default search action
Luigi V. Mancini
Luigi Vincenzo Mancini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j51]Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi Vincenzo Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepcion Muñoz Diez:
OliVaR: Improving olive variety recognition using deep neural networks. Comput. Electron. Agric. 216: 108530 (2024) - [j50]Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
FedComm: Federated Learning as a Medium for Covert Communication. IEEE Trans. Dependable Secur. Comput. 21(4): 1695-1707 (2024) - [j49]Alberto Maria Mongardini, Massimo La Morgia, Sushil Jajodia, Luigi Vincenzo Mancini, Alessandro Mei:
DARD: Deceptive Approaches for Robust Defense Against IP Theft. IEEE Trans. Inf. Forensics Secur. 19: 5591-5606 (2024) - [c99]Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini:
Have You Poisoned My Data? Defending Neural Networks Against Data Poisoning. ESORICS (1) 2024: 85-104 - [i29]Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz:
Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem. CoRR abs/2403.03593 (2024) - [i28]Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini:
Have You Poisoned My Data? Defending Neural Networks against Data Poisoning. CoRR abs/2403.13523 (2024) - [i27]Sabrine Ennaji, Fabio De Gaspari, Dorjan Hitaj, Alicia K Bidi, Luigi V. Mancini:
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects. CoRR abs/2409.18736 (2024) - 2023
- [j48]Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni, Luigi V. Mancini:
DOLOS: A Novel Architecture for Moving Target Defense. IEEE Trans. Inf. Forensics Secur. 18: 5890-5905 (2023) - [i26]Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini:
Minerva: A File-Based Ransomware Detector. CoRR abs/2301.11050 (2023) - [i25]Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni, Luigi V. Mancini:
DOLOS: A Novel Architecture for Moving Target Defense. CoRR abs/2303.00387 (2023) - [i24]Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepcion Muñoz Diez:
OliVaR: Improving Olive Variety Recognition using Deep Neural Networks. CoRR abs/2303.00431 (2023) - 2022
- [j47]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques. Neural Comput. Appl. 34(14): 12077-12096 (2022) - [j46]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Reliable detection of compressed and encrypted data. Neural Comput. Appl. 34(22): 20379-20393 (2022) - [c98]Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini:
PassFlow: Guessing Passwords with Generative Flows. DSN 2022: 251-262 - [c97]Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz:
MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding. ESORICS (3) 2022: 425-444 - [i23]Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
FedComm: Federated Learning as a Medium for Covert Communication. CoRR abs/2201.08786 (2022) - [i22]Giulio Pagnotta, Dorjan Hitaj, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding. CoRR abs/2202.06091 (2022) - 2021
- [j45]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. IEEE Intell. Syst. 36(5): 104-112 (2021) - [c96]Michal Piskozub, Fabio De Gaspari, Freddie Barr-Smith, Luigi V. Mancini, Ivan Martinovic:
MalPhase: Fine-Grained Malware Detection Using Network Flow Data. AsiaCCS 2021: 774-786 - [i21]Dorjan Hitaj, Giulio Pagnotta, Iacopo Masi, Luigi V. Mancini:
Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training. CoRR abs/2103.01914 (2021) - [i20]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Reliable Detection of Compressed and Encrypted Data. CoRR abs/2103.17059 (2021) - [i19]Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini:
PassFlow: Guessing Passwords with Generative Flows. CoRR abs/2105.06165 (2021) - [i18]Michal Piskozub, Fabio De Gaspari, Frederick Barr-Smith, Luigi V. Mancini, Ivan Martinovic:
MalPhase: Fine-Grained Malware Detection Using Network Flow Data. CoRR abs/2106.00541 (2021) - 2020
- [j44]Mauro Conti, Fabio De Gaspari, Luigi V. Mancini:
A Novel Stealthy Attack to Gather SDN Configuration-Information. IEEE Trans. Emerg. Top. Comput. 8(2): 328-340 (2020) - [j43]Edlira Dushku, Md Masoom Rabbani, Mauro Conti, Luigi V. Mancini, Silvio Ranise:
SARA: Secure Asynchronous Remote Attestation for IoT Systems. IEEE Trans. Inf. Forensics Secur. 15: 3123-3136 (2020) - [c95]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. ACNS (2) 2020: 254-274 - [c94]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. NSS 2020: 42-62 - [p4]Paul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît Leblanc, Mauno Pihelgas, Luigi V. Mancini, Fabio De Gaspari:
Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems. Adaptive Autonomous Secure Cyber Systems 2020: 1-21 - [i17]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. CoRR abs/2010.07754 (2020) - [i16]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. CoRR abs/2010.16204 (2020)
2010 – 2019
- 2019
- [c93]Mauro Conti, Edlira Dushku, Luigi V. Mancini, Md Masoom Rabbani, Silvio Ranise:
Remote Attestation as a Service for IoT. IoTSMS 2019: 320-325 - [c92]Mauro Conti, Edlira Dushku, Luigi V. Mancini:
RADIS: Remote Attestation of Distributed IoT Services. SDS 2019: 25-32 - [c91]Dorjan Hitaj, Briland Hitaj, Luigi V. Mancini:
Evasion Attacks Against Watermarking Techniques found in MLaaS Systems. SDS 2019: 55-63 - [c90]Mahdi Akil, Luigi V. Mancini, Daniele Venturi:
Multi-Covert Channel Attack in the Cloud. SDS 2019: 160-165 - [i15]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. CoRR abs/1911.02423 (2019) - 2018
