Alberto Caponi

Orcid: 0000-0002-7887-4360

According to our database1, Alberto Caponi authored at least 20 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication.
IEEE Trans. Inf. Forensics Secur., 2020

2019
A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management.
Inf., 2019

Intelligent conditional collaborative private data sharing.
Future Gener. Comput. Syst., 2019

2018
Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications.
Future Internet, 2018

Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication.
CoRR, 2018

Towards traffic-oriented spreading factor allocations in LoRaWAN systems.
Proceedings of the 17th Annual Mediterranean Ad Hoc Networking Workshop, 2018

2017
A Survey on the Security of Stateful SDN Data Planes.
IEEE Commun. Surv. Tutorials, 2017

On the feasibility of attribute-based encryption for WLAN access control.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

D-STREAMON - NFV-Capable Distributed Framework for Network Monitoring.
Proceedings of the First International Workshop on Sofwarized Infrastructures for 5G and Fog Computing, 2017

D-StreaMon: From middlebox to distributed NFV framework for network monitoring.
Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan Area Networks, 2017

2016
WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures.
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2016

Facing lateral movements using widespread behavioral probes.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Mobile-PEP: Satellite terminal handover preserving service continuity.
Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015

2014
A General, Tractable and Accurate Model for a Cascade of LRU Caches.
IEEE Commun. Lett., 2014

2013
A General, Tractable and Accurate Model for a Cascade of Caches.
CoRR, 2013

Check before storing: what is the performance price of content integrity verification in LRU caching?
Comput. Commun. Rev., 2013

On the interplay among naming, content validity and caching in Information Centric Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Conditional disclosure of encrypted whitelists for DDoS attack mitigation.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013


  Loading...