![]() | 2009 | |
---|---|---|
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Flavio Lombardi, Roberto Di Pietro: KvmSec: a security extension for Linux kernel virtual machines. SAC 2009: 2029-2034 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde: A formal framework to elicit roles with business meaning in RBAC systems. SACMAT 2009: 85-94 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde: Mining Stable Roles in RBAC. SEC 2009: 259-269 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde: A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. SEC 2009: 376-386 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei: The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. WWIC 2009: 85-96 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei: The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack CoRR abs/0912.2199: (2009) |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Distributed data source verification in wireless sensor networks. Information Fusion 10(4): 342-353 (2009) |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Pietro Michiardi, Refik Molva: Confidentiality and integrity for data aggregation in WSN using peer monitoring. Security and Communication Networks 2(2): 181-194 (2009) |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2(2): 195-213 (2009) |
2008 | ||
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Michele Albano, Stefano Chessa, Roberto Di Pietro: Information Assurance in Critical Infrastructures via Wireless Sensor Networks. IAS 2008: 305-310 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Agusti Solanas, Roberto Di Pietro: A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets. MDAI 2008: 203-214 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Pietro Michiardi: Gossip-based aggregate computation: computing faster with non address-oblivious schemes. PODC 2008: 442 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello: A cost-driven approach to role engineering. SAC 2008: 2129-2136 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello: Leveraging Lattices to Improve Role Mining. SEC 2008: 333-347 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini: A Live Digital Forensic system for Windows networks. SEC 2008: 653-667 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik: POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. WISEC 2008: 214-219 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Redoubtable Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello: An Activity-Based Model for Separation of Duty CoRR abs/0810.5351: (2008) |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Cencioni, Roberto Di Pietro: A mechanism to enforce privacy in vehicle-to-infrastructure communication. Computer Communications 31(12): 2790-2802 (2008) |
2007 | ||
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Refik Molva: Information Confinement, Privacy, and Security in RFID Systems. ESORICS 2007: 187-202 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Towards threat-adaptive dynamic fragment replication in large scale distributed systems. IPDPS 2007: 1 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. MobiHoc 2007: 80-89 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi: RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. PerCom Workshops 2007: 229-234 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefano Chessa, Roberto Di Pietro, Erina Ferro, Gaetano Giunta, Gabriele Oligeri: Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. VTC Spring 2007: 634-638 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini: ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5(1): 49-62 (2007) |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Giorgio Zanin: Efficient and Adaptive Threshold Signatures for Ad hoc networks. Electr. Notes Theor. Comput. Sci. 171(1): 93-105 (2007) |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Giorgio Zanin, Roberto Di Pietro, Luigi V. Mancini: Robust RSA distributed signatures for large-scale long-lived ad hoc networks. Journal of Computer Security 15(1): 171-196 (2007) |
2006 | ||
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil: Addressing the shortcomings of one-way chains. ASIACCS 2006: 289-296 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Angelo Spognardi, Roberto Di Pietro: A formal framework for the performance analysis of P2P networks protocols. IPDPS 2006 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini: Secure Cooperative Channel Establishment inWireless Sensor Networks. PerCom Workshops 2006: 327-331 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6): 709-721 (2006) |
2005 | ||
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Gianluigi Me, Maurizio Adriano Strangio: A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. ICMB 2005: 28-34 |
2004 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. IPDPS 2004 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Connectivity properties of secure wireless sensor networks. SASN 2004: 53-58 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefano Chessa, Roberto Di Pietro, Piero Maestrini: Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2. WONS 2004: 184-198 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Key management for high bandwidth secure multicast. Journal of Computer Security 12(5): 693-709 (2004) |
2003 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397- |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Random key-assignment for secure Wireless Sensor Networks. SASN 2003: 62-71 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A Time Driven Methodology for Key Dimensioning in Multicast Communications. SEC 2003: 121-132 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini: A Reliable Key Authentication Schema for Secure Multicast Communications. SRDS 2003: 231-240 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003) |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini: Security and privacy issues of handheld and wearable wireless devices. Commun. ACM 46(9): 74-79 (2003) |
2002 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Antonio Durante, Roberto Di Pietro, Luigi V. Mancini: Formal Specification for Fast Automatic IDS Training. FASec 2002: 191-204 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73 |
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434 |