Guido Rotondi

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Traditional strong authentication systems rely on a certification chain to delegate the authority of trusting an intermediate end. However, in some practical life scenarios a relayed authentication is not accepted and thus it would be advisable a straight proof of trustiness with a direct interaction with the involved party. Our protocol introduces a(More)
In recent years, the penalty costs involved in project failures have become a serious issue for the Public Administration budget. The reason of such escalation in contract management costs is twofold: first, the increased application complexity demands for systems with an underlying evolutionary technology; on the other side, the administrative procedures(More)
  • 1