Panagiotis Papadimitratos

Orcid: 0000-0002-3267-5374

Affiliations:
  • KTH Royal Institute of Technology, Stockholm, Sweden
  • Swiss Federal Institute of Technology in Lausanne, Switzerland


According to our database1, Panagiotis Papadimitratos authored at least 165 papers between 2002 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2020, "for contributions to wireless mobile network security and privacy".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Extending RAIM with a Gaussian Mixture of Opportunistic Information.
CoRR, 2024

2023
Thwarting code-reuse and side-channel attacks in embedded systems.
Comput. Secur., October, 2023

SECMACE+: Upscaling Pseudonymous Authentication for Large Mobile Systems.
IEEE Trans. Cloud Comput., 2023

Challenges of Radio Frequency Fingerprinting: From Data Collection to Deployment.
CoRR, 2023

Detecting GNSS misbehavior leveraging secure heterogeneous time sources.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2023

Using Mobile Phones for Participatory Detection and Localization of a GNSS Jammer.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2023

Probabilistic Detection of GNSS Spoofing using Opportunistic Information.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2023

Vulnerability Analysis of Vehicular Coordinated Maneuvers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Securing Optimized Code Against Power Side Channels.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

WPES '23: 22nd Workshop on Privacy in the Electronic Society.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Cheetah: A High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency.
IEEE/ACM Trans. Netw., 2022

Protecting GNSS Open Service Navigation Message Authentication Against Distance-Decreasing Attacks.
IEEE Trans. Aerosp. Electron. Syst., 2022

HERMES: Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System.
IEEE Internet Things J., 2022

High-precision Hardware Oscillators Ensemble for GNSS Attack Detection.
CoRR, 2022

Distributed and Mobile Message Level Relaying/Replaying of GNSS Signals.
CoRR, 2022

Poster: Detecting GNSS misbehaviour with high-precision clocks.
CoRR, 2022

DEMO: Relay/Replay Attacks on GNSS signals.
CoRR, 2022

Authenticated time for detecting GNSS attacks.
CoRR, 2022

Capturing drivers' privacy preferences for intelligent transportation systems: An intercultural perspective.
Comput. Secur., 2022

Off-the-shelf Wi-Fi Indoor Smartphone Localization.
Proceedings of the 17th Wireless On-Demand Network Systems and Services Conference, 2022

Attack Impact and Misbehavior Detection in Vehicular Platoons.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Digital Twin-based Intrusion Detection for Industrial Control Systems.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Participatory Sensing for Localization of a GNSS Jammer.
Proceedings of the 2022 International Conference on Localization and GNSS, 2022

2021
Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems.
IEEE Trans. Mob. Comput., 2021

Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers.
IEEE Open J. Commun. Soc., 2021

Cooperative Location Privacy in Vehicular Networks: Why Simple Mix Zones are Not Enough.
IEEE Internet Things J., 2021

Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests.
IEEE Access, 2021

Detecting GNSS misbehaviour with high-precision clocks.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Relay/replay attacks on GNSS signals.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

SecProtobuf: Implicit Message Integrity Provision in Heterogeneous Vehicular Systems.
Proceedings of the 13th IEEE Vehicular Networking Conference, 2021

Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

HarvestPrint: Securing Battery-free Backscatter Tags through Fingerprinting.
Proceedings of the HotNets '21: The 20th ACM Workshop on Hot Topics in Networks, 2021

2020
HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System.
IACR Cryptol. ePrint Arch., 2020

Towards Scalable Security in Interference Channels With Arbitrary Number of Users.
CoRR, 2020

Security and Privacy in Vehicular Social Networks.
CoRR, 2020

VeSPA: Vehicular Security and Privacy-preserving Architecture.
CoRR, 2020

Protecting GNSS-based Services using Time Offset Validation.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2020

A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

Scalable Security in Interference Channels With Arbitrary Number of Users.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
Resilient Privacy Protection for Location-Based Services through Decentralization.
ACM Trans. Priv. Secur., 2019

Secure Estimation and Zero-Error Secrecy Capacity.
IEEE Trans. Autom. Control., 2019

DoS-resilient cooperative beacon verification for vehicular communication systems.
Ad Hoc Networks, 2019

