| 2009 |
87 | | Mauro Conti,
Roberto Di Pietro,
Andrea Gabrielli,
Luigi V. Mancini,
Alessandro Mei:
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
WWIC 2009: 85-96 |
86 | | Roberto Di Pietro,
Luigi V. Mancini,
Claudio Soriente,
Angelo Spognardi,
Gene Tsudik:
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks 7(8): 1463-1475 (2009) |
85 | | Mauro Conti,
Roberto Di Pietro,
Andrea Gabrielli,
Luigi V. Mancini,
Alessandro Mei:
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack
CoRR abs/0912.2199: (2009) |
84 | | Roberto Di Pietro,
Luigi V. Mancini,
Claudio Soriente,
Angelo Spognardi,
Gene Tsudik:
Data Security in Unattended Wireless Sensor Networks.
IEEE Trans. Computers 58(11): 1500-1511 (2009) |
83 | | Mauro Conti,
Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei:
Distributed data source verification in wireless sensor networks.
Information Fusion 10(4): 342-353 (2009) |
82 | | Mauro Conti,
Lei Zhang,
Sankardas Roy,
Roberto Di Pietro,
Sushil Jajodia,
Luigi V. Mancini:
Privacy-preserving robust data aggregation in wireless sensor networks.
Security and Communication Networks 2(2): 195-213 (2009) |
| 2008 |
81 | | Roberto Di Pietro,
Luigi V. Mancini,
Claudio Soriente,
Angelo Spognardi,
Gene Tsudik:
Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
PerCom 2008: 185-194 |
80 | | Roberto Battistoni,
Alessandro Di Biagio,
Roberto Di Pietro,
Matteo Formica,
Luigi V. Mancini:
A Live Digital Forensic system for Windows networks.
SEC 2008: 653-667 |
79 | | Mauro Conti,
Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei:
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
WISEC 2008: 214-219 |
78 | | Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei,
Alessandro Panconesi,
Jaikumar Radhakrishnan:
Redoubtable Sensor Networks.
ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
77 | | Luigi V. Mancini:
Special Issue: Hot Topics in Peer-to-Peer Systems.
Concurrency and Computation: Practice and Experience 20(6): 599 (2008) |
| 2007 |
76 | | Vishwas Patil,
Alessandro Mei,
Luigi V. Mancini:
Addressing interoperability issues in access control models.
ASIACCS 2007: 389-391 |
75 | | Andrea Gabrielli,
Luigi V. Mancini:
Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks.
BIOWIRE 2007: 399-410 |
74 | | Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei:
Towards threat-adaptive dynamic fragment replication in large scale distributed systems.
IPDPS 2007: 1 |
73 | | Mauro Conti,
Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei:
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
MobiHoc 2007: 80-89 |
72 | | Mauro Conti,
Roberto Di Pietro,
Luigi V. Mancini,
Angelo Spognardi:
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
PerCom Workshops 2007: 229-234 |
71 | | Mauro Conti,
Roberto Di Pietro,
Luigi V. Mancini:
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks 5(1): 49-62 (2007) |
70 | | Giovanni Di Crescenzo,
Luigi V. Mancini:
Preface.
Electr. Notes Theor. Comput. Sci. 171(1): 1-2 (2007) |
69 | | Roberto Di Pietro,
Luigi V. Mancini,
Giorgio Zanin:
Efficient and Adaptive Threshold Signatures for Ad hoc networks.
Electr. Notes Theor. Comput. Sci. 171(1): 93-105 (2007) |
68 | | Giorgio Zanin,
Roberto Di Pietro,
Luigi V. Mancini:
Robust RSA distributed signatures for large-scale long-lived ad hoc networks.
Journal of Computer Security 15(1): 171-196 (2007) |
| 2006 |
67 | | Roberto Di Pietro,
Luigi V. Mancini,
Antonio Durante,
Vishwas Patil:
Addressing the shortcomings of one-way chains.
ASIACCS 2006: 289-296 |
66 | | Alan A. Bertossi,
Luigi V. Mancini,
Alessandra Menapace:
Scheduling Hard-Real-Time Tasks with Backup Phasing Delay.
DS-RT 2006: 107-118 |
65 | | Giorgio Zanin,
Alessandro Mei,
Luigi V. Mancini:
A Secure and Efficient Large Scale Distributed System for Data Sharing.
ICDCS 2006: 27 |
64 | | Mauro Conti,
Roberto Di Pietro,
Luigi V. Mancini:
Secure Cooperative Channel Establishment inWireless Sensor Networks.
