| 2009 | ||
|---|---|---|
| 51 | Flavio Lombardi, Roberto Di Pietro: KvmSec: a security extension for Linux kernel virtual machines. SAC 2009: 2029-2034 | |
| 50 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde: A formal framework to elicit roles with business meaning in RBAC systems. SACMAT 2009: 85-94 | |
| 49 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde: Mining Stable Roles in RBAC. SEC 2009: 259-269 | |
| 48 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde: A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. SEC 2009: 376-386 | |
| 47 | Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 | |
| 46 | Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei: The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. WWIC 2009: 85-96 | |
| 45 | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) | |
| 44 | Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei: The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack CoRR abs/0912.2199: (2009) | |
| 43 | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) | |
| 42 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Distributed data source verification in wireless sensor networks. Information Fusion 10(4): 342-353 (2009) | |
| 41 | Roberto Di Pietro, Pietro Michiardi, Refik Molva: Confidentiality and integrity for data aggregation in WSN using peer monitoring. Security and Communication Networks 2(2): 181-194 (2009) | |
| 40 | Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2(2): 195-213 (2009) | |
| 2008 | ||
| 39 | Michele Albano, Stefano Chessa, Roberto Di Pietro: Information Assurance in Critical Infrastructures via Wireless Sensor Networks. IAS 2008: 305-310 | |
| 38 | Agusti Solanas, Roberto Di Pietro: A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets. MDAI 2008: 203-214 | |
| 37 | Roberto Di Pietro, Pietro Michiardi: Gossip-based aggregate computation: computing faster with non address-oblivious schemes. PODC 2008: 442 | |
| 36 | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 | |
| 35 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello: A cost-driven approach to role engineering. SAC 2008: 2129-2136 | |
| 34 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello: Leveraging Lattices to Improve Role Mining. SEC 2008: 333-347 | |
| 33 | Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini: A Live Digital Forensic system for Windows networks. SEC 2008: 653-667 | |
| 32 | Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik: POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194 | |
| 31 | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 | |
| 30 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. WISEC 2008: 214-219 | |
| 29 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Redoubtable Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008) | |
| 28 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello: An Activity-Based Model for Separation of Duty CoRR abs/0810.5351: (2008) | |
| 27 | Paolo Cencioni, Roberto Di Pietro: A mechanism to enforce privacy in vehicle-to-infrastructure communication. Computer Communications 31(12): 2790-2802 (2008) | |
| 2007 | ||
| 26 | Roberto Di Pietro, Refik Molva: Information Confinement, Privacy, and Security in RFID Systems. ESORICS 2007: 187-202 | |
| 25 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Towards threat-adaptive dynamic fragment replication in large scale distributed systems. IPDPS 2007: 1 | |
| 24 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. MobiHoc 2007: 80-89 | |
| 23 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi: RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. PerCom Workshops 2007: 229-234 | |
| 22 | Stefano Chessa, Roberto Di Pietro, Erina Ferro, Gaetano Giunta, Gabriele Oligeri: Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. VTC Spring 2007: 634-638 | |
| 21 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini: ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5(1): 49-62 (2007) | |
| 20 | Roberto Di Pietro, Luigi V. Mancini, Giorgio Zanin: Efficient and Adaptive Threshold Signatures for Ad hoc networks. Electr. Notes Theor. Comput. Sci. 171(1): 93-105 (2007) | |
| 19 | Giorgio Zanin, Roberto Di Pietro, Luigi V. Mancini: Robust RSA distributed signatures for large-scale long-lived ad hoc networks. Journal of Computer Security 15(1): 171-196 (2007) | |
| 2006 | ||
| 18 | Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil: Addressing the shortcomings of one-way chains. ASIACCS 2006: 289-296 | |
| 17 | Angelo Spognardi, Roberto Di Pietro: A formal framework for the performance analysis of P2P networks protocols. IPDPS 2006 | |
| 16 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini: Secure Cooperative Channel Establishment inWireless Sensor Networks. PerCom Workshops 2006: 327-331 | |
| 15 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6): 709-721 (2006) | |
| 2005 | ||
| 14 | Roberto Di Pietro, Gianluigi Me, Maurizio Adriano Strangio: A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. ICMB 2005: 28-34 | |
| 2004 | ||
| 13 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. IPDPS 2004 | |
| 12 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Connectivity properties of secure wireless sensor networks. SASN 2004: 53-58 | |
| 11 | Stefano Chessa, Roberto Di Pietro, Piero Maestrini: Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2. WONS 2004: 184-198 | |
| 10 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Key management for high bandwidth secure multicast. Journal of Computer Security 12(5): 693-709 (2004) | |
| 2003 | ||
| 9 | Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397- | |
| 8 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Random key-assignment for secure Wireless Sensor Networks. SASN 2003: 62-71 | |
| 7 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A Time Driven Methodology for Key Dimensioning in Multicast Communications. SEC 2003: 121-132 | |
| 6 | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini: A Reliable Key Authentication Schema for Secure Multicast Communications. SRDS 2003: 231-240 | |
| 5 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003) | |
| 4 | Roberto Di Pietro, Luigi V. Mancini: Security and privacy issues of handheld and wearable wireless devices. Commun. ACM 46(9): 74-79 (2003) | |
| 2002 | ||
| 3 | Antonio Durante, Roberto Di Pietro, Luigi V. Mancini: Formal Specification for Fast Automatic IDS Training. FASec 2002: 191-204 | |
| 2 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73 | |
| 1 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434 | |