dblp.uni-trier.dewww.uni-trier.de

Roberto Di Pietro

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
42EEFlavio Lombardi, Roberto Di Pietro: KvmSec: a security extension for Linux kernel virtual machines. SAC 2009: 2029-2034
41EERoberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Collaborative authentication in unattended WSNs. WISEC 2009: 237-244
40EERoberto Di Pietro, Pietro Michiardi, Refik Molva: Confidentiality and integrity for data aggregation in WSN using peer monitoring. Security and Communication Networks 2(2): 181-194 (2009)
39EEMauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2(2): 195-213 (2009)
2008
38EEAgusti Solanas, Roberto Di Pietro: A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets. MDAI 2008: 203-214
37EERoberto Di Pietro, Pietro Michiardi: Gossip-based aggregate computation: computing faster with non address-oblivious schemes. PODC 2008: 442
36EERoberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194
35EEAlessandro Colantonio, Roberto Di Pietro, Alberto Ocello: A cost-driven approach to role engineering. SAC 2008: 2129-2136
34EEAlessandro Colantonio, Roberto Di Pietro, Alberto Ocello: Leveraging Lattices to Improve Role Mining. SEC 2008: 333-347
33EERoberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini: A Live Digital Forensic system for Windows networks. SEC 2008: 653-667
32EERoberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik: POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194
31EEGene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160
30EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. WISEC 2008: 214-219
29EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Redoubtable Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008)
28EEAlessandro Colantonio, Roberto Di Pietro, Alberto Ocello: An Activity-Based Model for Separation of Duty CoRR abs/0810.5351: (2008)
27EEPaolo Cencioni, Roberto Di Pietro: A mechanism to enforce privacy in vehicle-to-infrastructure communication. Computer Communications 31(12): 2790-2802 (2008)
2007
26EERoberto Di Pietro, Refik Molva: Information Confinement, Privacy, and Security in RFID Systems. ESORICS 2007: 187-202
25EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Towards threat-adaptive dynamic fragment replication in large scale distributed systems. IPDPS 2007: 1
24EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. MobiHoc 2007: 80-89
23EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi: RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. PerCom Workshops 2007: 229-234
22EEStefano Chessa, Roberto Di Pietro, Erina Ferro, Gaetano Giunta, Gabriele Oligeri: Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. VTC Spring 2007: 634-638
21EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini: ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5(1): 49-62 (2007)
20EERoberto Di Pietro, Luigi V. Mancini, Giorgio Zanin: Efficient and Adaptive Threshold Signatures for Ad hoc networks. Electr. Notes Theor. Comput. Sci. 171(1): 93-105 (2007)
19EEGiorgio Zanin, Roberto Di Pietro, Luigi V. Mancini: Robust RSA distributed signatures for large-scale long-lived ad hoc networks. Journal of Computer Security 15(1): 171-196 (2007)
2006
18EERoberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil: Addressing the shortcomings of one-way chains. ASIACCS 2006: 289-296
17EEAngelo Spognardi, Roberto Di Pietro: A formal framework for the performance analysis of P2P networks protocols. IPDPS 2006
16EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini: Secure Cooperative Channel Establishment inWireless Sensor Networks. PerCom Workshops 2006: 327-331
15EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6): 709-721 (2006)
2005
14EERoberto Di Pietro, Gianluigi Me, Maurizio Adriano Strangio: A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. ICMB 2005: 28-34
2004
13EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. IPDPS 2004
12EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Connectivity properties of secure wireless sensor networks. SASN 2004: 53-58
11EEStefano Chessa, Roberto Di Pietro, Piero Maestrini: Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2. WONS 2004: 184-198
10 Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Key management for high bandwidth secure multicast. Journal of Computer Security 12(5): 693-709 (2004)
2003
9EERoberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397-
8EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Random key-assignment for secure Wireless Sensor Networks. SASN 2003: 62-71
7 Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A Time Driven Methodology for Key Dimensioning in Multicast Communications. SEC 2003: 121-132
6EERoberto Di Pietro, Antonio Durante, Luigi V. Mancini: A Reliable Key Authentication Schema for Secure Multicast Communications. SRDS 2003: 231-240
5EERoberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003)
4EERoberto Di Pietro, Luigi V. Mancini: Security and privacy issues of handheld and wearable wireless devices. Commun. ACM 46(9): 74-79 (2003)
2002
3EEAntonio Durante, Roberto Di Pietro, Luigi V. Mancini: Formal Specification for Fast Automatic IDS Training. FASec 2002: 191-204
2EERoberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73
1 Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434

Coauthor Index

1Roberto Battistoni [33]
2Alessandro Di Biagio [33]
3Mike Burmester [31]
4Paolo Cencioni [27]
5Stefano Chessa [11] [22]
6Alessandro Colantonio [28] [34] [35]
7Mauro Conti [16] [21] [23] [24] [30] [39]
8Antonio Durante [3] [6] [18]
9Sandro Etalle [9]
10Erina Ferro [22]
11Matteo Formica [33]
12Gaetano Giunta [22]
13Paul J. M. Havinga [9]
14Sushil Jajodia [1] [2] [5] [39]
15Ari Juels [31]
16Alfred Kobsa [31]
17Yee Wei Law [9]
18Flavio Lombardi [42]
19Di Ma [32]
20Piero Maestrini [11]
21Luigi V. Mancini [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [12] [13] [15] [16] [18] [19] [20] [21] [23] [24] [25] [29] [30] [33] [36] [39]
22Gianluigi Me [14]
23Alessandro Mei [7] [8] [10] [12] [13] [15] [24] [25] [29] [30]
24Pietro Michiardi [37] [40]
25David Molnar [31]
26Refik Molva [26] [40]
27Alberto Ocello [28] [34] [35]
28Gabriele Oligeri [22]
29Alessandro Panconesi [12] [29]
30Vishwas Patil [18]
31Jaikumar Radhakrishnan [12] [29]
32Melanie R. Rieback [31]
33Sankardas Roy [39]
34Agusti Solanas [38]
35Claudio Soriente [32] [36] [41]
36Angelo Spognardi [17] [23] [36] [41]
37Maurizio Adriano Strangio [14]
38Gene Tsudik [31] [32] [36] [41]
39Giorgio Zanin [19] [20]
40Lei Zhang [39]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)