PerCom Workshops 2006: 327-331 |
63 | | Maria Calagna,
Huiping Guo,
Luigi V. Mancini,
Sushil Jajodia:
A robust watermarking system based on SVD compression.
SAC 2006: 1341-1347 |
62 | | Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei:
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks.
Wireless Networks 12(6): 709-721 (2006) |
| 2005 |
61 | | Maria Calagna,
Luigi V. Mancini:
A Blind Method for Digital Watermarking Attacks.
EuroIMSA 2005: 265-270 |
60 | | Manuel Koch,
Luigi V. Mancini,
Francesco Parisi-Presicce:
Graph-based specification of access control policies.
J. Comput. Syst. Sci. 71(1): 1-33 (2005) |
| 2004 |
59 | | Ehud Gudes,
Luigi V. Mancini,
Francesco Parisi-Presicce:
Information Flow Analysis for File Systems and Databases Using Labels.
DBSec 2004: 125-141 |
58 | | Roberto Battistoni,
Emanuele Gabrielli,
Luigi V. Mancini:
A Host Intrusion Prevention System for Windows Operating Systems.
ESORICS 2004: 352-368 |
57 | | Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei:
Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment.
IPDPS 2004 |
56 | | Giorgio Zanin,
Luigi V. Mancini:
Towards a formal model for security policies specification and validation in the selinux system.
SACMAT 2004: 136-145 |
55 | | Manuel Koch,
Luigi V. Mancini,
Francesco Parisi-Presicce:
Administrative scope in the graph-based framework.
SACMAT 2004: 97-104 |
54 | | Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei,
Alessandro Panconesi,
Jaikumar Radhakrishnan:
Connectivity properties of secure wireless sensor networks.
SASN 2004: 53-58 |
53 | | Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei:
Key management for high bandwidth secure multicast.
Journal of Computer Security 12(5): 693-709 (2004) |
| 2003 |
52 | | Roberto Di Pietro,
Luigi V. Mancini,
Yee Wei Law,
Sandro Etalle,
Paul J. M. Havinga:
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
ICPP Workshops 2003: 397- |
51 | | Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei:
Random key-assignment for secure Wireless Sensor Networks.
SASN 2003: 62-71 |
50 | | Roberto Di Pietro,
Luigi V. Mancini,
Alessandro Mei:
A Time Driven Methodology for Key Dimensioning in Multicast Communications.
SEC 2003: 121-132 |
49 | | Roberto Di Pietro,
Antonio Durante,
Luigi V. Mancini:
A Reliable Key Authentication Schema for Secure Multicast Communications.
SRDS 2003: 231-240 |
48 | | Roberto Di Pietro,
Luigi V. Mancini,
Sushil Jajodia:
Providing secrecy in key management protocols for large wireless sensors networks.
Ad Hoc Networks 1(4): 455-468 (2003) |
47 | | Roberto Di Pietro,
Luigi V. Mancini:
Security and privacy issues of handheld and wearable wireless devices.
Commun. ACM 46(9): 74-79 (2003) |
46 | | Alessandro Mei,
Luigi V. Mancini,
Sushil Jajodia:
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems.
IEEE Trans. Parallel Distrib. Syst. 14(9): 885-896 (2003) |
| 2002 |
45 | | Manuel Koch,
Luigi V. Mancini,
Francesco Parisi-Presicce:
Decidability of Safety in Graph-Based Models for Access Control.
ESORICS 2002: 229-243 |
44 | | Antonio Durante,
Roberto Di Pietro,
Luigi V. Mancini:
Formal Specification for Fast Automatic IDS Training.
FASec 2002: 191-204 |
43 | | Manuel Koch,
Luigi V. Mancini,
Francesco Parisi-Presicce:
Conflict Detection and Resolution in Access Control Policy Specifications.
FoSSaCS 2002: 223-237 |
42 | | Roberto Di Pietro,
Luigi V. Mancini,
Sushil Jajodia:
Efficient and secure keys management for wireless mobile communications.
POMC 2002: 66-73 |
41 | | Roberto Di Pietro,
Luigi V. Mancini,
Sushil Jajodia:
Secure Selective Exclusion in Ad Hoc Wireless Network.
SEC 2002: 423-434 |
40 | | Massimo Bernaschi,
Emanuele Gabrielli,
Luigi V. Mancini:
Remus: a security-enhanced operating system.