- [j42]Giuseppe Cascavilla, Filipe Beato, Andrea Burattin, Mauro Conti, Luigi Vincenzo Mancini:
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles. Online Soc. Networks Media 6: 58-68 (2018) - [c89]Mauro Conti, Edlira Dushku, Luigi V. Mancini:
Distributed Services Attestation in IoT. From Database to Cyber Security 2018: 261-273 - [c88]Paul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît LeBlanc, Mauno Pihelgas, Luigi V. Mancini, Agostino Panico:
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. ICMCIS 2018: 1-9 - [i14]Alexander Kott, Luigi V. Mancini, Paul Théron, Martin Drasar, Edlira Dushku, Heiko Günther, Markus Kont, Benoît Leblanc, Agostino Panico, Mauno Pihelgas, Krzysztof Rzadca:
Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense. CoRR abs/1803.10664 (2018) - [i13]Paul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît Leblanc, Mauno Pihelgas, Luigi V. Mancini, Agostino Panico:
Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the NATO AICA Reference Architecture. CoRR abs/1806.08657 (2018) - [i12]Mauro Conti, Edlira Dushku, Luigi V. Mancini:
RADIS: Remote Attestation of Distributed IoT Services. CoRR abs/1807.10234 (2018) - [i11]Dorjan Hitaj, Luigi V. Mancini:
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques. CoRR abs/1809.00615 (2018) - 2017
- [c87]Mauro Conti, Fabio De Gaspari, Luigi V. Mancini:
Know Your Enemy: Stealth Configuration-Information Gathering in SDN. GPC 2017: 386-401 - [c86]Luigi V. Mancini, Andrea Monti, Agostino Panico:
SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court. ICISS 2017: 9-26 - 2016
- [j41]Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Analyzing Android Encrypted Network Traffic to Identify User Actions. IEEE Trans. Inf. Forensics Secur. 11(1): 114-125 (2016) - [c85]Paolo Bottoni, Emanuele Gabrielli, Gabriele Gualandi, Luigi Vincenzo Mancini, Franco Stolfi:
FedUp! Cloud Federation as a Service. ESOCC 2016: 168-182 - [c84]Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico:
AHEAD: A New Architecture for Active Defense. SafeConfig@CCS 2016: 11-16 - [p3]Mauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini:
Anonymity in an Electronic Society: A Survey. Cyber Deception 2016: 285-314 - [i10]Mauro Conti, Fabio De Gaspari, Luigi V. Mancini:
Know Your Enemy: Stealth Configuration-Information Gathering in SDN. CoRR abs/1608.04766 (2016) - [i9]Giuseppe Cascavilla, Filipe Beato, Andrea Burattin, Mauro Conti, Luigi Vincenzo Mancini:
OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles. CoRR abs/1611.06737 (2016) - 2015
- [j40]Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici:
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. Int. J. Secur. Networks 10(3): 137-150 (2015) - [j39]Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obfuscation of Sensitive Data for Incremental Release of Network Flows. IEEE/ACM Trans. Netw. 23(2): 672-686 (2015) - [c83]Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik:
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. ACNS 2015: 243-262 - [c82]Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini:
Boten ELISA: A novel approach for botnet C&C in Online Social Networks. CNS 2015: 74-82 - [c81]Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis. CODASPY 2015: 297-304 - [c80]Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. NSS 2015: 46-59 - [i8]Giuseppe Ateniese, Briland Hitaj, Luigi V. Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position. CoRR abs/1505.07774 (2015) - 2014
- [c79]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone. ICDCS 2014: 218-227 - [c78]Andrea Di Florio, Nino Vincenzo Verde, Antonio Villani, Domenico Vitali, Luigi Vincenzo Mancini:
Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey. ISSRE Workshops 2014: 389-394 - [i7]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone. CoRR abs/1402.1940 (2014) - [i6]Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis. CoRR abs/1407.7844 (2014) - 2013
- [j38]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini:
Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4): 2163-2176 (2013) - [c77]Roberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali:
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements. CRiSIS 2013: 1-8 - [c76]Antonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obsidian: A scalable and efficient framework for NetFlow obfuscation. INFOCOM 2013: 7-8 - [c75]Antonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obsidian: A scalable and efficient framework for NetFlow obfuscation. INFOCOM Workshops 2013: 73-74 - [i5]Roberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali:
Mapping the File Systems Genome: rationales, technique, results and applications. CoRR abs/1306.2833 (2013) - [i4]Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali:
Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers. CoRR abs/1306.4447 (2013) - 2012
- [c74]Luigi Vincenzo Mancini, Angelo Spognardi, Claudio Soriente, Antonio Villani, Domenico Vitali:
Relieve Internet Routing Security of Public Key Infrastructure. ICCCN 2012: 1-9 - [c73]Angelo Spognardi, Antonio Villani, Domenico Vitali, Luigi Vincenzo Mancini, Roberto Battistoni:
Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets. ICETE (Selected Papers) 2012: 192-208 - [c72]Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obfuscation of sensitive data in network flows. INFOCOM 2012: 2372-2380 - [c71]Domenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini:
