hosts. The Locator/Identifier Separation Protocol (LISP) decouples them by considering two types of addresses: EIDs that identify hosts, and RLOCs that identify network attachment points and are used as routing(More)
—This paper presents Lcast, a scalable network-layer single-source multicast framework. Lcast builds a router overlay for inter-domain content distribution and interfaces with intra-domain multicast for seamless interaction with end-hosts. The architecture is built as an extension of the Locator/ID Separation Protocol (LISP), a proposed scalable Internet(More)
Storage Area Networks, with their ability to offer high data availability, reliability and scalability, are a promising solution for the large scale storage needs of many enterprises. As with any distributed storage system, a major design challenge for a Storage Area Network (SAN) is to provide data integrity and confidentiality. In this paper, we propose a(More)
This paper analyzes the problem of secure document management and distribution in an open network environment. Reader and author authentication, document i n tegrity, origin, and privacy are addressed by a public-key based solution which exploits a combination of the PEM format with SSL-enhanced FTP and HTTP servers and clients. The solution is being(More)
—Secret sharing is important in information and network security and has broad applications in the real world. Since an elegant secret sharing mechanism was first proposed by Shamir in 1979, many schemes have appeared in literature. These schemes deal with either single or multiple secrets and their shares have either the same weight or different weights.(More)
1. Introduction Computer networks offer significant business opportunities but greatly increase the risk of exposing the system to security breaches that can make it unreliable and/or unusable and can make its services unavailable. In fact, in interconnected systems the information traverses continuously untrusted gateway and crosses potentially malicious(More)