ACM Trans. Inf. Syst. Secur. 5(1): 36-61 (2002) |
39 | | Manuel Koch,
Luigi V. Mancini,
Francesco Parisi-Presicce:
A graph-based formalism for RBAC.
ACM Trans. Inf. Syst. Secur. 5(3): 332-365 (2002) |
| 2001 |
38 | | Manuel Koch,
Luigi V. Mancini,
Francesco Parisi-Presicce:
Foundations for a Graph-Based Approach to the Specification of Access Control Policies.
FoSSaCS 2001: 287-302 |
37 | | Manuel Koch,
Luigi V. Mancini,
Francesco Parisi-Presicce:
On the specification and evolution of access control policies.
SACMAT 2001: 121-130 |
36 | | Manuel Koch,
Luigi V. Mancini,
Francesco Parisi-Presicce:
Graph Transformations for the Specification of Access Control Policies.
Electr. Notes Theor. Comput. Sci. 51: (2001) |
| 2000 |
35 | | Massimo Bernaschi,
Emanuele Gabrielli,
Luigi V. Mancini:
Operating system enhancements to prevent the misuse of system calls.
ACM Conference on Computer and Communications Security 2000: 174-183 |
34 | | Manuel Koch,
Luigi V. Mancini,
Francesco Parisi-Presicce:
A Formal Model for Role-Based Access Control Using Graph Transformation.
ESORICS 2000: 122-139 |
33 | | Giovanni Chiola,
Gianni Conte,
Luigi V. Mancini:
Workshop on Personal Computer Based Networks of Workstation.
IPDPS Workshops 2000: 1-3 |
32 | | Luigi V. Mancini,
Indrajit Ray,
Sushil Jajodia,
Elisa Bertino:
Flexible Transaction Dependencies in Database Systems.
Distributed and Parallel Databases 8(4): 399-446 (2000) |
31 | | Indrajit Ray,
Luigi V. Mancini,
Sushil Jajodia,
Elisa Bertino:
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems.
IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000) |
| 1999 |
30 | | José D. P. Rolim,
Frank Mueller,
Albert Y. Zomaya,
Fikret Erçal,
Stephan Olariu,
Binoy Ravindran,
Jan Gustafsson,
Hiroaki Takada,
Ronald A. Olsson,
Laxmikant V. Kalé,
Peter H. Beckman,
Matthew Haines,
Hossam A. ElGindy,
Denis Caromel,
Serge Chaumette,
Geoffrey Fox,
Yi Pan,
Keqin Li,
Tao Yang,
G. Ghiola,
Gianni Conte,
Luigi V. Mancini,
Dominique Méry,
Beverly A. Sanders,
Devesh Bhatt,
Viktor K. Prasanna:
Parallel and Distributed Processing, 11 IPPS/SPDP'99 Workshops Held in Conjunction with the 13th International Parallel Processing Symposium and 10th Symposium on Parallel and Distributed Processing, San Juan, Puerto Rico, USA, April 12-16, 1999, Proceedings
Springer 1999 |
29 | | Giovanni Chiola,
Giuseppe Ciaccio,
Luigi V. Mancini,
Pierluigi Rotondo:
GAMMA on DEC 2114x with Efficient Flow Control.
PDPTA 1999: 2337-2343 |
28 | | Alan A. Bertossi,
Luigi V. Mancini,
Federico Rossini:
Fault-Tolerant Rate-Monotonic First-Fit Scheduling in Hard-Real-Time Systems.
IEEE Trans. Parallel Distrib. Syst. 10(9): 934-945 (1999) |
| 1998 |
27 | | Sushil Jajodia,
Luigi V. Mancini,
Sanjeev Setia:
A Fair Locking Protocol for Multilevel Secure Databases.
CSFW 1998: 168-178 |
26 | | Elisa Bertino,
Giovanni Chiola,
Luigi V. Mancini:
Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models.
ICATPN 1998: 266-285 |
25 | | Elisa Bertino,
Sushil Jajodia,
Luigi V. Mancini,
Indrajit Ray:
Advanced Transaction Processing in Multilevel Secure File Stores.
IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998) |
| 1997 |
24 | | Alan A. Bertossi,
Andrea Fusiello,
Luigi V. Mancini:
Fault-Tolerant Deadline-Monotonic Algorithm for Scheduling Hard-Real-Time Tasks.
IPPS 1997: 133-138 |
23 | | Luigi V. Mancini,
Indrajit Ray,
Sushil Jajodia,
Elisa Bertino:
Flexible Commit Protocols for Advanced Transaction Processing.
