Mauro Conti

According to our database1, Mauro Conti
  • authored at least 217 papers between 2006 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
Wireless Networks, 2018

Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Information Forensics and Security, 2018

Robust Smartphone App Identification via Encrypted Network Traffic Analysis.
IEEE Trans. Information Forensics and Security, 2018

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet of Things Journal, 2018

An efficient routing protocol for the QoS support of large-scale MANETs.
Int. J. Communication Systems, 2018

Internet of Things security and forensics: Challenges and opportunities.
Future Generation Comp. Syst., 2018

Advertising in the IoT Era: Vision and Challenges.
CoRR, 2018

DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks.
CoRR, 2018

Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks.
Computer Communications, 2018

The position cheating attack on inter-vehicular online gaming.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks.
ACM Trans. Internet Techn., 2017

SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.
IEEE Trans. Network and Service Management, 2017

Drone Path Planning for Secure Positioning and Secure Position Verification.
IEEE Trans. Mob. Comput., 2017

EnergIoT: A solution to improve network lifetime of IoT devices.
Pervasive and Mobile Computing, 2017

Anonymous end-to-end communications in adversarial mobile clouds.
Pervasive and Mobile Computing, 2017

FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments.
CoRR, 2017

Forensics Analysis of Android Mobile VoIP Apps.
CoRR, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
CoRR, 2017

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis.
CoRR, 2017

Robust Smartphone App Identification Via Encrypted Network Traffic Analysis.
CoRR, 2017

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
CoRR, 2017

It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features.
CoRR, 2017

A Survey on Security and Privacy Issues of Bitcoin.
CoRR, 2017

A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
CoRR, 2017

A Survey on the Security of Stateful SDN Data Planes.
IEEE Communications Surveys and Tutorials, 2017

PIndroid: A novel Android malware detection system using ensemble learning methods.
Computers & Security, 2017

Android inter-app communication threats and detection techniques.
Computers & Security, 2017

DDoS attacks in cloud computing: Issues, taxonomy, and future directions.
Computer Communications, 2017

Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions.
IEEE Cloud Computing, 2017

DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Computers & Electrical Engineering, 2017

Service resizing for quick DDoS mitigation in cloud computing environment.
Annales des Télécommunications, 2017

Toward secure and efficient attestation for highly dynamic swarms: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A roaming-based denial of service attack on LTE networks: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A comprehensive and effective mechanism for DDoS detection in SDN.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

SNIFFO: Security of networks and intelligence for field operations.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Practical extensions to countermeasure DoS attacks in software defined networking.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Blocking intrusions at border using software defined-internet exchange point (SD-IXP).
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

A Novel Distributed Fog-Based Networked Architecture to Preserve Energy in Fog Data Centers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Panorama: Real-time bird's eye view of an OpenFlow network.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

FADEWICH: Fast Deauthentication Over the Wireless Channel.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Ensuring information security by using Haskell's advanced type system.
Proceedings of the International Carnahan Conference on Security Technology, 2017

GolfEngine: Network management system for software defined networking.
Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing, 2017

You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Identifying Emotions in Social Media: Comparison of Word-Emotion Lexicons.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
Proceedings of the Computer Security - ESORICS 2017, 2017

Unraveling Reflection Induced Sensitive Leaks in Android Apps.
Proceedings of the Risks and Security of Internet and Systems, 2017

Do we need a holistic approach for the design of secure IoT systems?
Proceedings of the Computing Frontiers Conference, 2017

POSTER: Detection of Information Leaks via Reflection in Android Apps.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

On the Influence of Emotional Valence Shifts on the Spread of Information in Social Networks.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Proceedings of the Applied Cryptography and Network Security, 2017

Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
IEEE Trans. Information Forensics and Security, 2016

Analyzing Android Encrypted Network Traffic to Identify User Actions.
IEEE Trans. Information Forensics and Security, 2016

Modeling Enlargement Attacks Against UWB Distance Bounding Protocols.
IEEE Trans. Information Forensics and Security, 2016

Selfrando: Securing the Tor Browser against De-anonymization Exploits.
PoPETs, 2016