Scaling pseudonymous authentication for large mobile systems.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Statistical Method for Spoofing Detection at Mobile GNSS Receivers.
Proceedings of the 16th International Symposium on Wireless Communication Systems, 2019

2018
SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems.
IEEE Trans. Intell. Transp. Syst., 2018

Analysis of the Effect of the Distance-Decreasing Attacks on GNSS Authenticated Signals.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Privacy Preservation through Uniformity.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Expedited Beacon Verification for VANET.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Towards Battery-free Radio Tomographic Imaging.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Security on Harvested Power.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Hardened Registration Process for Participatory Sensing.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Poster: Tracking Vehicles Through Encrypted Mix-Zones Using Physical Layer Properties.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Poster: Mix-Zones Everywhere: A Dynamic Cooperative Location Privacy Protection Scheme.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

The Symmetric Two-Hop Channel with an Untrusted Relay.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

On the Capacity of State-Dependent Gaussian Z-Interference Channel.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

On the capacity of Gaussian "dirty" Z-interference channel with common state.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

2017
Secrecy Capacity Scaling in Large Cooperative Wireless Networks.
IEEE Trans. Inf. Theory, 2017

SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things.
Future Gener. Comput. Syst., 2017

CLIMEX: A Wireless Physical Layer Security Protocol Based on Clocked Impulse Exchanges.
CoRR, 2017

Toward a Taxonomy and Attacker Model for Secure Routing Protocols.
Comput. Commun. Rev., 2017

Bloom filter based certificate validation for VANET: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

RHyTHM: A randomized hybrid scheme to hide in the mobile crowd.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Lightweight X.509 Digital Certificates for the Internet of Things.
Proceedings of the Interoperability, Safety and Security in IoT, 2017

Optimal secure partial-repair in distributed storage systems.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
2D Hash Chain robust Random Key Distribution scheme.
Inf. Process. Lett., 2016

Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems.
IEEE Internet Things J., 2016

Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel.
CoRR, 2016

Proactive certificate validation for VANETs.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Evaluating on-demand pseudonym acquisition policies in vehicular communication systems.
Proceedings of the First International Workshop on Internet of Vehicles and Vehicles of Internet, 2016

Android privacy C(R)ache: reading your external storage and sensors for fun and profit.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

Uncertain wiretap channels and secure estimation.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Security in the Gaussian interference channel: Weak and moderately weak interference regimes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Secure estimation for unstable systems.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Security on Wheels: Security and Privacy for Vehicular Communication Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems.
IEEE Veh. Technol. Mag., 2015

Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems.
IEEE Trans. Intell. Transp. Syst., 2015

Key splitting: making random key distribution schemes resistant against node capture.
Secur. Commun. Networks, 2015

Frequency hopping does not increase anti-jamming resilience of wireless channels.
CoRR, 2015

Pairwise Secret Key Agreement based on Location-derived Common Randomness.
CoRR, 2015

SHIELD: a data verification framework for participatory sensing systems.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Scaling VANET security through cooperative message verification.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

Resilient Collaborative Privacy for Location-Based Services.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

GNSS receiver tracking performance analysis under distance-decreasing attacks.
Proceedings of the International Conference on Location and GNSS, 2015

Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocation.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration.
IEEE Trans. Dependable Secur. Comput., 2014

SPPEAR: security & privacy-preserving architecture for participatory-sensing applications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Towards deploying a scalable & robust vehicular identity and credential management infrastructure.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Trustworthy People-Centric Sensing: Privacy, security and user incentives road-map.
Proceedings of the 13th Annual Mediterranean Ad Hoc Networking Workshop, 2014

Colluding eavesdroppers in large cooperative wireless networks.
Proceedings of the Iran Workshop on Communication and Information Theory, 2014

Active adversaries from an information-theoretic perspective: Data modification attacks.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Scaling laws for secrecy capacity in cooperative wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2013

Formal Analysis of Secure Neighbor Discovery in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2013

Constrained Colluding Eavesdroppers: An Information-Theoretic Model.
CoRR, 2013

Towards a secure and privacy-preserving multi-service vehicular architecture.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

