Claudio Soriente

Orcid: 0000-0002-8215-5457

According to our database1, Claudio Soriente authored at least 80 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024

SPATIAL: Practical AI Trustworthiness with Human Oversight.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

2023
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing.
IACR Cryptol. ePrint Arch., 2023

LISA: LIghtweight single-server Secure Aggregation with a public source of randomness.
CoRR, 2023

No Forking Way: Detecting Cloning Attacks on Intel SGX Applications.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Ring Signatures with User-Controlled Linkability.
IACR Cryptol. ePrint Arch., 2022

On the Challenges of Detecting Side-Channel Attacks in SGX.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

On the Storage Overhead of Proof-of-Work Blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols.
IEEE Trans. Dependable Secur. Comput., 2021

Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions.
Proc. Priv. Enhancing Technol., 2021

User profiling by network observers.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

2020
Auditable Asymmetric Password Authenticated Public Key Establishment.
IACR Cryptol. ePrint Arch., 2020

Subversion-Resilient Enhanced Privacy ID.
IACR Cryptol. ePrint Arch., 2020

Monitoring Performance Metrics is not Enough to Detect Side-Channel Attacks on Intel SGX.
CoRR, 2020

2019
Long-term Measurement and Analysis of the Free Proxy Ecosystem.
ACM Trans. Web, 2019

Securing Cloud Data Under Key Exposure.
IEEE Trans. Cloud Comput., 2019

DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Beyond content analysis: detecting targeted ads via distributed counting.
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019

Towards Secure and Decentralized Sharing of IoT Data.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Toward Shared Ownership in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

Nothing Refreshes Like a RePSI: Reactive Private Set Intersection.
IACR Cryptol. ePrint Arch., 2018

ProxyTorrent: Untangling the Free HTTP(S) Proxy Ecosystem.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

There goes Wally: Anonymously sharing your location gives you away.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Towards Shared Ownership in the Cloud.
IACR Cryptol. ePrint Arch., 2017

Partitioned Group Password-Based Authenticated Key Exchange.
Comput. J., 2017

Private set intersection: New generic constructions and feasibility results.
Adv. Math. Commun., 2017

Who is Fiddling with Prices?: Building and Deploying a Watchdog Service for E-commerce.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

2016
Your Are "Proxy" And I Know It.
CoRR, 2016

SALVE: server authentication with location verification.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

User Profiling in the Time of HTTPS.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

On Information Leakage in Deduplicated Storage Systems.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
W-SPS: Designing a Wide-Area Secure Positioning System.
IACR Cryptol. ePrint Arch., 2015

Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms.
CoRR, 2015

Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound.
Proceedings of the 24th USENIX Security Symposium, 2015

Commune: Shared Ownership in an Agnostic Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Logical Partitions on Many-Core Platforms.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Securing Cloud Data in the New Attacker Model.
IACR Cryptol. ePrint Arch., 2014

Smartphones as Practical and Secure Location Verification Tokens for Payments.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Enforcing Location and Time-Based Access Control on Cloud-Stored Data.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2013
United We Stand: Intrusion Resilience in Mobile Unattended WSNs.
IEEE Trans. Mob. Comput., 2013

Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI).
IEEE Trans. Inf. Forensics Secur., 2013

Participatory privacy: Enabling privacy in participatory sensing.
IEEE Netw., 2013

SHAKE: Single HAsh key establishment for resource constrained devices.
Ad Hoc Networks, 2013

Secure enrollment and practical migration for mobile trusted execution environments.
Proceedings of the SPSM'13, 2013

2012
StreamCloud: An Elastic and Scalable Data Streaming System.
IEEE Trans. Parallel Distributed Syst., 2012

Self-healing in unattended wireless sensor networks.
ACM Trans. Sens. Networks, 2012

A Big Data Platform for Large Scale Event Processing.
ERCIM News, 2012

Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs.
IEEE Data Eng. Bull., 2012

Relieve Internet Routing Security of Public Key Infrastructure.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Size-Hiding in Private Set Intersection: Existential Results and Constructions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Intrusion-resilient integrity in data-centric unattended WSNs.
Pervasive Mob. Comput., 2011

Hummingbird: Privacy at the time of Twitter.
IACR Cryptol. ePrint Arch., 2011

Short paper: PEPSI - privacy-enhanced participatory sensing infrastructure.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Building Trust for lambda-Congenial Secret Groups.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Security and privacy issues in the Portable Document Format.
J. Syst. Softw., 2010

Securing Mobile Unattended WSNs against a Mobile Adversary.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

CReW: Cloud Resilience for Windows Guests through Monitored Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Solving Revocation with Efficient Update of Anonymous Credentials.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Intrusion-Resilience in Mobile Unattended WSNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Data Security in Unattended Wireless Sensor Networks.
IEEE Trans. Computers, 2009

New adversary and new threats: security in unattended sensor networks.
IEEE Netw., 2009

Secure pairing of interface constrained devices.
Int. J. Secur. Networks, 2009

Using audio in secure device pairing.
Int. J. Secur. Networks, 2009

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009

Collaborative authentication in unattended WSNs.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

On the difficulty of software-based attestation of embedded devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptol. ePrint Arch., 2008

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2008

ABBA: A Balls and bins approach to secure aggregation in WSNs.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

HAPADEP: Human-Assisted Pure Audio Device Pairing.
Proceedings of the Information Security, 11th International Conference, 2008

2007
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata.
J. Syst. Softw., 2007

BEDA: Button-Enabled Device Pairing.
IACR Cryptol. ePrint Arch., 2007

HAPADEP: Human Asisted Pure Audio Device Pairing.
IACR Cryptol. ePrint Arch., 2007

Modified Original Smart Cards and Smart Card Clone Countermeasures.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2004
A blocker-proof conditional access system.
IEEE Trans. Consumer Electron., 2004


  Loading...