On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
IEEE Micro, 2016

No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices.
CoRR, 2016

Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016

DELTA: Data Extraction and Logging Tool for Android.
CoRR, 2016

FADEWICH: Fast Deauthentication over the Wireless Channel.
CoRR, 2016

Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
CoRR, 2016

Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP.
CoRR, 2016

OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles.
CoRR, 2016

Android App Collusion Threat and Mitigation Techniques.
CoRR, 2016

Security and Privacy Analysis of NSF Future Internet Architectures.
CoRR, 2016

ODIN: Obfuscation-based privacy preserving consensus algorithm for Decentralized Information fusion in smart device Networks.
CoRR, 2016

On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
CoRR, 2016

A Survey of Man In The Middle Attacks.
IEEE Communications Surveys and Tutorials, 2016

Colluding browser extension attack on user privacy and its implication for web browsers.
Computers & Security, 2016

ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs.
Computer Communications, 2016

DDoS attacks in cloud computing: Collateral damage to non-targets.
Computer Networks, 2016

The impact of malicious nodes positioning on vehicular alert messaging system.
Ad Hoc Networks, 2016

POSTER: Toward a Secure and Scalable Attestation.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
Proceedings of the 25th USENIX Security Symposium, 2016

RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions.
Proceedings of the Symbiotic Interaction, 2016

ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Amplified Distributed Denial of Service Attack in Software Defined Networking.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Towards a realistic model for failure propagation in interdependent networks.
Proceedings of the 2016 International Conference on Computing, 2016

ELBA: Efficient Layer Based Routing Algorithm in SDN.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Mind The Plug! Laptop-User Recognition Through Power Consumption.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

SANA: Secure and Scalable Aggregate Network Attestation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

FlowMine: Android app analysis via data flow.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A Host and Network Based Intrusion Detection for Android Smartphones.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
Proceedings of the Applied Cryptography and Network Security, 2016

OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

Anonymity in an Electronic Society: A Survey.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Privacy for LBSs: On Using a Footprint Model to Face the Enemy.
Proceedings of the Advanced Research in Data Privacy, 2015

Secure Wireless Sensor Networks - Threats and Solutions
Advances in Information Security 65, Springer, ISBN: 978-1-4939-3460-7, 2015

Provable Storage Medium for Data Storage Outsourcing.
IEEE Trans. Services Computing, 2015

Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
IEEE Trans. Parallel Distrib. Syst., 2015

Employing Program Semantics for Malware Detection.
IEEE Trans. Information Forensics and Security, 2015

Towards a Realistic Model for Failure Propagation in Interdependent Networks.
CoRR, 2015

DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions.
CoRR, 2015

CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery.
CoRR, 2015

TRAP: using TaRgeted Ads to unveil Google personal Profiles.
CoRR, 2015

To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
CoRR, 2015

LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
CoRR, 2015

On the Feasibility of Attribute-Based Encryption on Smartphone Devices.
CoRR, 2015

Android Security: A Survey of Issues, Malware Penetration, and Defenses.
IEEE Communications Surveys and Tutorials, 2015

Robust access control framework for mobile cloud computing network.
Computer Communications, 2015

The verifier bee: A path planner for drone-based secure location verification.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Impact of country-scale Internet disconnection on structured and social P2P overlays.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

TRAP: Using Targeted ads to unveil Google personal profiles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

EyeCloud: A BotCloud Detection System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A robust dynamic analysis system preventing SandBox detection by Android malware.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

On the Feasibility of Attribute-Based Encryption on Smartphone Devices.
Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015

Hand Drawn Optical Circuit Recognition.
Proceedings of the Proceeding of the Seventh International Conference on Intelligent Human Computer Interaction, 2015

Impact of security threats in vehicular alert messaging systems.
Proceedings of the IEEE International Conference on Communication, 2015

Toward an Anonymous Process Mining.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Obfuscation and Diversification for Securing Cloud Computing.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Brain-Computer Interface applications: Security and privacy challenges.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Boten ELISA: A novel approach for botnet C&C in Online Social Networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

CaT: Evaluating cloud-aided TLS for smartphone energy efficiency.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Verifiable and privacy-preserving fine-grained data-collection for smart metering.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
Proceedings of the 10th ACM Symposium on Information, 2015

Revealing Censored Information Through Comments and Commenters in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
IEEE Trans. Services Computing, 2014

Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication.
IEEE Trans. Intelligent Transportation Systems, 2014

Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
IEEE Trans. Information Forensics and Security, 2014

MOSES: Supporting and Enforcing Security Profiles on Smartphones.
IEEE Trans. Dependable Sec. Comput., 2014

Clone wars: Distributed detection of clone attacks in mobile WSNs.
J. Comput. Syst. Sci., 2014

Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis.
CoRR, 2014

SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks.
CoRR, 2014

A secure alert messaging system for safe driving.
Computer Communications, 2014

Smart health: A context-aware health paradigm within smart cities.
IEEE Communications Magazine, 2014

Attack Resilient Underwater Networks Through Software Defined Networking.
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014

Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Privacy Leakage Attacks in Browsers by Colluding Extensions.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Secure Message Delivery Games for Device-to-Device Communications.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
Proceedings of the Computer Security - ESORICS 2014, 2014

Environment-Reactive Malware Behavior: Detection and Categorization.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks.
Proceedings of the Risks and Security of Internet and Systems, 2014

VirtualFriendship: Hiding interactions on Online Social Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

OASIS: Operational Access Sandboxes for Information Security.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

Covert ephemeral communication in named data networking.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Virtual private social networks and a facebook implementation.
TWEB, 2013

Hybrid Static-Runtime Information Flow and Declassification Enforcement.
IEEE Trans. Information Forensics and Security, 2013

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
IEEE Trans. Information Forensics and Security, 2013

Preserving privacy against external and internal threats in WSN data aggregation.
Telecommunication Systems, 2013

Windows Mobile LiveSD Forensics.
J. Network and Computer Applications, 2013

Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking
CoRR, 2013

MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities.
CoRR, 2013

Covert Ephemeral Communication in Named Data Networking.
CoRR, 2013

Providing Source Location Privacy in Wireless Sensor Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2013

A lightweight mechanism for detection of cache pollution attacks in Named Data Networking.
Computer Networks, 2013

Smartphone and Laptop Frameworks for vehicular networking experimentation.
Proceedings of the IFIP Wireless Days, 2013

MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Friend in the Middle (FiM): Tackling de-anonymization in social networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Cache Privacy in Named-Data Networking.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Secure Verification of Location Claims on a Vehicular Safety Application.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Preserving Smartphone Users' Anonymity in Cloudy Days.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

ContextOS: A Context Aware Operating System for Mobile Devices.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

CREPUSCOLO: A collusion resistant privacy preserving location verification system.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Secure Data Aggregation in Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2012

CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android.
IEEE Trans. Information Forensics and Security, 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
Proceedings of the Security Protocols XX, 2012

MOSES: supporting operation modes on smartphones.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Wireless Sensor Replica Detection in Mobile Environments.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Demonstrating the effectiveness of MOSES for separation of execution modes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

FakeBook: Detecting Fake Profiles in On-Line Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Distributed Detection of Clone Attacks in Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2011

Secure topology maintenance and events collection in WSNs.
Security and Communication Networks, 2011

CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.
Int. J. Inf. Sec., 2011

"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation.
EURASIP J. Wireless Comm. and Networking, 2011

Events privacy in WSNs: A new model and its application.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Virtual private social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
eRIPP-FS: Enforcing privacy and security in RFID.
Security and Communication Networks, 2010

Censorship-Resilient Communications through Information Scattering.
Proceedings of the Security Protocols XVIII, 2010

Censorship-Resilient Communications through Information Scattering (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

CED2: Communication Efficient Disjointness Decision.
Proceedings of the Security and Privacy in Communication Networks, 2010

The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

CRePE: Context-Related Policy Enforcement for Android.
Proceedings of the Information Security - 13th International Conference, 2010

Event Handoff Unobservability in WSN.
Proceedings of the Open Research Problems in Network Security, 2010

Time Warp: How Time Affects Privacy in LBSs.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Privacy-preserving robust data aggregation in wireless sensor networks.
Security and Communication Networks, 2009

Distributed data source verification in wireless sensor networks.
Information Fusion, 2009

Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
EURASIP J. Wireless Comm. and Networking, 2009

The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack
CoRR, 2009

Secure median computation in wireless sensor networks.
Ad Hoc Networks, 2009

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009

2008
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Securely computing an approximate median in wireless sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007

RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

2006
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006

Secure Cooperative Channel Establishment inWireless Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006


  Loading...