Luigi V. Mancini

According to our database1, Luigi V. Mancini
  • authored at least 139 papers between 1986 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Analyzing Android Encrypted Network Traffic to Identify User Actions.
IEEE Trans. Information Forensics and Security, 2016

Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
CoRR, 2016

OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles.
CoRR, 2016

FedUp! Cloud Federation as a Service.
Proceedings of the Service-Oriented and Cloud Computing, 2016

Anonymity in an Electronic Society: A Survey.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Obfuscation of Sensitive Data for Incremental Release of Network Flows.
IEEE/ACM Trans. Netw., 2015

Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.
IJSN, 2015

No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.
CoRR, 2015

No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Proceedings of the Network and System Security - 9th International Conference, 2015

Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Boten ELISA: A novel approach for botnet C&C in Online Social Networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone.
CoRR, 2014

Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis.
CoRR, 2014

Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2013
Preserving privacy against external and internal threats in WSN data aggregation.
Telecommunication Systems, 2013

Mapping the File Systems Genome: rationales, technique, results and applications.
CoRR, 2013

Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers.
CoRR, 2013

Obsidian: A scalable and efficient framework for NetFlow obfuscation.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

Obsidian: A scalable and efficient framework for NetFlow obfuscation.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
DDoS Detection with Information Theory Metrics and Netflows - A Real Case.
Proceedings of the SECRYPT 2012, 2012

Obfuscation of sensitive data in network flows.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Relieve Internet Routing Security of Public Key Infrastructure.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
Securing Topology Maintenance Protocols for Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2011

Distributed Detection of Clone Attacks in Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2011

Secure topology maintenance and events collection in WSNs.
Security and Communication Networks, 2011

MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Replication Schemes in Unattended Wireless Sensor Networks.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
eRIPP-FS: Enforcing privacy and security in RFID.
Security and Communication Networks, 2010

Hierarchies of keys in secure multicast communications.
Journal of Computer Security, 2010

The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Data Security in Unattended Wireless Sensor Networks.
IEEE Trans. Computers, 2009

Privacy-preserving robust data aggregation in wireless sensor networks.
Security and Communication Networks, 2009

Distributed data source verification in wireless sensor networks.
Information Fusion, 2009

Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
EURASIP J. Wireless Comm. and Networking, 2009

The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack
CoRR, 2009

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009

Resource Management with X.509 Inter-domain Authorization Certificates (InterAC).
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

2008
Redoubtable Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptology ePrint Archive, 2008

Scalable and Efficient Provable Data Possession.
IACR Cryptology ePrint Archive, 2008

Special Issue: Hot Topics in Peer-to-Peer Systems.
Concurrency and Computation: Practice and Experience, 2008

Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Scalable and efficient provable data possession.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Live Digital Forensic system for Windows networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

2007
Robust RSA distributed signatures for large-scale long-lived ad hoc networks.
Journal of Computer Security, 2007

Efficient and Adaptive Threshold Signatures for Ad hoc networks.
Electr. Notes Theor. Comput. Sci., 2007

Preface.
Electr. Notes Theor. Comput. Sci., 2007

ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007

RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

Towards threat-adaptive dynamic fragment replication in large scale distributed systems.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Addressing interoperability issues in access control models.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks.
Proceedings of the Bio-Inspired Computing and Communication, 2007

2006
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks.
Wireless Networks, 2006

Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006

Sensor Networks that Are Provably Resilient.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

A robust watermarking system based on SVD compression.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Secure Cooperative Channel Establishment inWireless Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

A Secure and Efficient Large Scale Distributed System for Data Sharing.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Scheduling Hard-Real-Time Tasks with Backup Phasing Delay.
Proceedings of the 10th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2006), 2006

Addressing the shortcomings of one-way chains.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Graph-based specification of access control policies.
J. Comput. Syst. Sci., 2005

Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Securing Topology Maintenance Protocols for Sensor Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

A Blind Method for Digital Watermarking Attacks.
Proceedings of the Internet and Multimedia Systems and Applications, 2005

2004
Key management for high bandwidth secure multicast.
Journal of Computer Security, 2004

Connectivity properties of secure wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Towards a formal model for security policies specification and validation in the selinux system.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Administrative scope in the graph-based framework.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Towards a secure dynamic allocation of files in large scale distributed file systems.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

A Host Intrusion Prevention System for Windows Operating Systems.
Proceedings of the Computer Security, 2004

Information Flow Analysis for File Systems and Databases Using Labels.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems.
IEEE Trans. Parallel Distrib. Syst., 2003

Security and privacy issues of handheld and wearable wireless devices.
Commun. ACM, 2003

Providing secrecy in key management protocols for large wireless sensors networks.
Ad Hoc Networks, 2003

A Reliable Key Authentication Schema for Secure Multicast Communications.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

A Time Driven Methodology for Key Dimensioning in Multicast Communications.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Random key-assignment for secure Wireless Sensor Networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

