2009 | ||
---|---|---|
51 | Flavio Lombardi, Roberto Di Pietro: KvmSec: a security extension for Linux kernel virtual machines. SAC 2009: 2029-2034 | |
50 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde: A formal framework to elicit roles with business meaning in RBAC systems. SACMAT 2009: 85-94 | |
49 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde: Mining Stable Roles in RBAC. SEC 2009: 259-269 | |
48 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde: A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. SEC 2009: 376-386 | |
47 | Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 | |
46 | Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei: The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. WWIC 2009: 85-96 | |
45 | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) | |
44 | Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei: The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack CoRR abs/0912.2199: (2009) | |
43 | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) | |
42 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Distributed data source verification in wireless sensor networks. Information Fusion 10(4): 342-353 (2009) | |
41 | Roberto Di Pietro, Pietro Michiardi, Refik Molva: Confidentiality and integrity for data aggregation in WSN using peer monitoring. Security and Communication Networks 2(2): 181-194 (2009) | |
40 | Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2(2): 195-213 (2009) | |
2008 | ||
39 | Michele Albano, Stefano Chessa, Roberto Di Pietro: Information Assurance in Critical Infrastructures via Wireless Sensor Networks. IAS 2008: 305-310 | |
38 | Agusti Solanas, Roberto Di Pietro: A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets. MDAI 2008: 203-214 | |
37 | Roberto Di Pietro, Pietro Michiardi: Gossip-based aggregate computation: computing faster with non address-oblivious schemes. PODC 2008: 442 | |
36 | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 | |
35 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello: A cost-driven approach to role engineering. SAC 2008: 2129-2136 | |
34 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello: Leveraging Lattices to Improve Role Mining. SEC 2008: 333-347 | |
33 | Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini: A Live Digital Forensic system for Windows networks. SEC 2008: 653-667 | |
32 | Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik: POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194 | |
31 | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 | |
30 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. WISEC 2008: 214-219 | |
29 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Redoubtable Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008) | |
28 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello: An Activity-Based Model for Separation of Duty CoRR abs/0810.5351: (2008) | |
27 | Paolo Cencioni, Roberto Di Pietro: A mechanism to enforce privacy in vehicle-to-infrastructure communication. Computer Communications 31(12): 2790-2802 (2008) | |
2007 | ||
26 | Roberto Di Pietro, Refik Molva: Information Confinement, Privacy, and Security in RFID Systems. ESORICS 2007: 187-202 | |
25 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Towards threat-adaptive dynamic fragment replication in large scale distributed systems. IPDPS 2007: 1 | |
24 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. MobiHoc 2007: 80-89 | |
23 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi: RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. PerCom Workshops 2007: 229-234 | |
22 | Stefano Chessa, Roberto Di Pietro, Erina Ferro, Gaetano Giunta, Gabriele Oligeri: Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. VTC Spring 2007: 634-638 | |
21 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini: ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5(1): 49-62 (2007) | |
20 | Roberto Di Pietro, Luigi V. Mancini, Giorgio Zanin: Efficient and Adaptive Threshold Signatures for Ad hoc networks. Electr. Notes Theor. Comput. Sci. 171(1): 93-105 (2007) | |
19 | Giorgio Zanin, Roberto Di Pietro, Luigi V. Mancini: Robust RSA distributed signatures for large-scale long-lived ad hoc networks. Journal of Computer Security 15(1): 171-196 (2007) | |
2006 | ||
18 | Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil: Addressing the shortcomings of one-way chains. ASIACCS 2006: 289-296 | |
17 | Angelo Spognardi, Roberto Di Pietro: A formal framework for the performance analysis of P2P networks protocols. IPDPS 2006 | |
16 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini: Secure Cooperative Channel Establishment inWireless Sensor Networks. PerCom Workshops 2006: 327-331 | |
15 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6): 709-721 (2006) | |
2005 | ||
14 | Roberto Di Pietro, Gianluigi Me, Maurizio Adriano Strangio: A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. ICMB 2005: 28-34 | |
2004 | ||
13 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. IPDPS 2004 | |
12 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Connectivity properties of secure wireless sensor networks. SASN 2004: 53-58 | |
11 | Stefano Chessa, Roberto Di Pietro, Piero Maestrini: Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2. WONS 2004: 184-198 | |
10 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Key management for high bandwidth secure multicast. Journal of Computer Security 12(5): 693-709 (2004) | |
2003 | ||
9 | Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397- | |
8 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Random key-assignment for secure Wireless Sensor Networks. SASN 2003: 62-71 | |
7 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A Time Driven Methodology for Key Dimensioning in Multicast Communications. SEC 2003: 121-132 | |
6 | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini: A Reliable Key Authentication Schema for Secure Multicast Communications. SRDS 2003: 231-240 | |
5 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003) | |
4 | Roberto Di Pietro, Luigi V. Mancini: Security and privacy issues of handheld and wearable wireless devices. Commun. ACM 46(9): 74-79 (2003) | |
2002 | ||
3 | Antonio Durante, Roberto Di Pietro, Luigi V. Mancini: Formal Specification for Fast Automatic IDS Training. FASec 2002: 191-204 | |
2 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73 | |
1 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434 |