SEROSA: SERvice oriented security architecture for Vehicular Communications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

On secret key generation through multipath for wireless networks.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Allocating adversarial resources in wireless networks.
Proceedings of the 21st European Signal Processing Conference, 2013

2012
On Secure and Precise IR-UWB Ranging.
IEEE Trans. Wirel. Commun., 2012

Smartphone-based traffic information system for sustainable cities.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2012

Key splitting for random key distribution schemes.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Stealthy pre-attacks against random key pre-distribution security.
Proceedings of IEEE International Conference on Communications, 2012

2011
Secure Vehicular Communication Systems.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures.
IEEE Trans. Wirel. Commun., 2011

On the Performance of Secure Vehicular Communication Systems.
IEEE Trans. Dependable Secur. Comput., 2011

ACM WiSec 2011 poster and demo session.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Secure neighbor position discovery in vehicular networks.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

Collaborative Location Privacy.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Resilient data aggregation for unattended WSNs.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

A mobile world of security - The model.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

2010
Design and Performance of Secure Geocast for Vehicular Communication.
IEEE Trans. Veh. Technol., 2010

A randomized countermeasure against parasitic adversaries in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2010

Secure Neighbor Position Discovery in VANETs
CoRR, 2010

GNSS-based positioning: Attacks and Countermeasures
CoRR, 2010

Effectiveness of distance-decreasing attacks against impulse radio ranging.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Castor: Scalable Secure Routing for Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

10402 Report - Working Group on Security and Privacy.
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010

2009
VANET Connectivity Analysis
CoRR, 2009

Wireless Sensor Networking for Rain-fed Farming Decision Support
CoRR, 2009

Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation.
IEEE Commun. Mag., 2009

A practical secure neighbor verification protocol for wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Adaptive message authentication for vehicular networks.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Privacy-Preserving Relationship Path Discovery in Social Networks.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
TraNS: realistic joint traffic and network simulator for VANETs.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

Report on the "secure vehicular communications: results and challenges ahead" workshop.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

Efficient and Robust Secure Aggregation for Sensor Networks
CoRR, 2008

Impact of Vehicular Communications Security on Transportation Safety
CoRR, 2008

Secure neighborhood discovery: a fundamental element for mobile ad hoc networking.
IEEE Commun. Mag., 2008

Secure vehicular communication systems: design and architecture.
IEEE Commun. Mag., 2008

Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Commun. Mag., 2008

Secure and Privacy-Enhancing Vehicular Communication: Demonstration of Implementation and Operation.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Fast Exclusion of Errant Devices from Vehicular Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Wireless sensor networking for rain-fed farming decision support.
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions, 2008

Certificate revocation list distribution in vehicular communication systems.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008

On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

"On the Road" - Reflections on the security of Vehicular communication systems.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2008

Towards provable secure neighbor discovery in wireless networks.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

Secure neighbor discovery in wireless networks: formal investigation of possibility.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks.
IEEE J. Sel. Areas Commun., 2007

Secure Position-Based Routing for VANETs.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Efficient and robust pseudonymous authentication in VANET.
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007

Efficient and Adjustable Recipient Anonymity in Mobile Ad Hoc Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

2006
Securing Vehicular Communications.
IEEE Wirel. Commun., 2006

Secure data communication in mobile ad hoc networks.
IEEE J. Sel. Areas Commun., 2006

A Cross Layer Design of IEEE 802.15.4 MAC Protocol.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Impact of Pseudonym Changes on Geographic Routing in VANETs.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

Secure ad hoc networking.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
A bandwidth sharing approach to improve licensed spectrum utilization.
IEEE Commun. Mag., 2005

Securing Ad Hoc Networks.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

2004
Securing Mobile Ad Hoc Networks.
Proceedings of the Mobile Computing Handbook., 2004

2003
Secure message transmission in mobile ad hoc networks.
Ad Hoc Networks, 2003

Secure data transmission in mobile ad hoc networks.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Secure Link State Routing for Mobile Ad Hoc Networks.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

2002
Securing the Internet routing infrastructure.
IEEE Commun. Mag., 2002

Path set selection in mobile ad hoc networks.
Proceedings of the 3rd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2002


  Loading...