2002
A graph-based formalism for RBAC.
ACM Trans. Inf. Syst. Secur., 2002

Remus: a security-enhanced operating system.
ACM Trans. Inf. Syst. Secur., 2002

Secure Selective Exclusion in Ad Hoc Wireless Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Efficient and secure keys management for wireless mobile communications.
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002

Conflict Detection and Resolution in Access Control Policy Specifications.
Proceedings of the Foundations of Software Science and Computation Structures, 2002

Formal Specification for Fast Automatic IDS Training.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

Decidability of Safety in Graph-Based Models for Access Control.
Proceedings of the Computer Security, 2002

2001
Graph Transformations for the Specification of Access Control Policies.
Electr. Notes Theor. Comput. Sci., 2001

On the specification and evolution of access control policies.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Foundations for a Graph-Based Approach to the Specification of Access Control Policies.
Proceedings of the Foundations of Software Science and Computation Structures, 2001

2000
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2000

Flexible Transaction Dependencies in Database Systems.
Distributed and Parallel Databases, 2000

Workshop on Personal Computer Based Networks of Workstation.
Proceedings of the Parallel and Distributed Processing, 2000

A Formal Model for Role-Based Access Control Using Graph Transformation.
Proceedings of the Computer Security, 2000

Operating system enhancements to prevent the misuse of system calls.
Proceedings of the CCS 2000, 2000

Enhancements to the Linux Kernel for Blocking Buffer Overflow Based Attacks.
Proceedings of the 4th Annual Linux Showcase & Conference 2000, 2000

1999
Fault-Tolerant Rate-Monotonic First-Fit Scheduling in Hard-Real-Time Systems.
IEEE Trans. Parallel Distrib. Syst., 1999

GAMMA on DEC 2114x with Efficient Flow Control.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1998
Advanced Transaction Processing in Multilevel Secure File Stores.
IEEE Trans. Knowl. Data Eng., 1998

A Fair Locking Protocol for Multilevel Secure Databases.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models.
Proceedings of the Application and Theory of Petri Nets 1998, 1998

1997
Two Implementation Relations and the Correctness of Communicating Replicated Processes.
Formal Asp. Comput., 1997

Fault-Tolerant Deadline-Monotonic Algorithm for Scheduling Hard-Real-Time Tasks.
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997

Flexible Commit Protocols for Advanced Transaction Processing.
Advanced Transaction Models and Architectures, 1997

1996
Secure Concurrency Control in MLS Databases with Two Versions of Data.
Proceedings of the Computer Security, 1996

Secure Locking Protocols for Multilevel Database Management Systems.
Proceedings of the Database Security Volume X, 1996

An Advanced Commit Protocol for MLS Distributed Database Systems.
Proceedings of the CCS '96, 1996

1995
Increasing Processor Utilization in Hard-Real-Time Systems with Checkpoints.
Real-Time Systems, 1995

1994
Scheduling Algorithms for Fault-Tolerance in Hard-Real-Time Systems.
Real-Time Systems, 1994

Collecting garbage in multilevel secure object stores.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.
Proceedings of the Computer Security, 1994

1993
The Duality of Fault-tolerant System Structures.
Softw., Pract. Exper., 1993

Modelling Replicated Processing.
Proceedings of the PARLE '93, 1993

1992
Fault-tolerant LPT task scheduling in multiprocessor systems.
Microprocessors and Microsystems - Embedded Hardware Design, 1992

Garbage Collection and Reachability
Proceedings of the Persistent Object Systems, 1992

Specification of Concurrency Control in Persistent Programming Languages.
Proceedings of the Persistent Object Systems, 1992

1991
Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems.
Comput. J., 1991

Copying Garbage Collection for Distributed Object Stores.
Proceedings of the Tenth Symposium on Reliable Distributed Systems, 1991

Formalising Replicated Distributed Processing.
Proceedings of the Tenth Symposium on Reliable Distributed Systems, 1991

1989
Reliability issues in the design of distributed object-based architectures.
PhD thesis, 1989

Synchronizing events in replicated systems.
Journal of Systems and Software, 1989

Proving Correctness Properties of a Replicated Synchronous Program.
Comput. J., 1989

Replication within atomic actions and conversations: a case study in fault-tolerance duality.
Proceedings of the Nineteenth International Symposium on Fault-Tolerant Computing, 1989

1988
A Technique for Subclassing and its Implementation Exploiting Polymorphic Procedures.
Softw., Pract. Exper., 1988

Hoare logic of distributed redundant systems.
Comput. Syst. Sci. Eng., 1988

Towards a Theory of Replicated Processing.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1988

1987
On the Duality of Fault Tolerant System Structures.
Proceedings of the Experiences with Distributed Systems, 1987

1986
Modular Redundancy in a Message Passing System.
IEEE Trans. Software Eng., 1986

Formal specification of N-modular redundancy.
Proceedings of the 14th ACM Annual Conference on Computer Science, 1986


  Loading...