Advanced Transaction Models and Architectures 1997: 0- |
22 | | Maciej Koutny,
Luigi V. Mancini,
Giuseppe Pappalardo:
Two Implementation Relations and the Correctness of Communicating Replicated Processes.
Formal Asp. Comput. 9(2): 119-148 (1997) |
| 1996 |
21 | | Indrajit Ray,
Elisa Bertino,
Sushil Jajodia,
Luigi V. Mancini:
An Advanced Commit Protocol for MLS Distributed Database Systems.
ACM Conference on Computer and Communications Security 1996: 119-128 |
20 | | Sushil Jajodia,
Luigi V. Mancini,
Indrajit Ray:
Secure Locking Protocols for Multilevel Database Management Systems.
DBSec 1996: 177-194 |
19 | | Luigi V. Mancini,
Indrajit Ray:
Secure Concurrency Control in MLS Databases with Two Versions of Data.
ESORICS 1996: 304-323 |
| 1995 |
18 | | Alan A. Bertossi,
Massimo Bonometto,
Luigi V. Mancini:
Increasing Processor Utilization in Hard-Real-Time Systems with Checkpoints.
Real-Time Systems 9(1): 5-29 (1995) |
| 1994 |
17 | | Alessandro Ciampichetti,
Elisa Bertino,
Luigi V. Mancini:
Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.
ESORICS 1994: 359-373 |
16 | | Alan A. Bertossi,
Luigi V. Mancini:
Scheduling Algorithms for Fault-Tolerance in Hard-Real-Time Systems.
Real-Time Systems 7(3): 229-245 (1994) |
| 1993 |
15 | | Maciej Koutny,
Luigi V. Mancini,
Giuseppe Pappalardo:
Modelling Replicated Processing.
PARLE 1993: 672-675 |
14 | | Santosh K. Shrivastava,
Luigi V. Mancini,
Brian Randell:
The Duality of Fault-tolerant System Structures.
Softw., Pract. Exper. 23(7): 773-798 (1993) |
| 1992 |
13 | | Nicoletta De Francesco,
Gigliola Vaglini,
Luigi V. Mancini,
A. Pereira Paz:
Specification of Concurrency Control in Persistent Programming Languages.
POS 1992: 126-143 |
12 | | Luigi V. Mancini:
Garbage Collection and Reachability
POS 1992: 394-395 |
| 1991 |
11 | | Maciej Koutny,
Luigi V. Mancini,
Giuseppe Pappalardo:
Formalising Replicated Distributed Processing.
SRDS 1991: 108-117 |
10 | | Luigi V. Mancini,
Vittoria Rotella,
Simonetta Venosa:
Copying Garbage Collection for Distributed Object Stores.
SRDS 1991: 218-227 |
9 | | Luigi V. Mancini,
Santosh K. Shrivastava:
Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems.
Comput. J. 34(6): 503-513 (1991) |
| 1989 |
8 | | Luigi V. Mancini,
Giuseppe Pappalardo:
Proving Correctness Properties of a Replicated Synchronous Program.
Comput. J. 32(5): 437-444 (1989) |
7 | | Maciej Koutny,
Luigi V. Mancini:
Synchronizing events in replicated systems.
Journal of Systems and Software 9(3): 183-190 (1989) |
| 1988 |
6 | | Luigi V. Mancini,
Giuseppe Pappalardo:
Towards a Theory of Replicated Processing.
FTRTFT 1988: 175-192 |
5 | | Luigi V. Mancini,
Giuseppe Pappalardo:
Hoare logic of distributed redundant systems.
Comput. Syst. Sci. Eng. 3(4): 171-180 (1988) |
4 | | Luigi V. Mancini:
A Technique for Subclassing and its Implementation Exploiting Polymorphic Procedures.
Softw., Pract. Exper. 18(4): 287-300 (1988) |
| 1987 |
3 | | Santosh K. Shrivastava,
Luigi V. Mancini,
Brian Randell:
On the Duality of Fault Tolerant System Structures.
Experiences with Distributed Systems 1987: 19-37 |
| 1986 |
2 | | Luigi V. Mancini,
Maciej Koutny:
Formal specification of N-modular redundancy.
ACM Conference on Computer Science 1986: 199-204 |
1 | | Luigi V. Mancini:
Modular Redundancy in a Message Passing System.
IEEE Trans. Software Eng. 12(1): 79-86 (1986) |