The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Roberto Di Pietro: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil
    Addressing the shortcomings of one-way chains. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:289-296 [Conf]
  2. Antonio Durante, Roberto Di Pietro, Luigi V. Mancini
    Formal Specification for Fast Automatic IDS Training. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:191-204 [Conf]
  3. Roberto Di Pietro, Gianluigi Me, Maurizio Adriano Strangio
    A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:28-34 [Conf]
  4. Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga
    LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2003, pp:397-0 [Conf]
  5. Stefano Chessa, Roberto Di Pietro, Piero Maestrini
    Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2. [Citation Graph (0, 0)][DBLP]
    WONS, 2004, pp:184-198 [Conf]
  6. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  7. Angelo Spognardi, Roberto Di Pietro
    A formal framework for the performance analysis of P2P networks protocols. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  8. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini
    Secure Cooperative Channel Establishment inWireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:327-331 [Conf]
  9. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Efficient and secure keys management for wireless mobile communications. [Citation Graph (0, 0)][DBLP]
    POMC, 2002, pp:66-73 [Conf]
  10. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Random key-assignment for secure Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:62-71 [Conf]
  11. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan
    Connectivity properties of secure wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:53-58 [Conf]
  12. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Secure Selective Exclusion in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:423-434 [Conf]
  13. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    A Time Driven Methodology for Key Dimensioning in Multicast Communications. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:121-132 [Conf]
  14. Roberto Di Pietro, Antonio Durante, Luigi V. Mancini
    A Reliable Key Authentication Schema for Secure Multicast Communications. [Citation Graph (0, 0)][DBLP]
    SRDS, 2003, pp:231-240 [Conf]
  15. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini
    ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:49-62 [Journal]
  16. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Providing secrecy in key management protocols for large wireless sensors networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2003, v:1, n:4, pp:455-468 [Journal]
  17. Roberto Di Pietro, Luigi V. Mancini
    Security and privacy issues of handheld and wearable wireless devices. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:9, pp:74-79 [Journal]
  18. Roberto Di Pietro, Luigi V. Mancini, Giorgio Zanin
    Efficient and Adaptive Threshold Signatures for Ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:93-105 [Journal]
  19. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Key management for high bandwidth secure multicast. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:5, pp:693-709 [Journal]
  20. Giorgio Zanin, Roberto Di Pietro, Luigi V. Mancini
    Robust RSA distributed signatures for large-scale long-lived ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:1, pp:171-196 [Journal]
  21. Roberto Di Pietro, Refik Molva
    Information Confinement, Privacy, and Security in RFID Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:187-202 [Conf]
  22. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Towards threat-adaptive dynamic fragment replication in large scale distributed systems. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1- [Conf]
  23. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2006, v:12, n:6, pp:709-721 [Journal]

  24. Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  25. Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance. [Citation Graph (, )][DBLP]


  26. A Security Management Architecture for the Protection of Kernel Virtual Machines. [Citation Graph (, )][DBLP]


  27. Evaluating the Risk of Adopting RBAC Roles. [Citation Graph (, )][DBLP]


  28. Intrusion-Resilience in Mobile Unattended WSNs. [Citation Graph (, )][DBLP]


  29. A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets. [Citation Graph (, )][DBLP]


  30. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. [Citation Graph (, )][DBLP]


  31. Catch Me (If You Can): Data Survival in Unattended Sensor Networks. [Citation Graph (, )][DBLP]


  32. RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. [Citation Graph (, )][DBLP]


  33. Gossip-based aggregate computation: computing faster with non address-oblivious schemes. [Citation Graph (, )][DBLP]


  34. A cost-driven approach to role engineering. [Citation Graph (, )][DBLP]


  35. KvmSec: a security extension for Linux kernel virtual machines. [Citation Graph (, )][DBLP]


  36. Transparent security for cloud. [Citation Graph (, )][DBLP]


  37. ABBA: adaptive bicluster-based approach to impute missing values in binary matrices. [Citation Graph (, )][DBLP]


  38. A formal framework to elicit roles with business meaning in RBAC systems. [Citation Graph (, )][DBLP]


  39. Leveraging Lattices to Improve Role Mining. [Citation Graph (, )][DBLP]


  40. A Live Digital Forensic system for Windows networks. [Citation Graph (, )][DBLP]


  41. Mining Stable Roles in RBAC. [Citation Graph (, )][DBLP]


  42. A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. [Citation Graph (, )][DBLP]


  43. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  44. The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  45. Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. [Citation Graph (, )][DBLP]


  46. Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. [Citation Graph (, )][DBLP]


  47. RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP]


  48. Collaborative authentication in unattended WSNs. [Citation Graph (, )][DBLP]


  49. Information Assurance in Critical Infrastructures via Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  50. Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. [Citation Graph (, )][DBLP]


  51. A mechanism to enforce privacy in vehicle-to-infrastructure communication. [Citation Graph (, )][DBLP]


  52. Taming role mining complexity in RBAC. [Citation Graph (, )][DBLP]


  53. An Activity-Based Model for Separation of Duty [Citation Graph (, )][DBLP]


  54. The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack [Citation Graph (, )][DBLP]


  55. CONCISE: Compressed 'n' Composable Integer Set [Citation Graph (, )][DBLP]


Search in 0.046secs, Finished in 0.050secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002