DDoS Detection with Information Theory Metrics and Netflows - A Real Case. SECRYPT 2012: 172-181 - 2011
- [j37]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini:
Secure topology maintenance and events collection in WSNs. Secur. Commun. Networks 4(7): 744-762 (2011) - [j36]Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(3): 450-465 (2011) - [j35]Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, Alessandro Mei:
Distributed Detection of Clone Attacks in Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(5): 685-698 (2011) - [c70]Domenico Vitali, Angelo Spognardi, Luigi V. Mancini:
Replication Schemes in Unattended Wireless Sensor Networks. NTMS 2011: 1-5 - [c69]Domenico Vitali, Angelo Spognardi, Antonio Villani, Luigi V. Mancini:
MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks. SRDS Workshops 2011: 42-51 - 2010
- [j34]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Hierarchies of keys in secure multicast communications. J. Comput. Secur. 18(5): 839-860 (2010) - [j33]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
eRIPP-FS: Enforcing privacy and security in RFID. Secur. Commun. Networks 3(1): 58-70 (2010) - [c68]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini:
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. CIT 2010: 910-915 - [c67]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei:
The smallville effect: social ties make mobile networks more secure against node capture attack. MOBIWAC 2010: 99-106
2000 – 2009
- 2009
- [j32]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) - [j31]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j30]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Distributed data source verification in wireless sensor networks. Inf. Fusion 10(4): 342-353 (2009) - [j29]Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini:
Privacy-preserving robust data aggregation in wireless sensor networks. Secur. Commun. Networks 2(2): 195-213 (2009) - [j28]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) - [c66]Vishwas Patil, Paolo Gasti, Luigi V. Mancini, Giovanni Chiola:
Resource Management with X.509 Inter-domain Authorization Certificates (InterAC). EuroPKI 2009: 34-50 - [c65]Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. SecureComm 2009: 265-284 - [c64]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei:
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. WWIC 2009: 85-96 - [i3]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei:
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack. CoRR abs/0912.2199 (2009) - 2008
- [j27]Luigi V. Mancini:
Special Issue: Hot Topics in Peer-to-Peer Systems. Concurr. Comput. Pract. Exp. 20(6): 599 (2008) - [j26]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Redoubtable Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): 13:1-13:22 (2008) - [c63]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 - [c62]Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini:
A Live Digital Forensic system for Windows networks. SEC 2008: 653-667 - [c61]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and efficient provable data possession. SecureComm 2008: 9 - [c60]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. WISEC 2008: 214-219 - [i2]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2008: 114 (2008) - [i1]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary. IACR Cryptol. ePrint Arch. 2008: 293 (2008) - 2007
- [j25]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5(1): 49-62 (2007) - [j24]Giorgio Zanin, Roberto Di Pietro, Luigi V. Mancini:
Robust RSA distributed signatures for large-scale long-lived ad hoc networks. J. Comput. Secur. 15(1): 171-196 (2007) - [c59]Andrea Gabrielli, Luigi V. Mancini:
Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks. BIOWIRE 2007: 399-410 - [c58]Vishwas Patil, Alessandro Mei, Luigi V. Mancini:
Addressing interoperability issues in access control models. AsiaCCS 2007: 389-391 - [c57]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Towards threat-adaptive dynamic fragment replication in large scale distributed systems. IPDPS 2007: 1 - [c56]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. MobiHoc 2007: 80-89 - [c55]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. PerCom Workshops 2007: 229-234 - [p2]Maria Calagna, Luigi V. Mancini:
Information Hiding for Spatial and Geographical Data. Spatial Data on the Web 2007: 235-258 - [e2]Giovanni Di Crescenzo, Luigi V. Mancini:
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2006, Venice, Italy, July 16, 2006. Electronic Notes in Theoretical Computer Science 171(1), Elsevier 2007 [contents] - 2006
- [j23]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel. Networks 12(6): 709-721 (2006) - [c54]Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil:
Addressing the shortcomings of one-way chains. AsiaCCS 2006: 289-296 - [c53]Alan A. Bertossi, Luigi V. Mancini, Alessandra Menapace:
Scheduling Hard-Real-Time Tasks with Backup Phasing Delay. DS-RT 2006: 107-118 - [c52]Giorgio Zanin, Alessandro Mei, Luigi V. Mancini:
A Secure and Efficient Large Scale Distributed System for Data Sharing. ICDCS 2006: 27 - [c51]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
Secure Cooperative Channel Establishment inWireless Sensor Networks. PerCom Workshops 2006: 327-331 - [c50]