Search the dblp DataBase
Roberto Di Pietro :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Roberto Di Pietro , Luigi V. Mancini , Antonio Durante , Vishwas Patil Addressing the shortcomings of one-way chains. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:289-296 [Conf ] Antonio Durante , Roberto Di Pietro , Luigi V. Mancini Formal Specification for Fast Automatic IDS Training. [Citation Graph (0, 0)][DBLP ] FASec, 2002, pp:191-204 [Conf ] Roberto Di Pietro , Gianluigi Me , Maurizio Adriano Strangio A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. [Citation Graph (0, 0)][DBLP ] ICMB, 2005, pp:28-34 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Yee Wei Law , Sandro Etalle , Paul J. M. Havinga LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 2003, pp:397-0 [Conf ] Stefano Chessa , Roberto Di Pietro , Piero Maestrini Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2. [Citation Graph (0, 0)][DBLP ] WONS, 2004, pp:184-198 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. [Citation Graph (0, 0)][DBLP ] IPDPS, 2004, pp:- [Conf ] Angelo Spognardi , Roberto Di Pietro A formal framework for the performance analysis of P2P networks protocols. [Citation Graph (0, 0)][DBLP ] IPDPS, 2006, pp:- [Conf ] Mauro Conti , Roberto Di Pietro , Luigi V. Mancini Secure Cooperative Channel Establishment inWireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2006, pp:327-331 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Sushil Jajodia Efficient and secure keys management for wireless mobile communications. [Citation Graph (0, 0)][DBLP ] POMC, 2002, pp:66-73 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Random key-assignment for secure Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:62-71 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei , Alessandro Panconesi , Jaikumar Radhakrishnan Connectivity properties of secure wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SASN, 2004, pp:53-58 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Sushil Jajodia Secure Selective Exclusion in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:423-434 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei A Time Driven Methodology for Key Dimensioning in Multicast Communications. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:121-132 [Conf ] Roberto Di Pietro , Antonio Durante , Luigi V. Mancini A Reliable Key Authentication Schema for Secure Multicast Communications. [Citation Graph (0, 0)][DBLP ] SRDS, 2003, pp:231-240 [Conf ] Mauro Conti , Roberto Di Pietro , Luigi V. Mancini ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:1, pp:49-62 [Journal ] Roberto Di Pietro , Luigi V. Mancini , Sushil Jajodia Providing secrecy in key management protocols for large wireless sensors networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2003, v:1, n:4, pp:455-468 [Journal ] Roberto Di Pietro , Luigi V. Mancini Security and privacy issues of handheld and wearable wireless devices. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:9, pp:74-79 [Journal ] Roberto Di Pietro , Luigi V. Mancini , Giorgio Zanin Efficient and Adaptive Threshold Signatures for Ad hoc networks. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:93-105 [Journal ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Key management for high bandwidth secure multicast. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:5, pp:693-709 [Journal ] Giorgio Zanin , Roberto Di Pietro , Luigi V. Mancini Robust RSA distributed signatures for large-scale long-lived ad hoc networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2007, v:15, n:1, pp:171-196 [Journal ] Roberto Di Pietro , Refik Molva Information Confinement, Privacy, and Security in RFID Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:187-202 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Towards threat-adaptive dynamic fragment replication in large scale distributed systems. [Citation Graph (0, 0)][DBLP ] IPDPS, 2007, pp:1- [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2006, v:12, n:6, pp:709-721 [Journal ] Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance. [Citation Graph (, )][DBLP ] A Security Management Architecture for the Protection of Kernel Virtual Machines. [Citation Graph (, )][DBLP ] Evaluating the Risk of Adopting RBAC Roles. [Citation Graph (, )][DBLP ] Intrusion-Resilience in Mobile Unattended WSNs. [Citation Graph (, )][DBLP ] A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets. [Citation Graph (, )][DBLP ] A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. [Citation Graph (, )][DBLP ] Catch Me (If You Can): Data Survival in Unattended Sensor Networks. [Citation Graph (, )][DBLP ] RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. [Citation Graph (, )][DBLP ] Gossip-based aggregate computation: computing faster with non address-oblivious schemes. [Citation Graph (, )][DBLP ] A cost-driven approach to role engineering. [Citation Graph (, )][DBLP ] KvmSec: a security extension for Linux kernel virtual machines. [Citation Graph (, )][DBLP ] Transparent security for cloud. [Citation Graph (, )][DBLP ] ABBA: adaptive bicluster-based approach to impute missing values in binary matrices. [Citation Graph (, )][DBLP ] A formal framework to elicit roles with business meaning in RBAC systems. [Citation Graph (, )][DBLP ] Leveraging Lattices to Improve Role Mining. [Citation Graph (, )][DBLP ] A Live Digital Forensic system for Windows networks. [Citation Graph (, )][DBLP ] Mining Stable Roles in RBAC. [Citation Graph (, )][DBLP ] A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. [Citation Graph (, )][DBLP ] POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. [Citation Graph (, )][DBLP ] The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. [Citation Graph (, )][DBLP ] Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. [Citation Graph (, )][DBLP ] RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP ] Collaborative authentication in unattended WSNs. [Citation Graph (, )][DBLP ] Information Assurance in Critical Infrastructures via Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. [Citation Graph (, )][DBLP ] A mechanism to enforce privacy in vehicle-to-infrastructure communication. [Citation Graph (, )][DBLP ] Taming role mining complexity in RBAC. [Citation Graph (, )][DBLP ] An Activity-Based Model for Separation of Duty [Citation Graph (, )][DBLP ] The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack [Citation Graph (, )][DBLP ] CONCISE: Compressed 'n' Composable Integer Set [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.304secs