Panagiotis Papadimitratos

According to our database1, Panagiotis Papadimitratos authored at least 132 papers between 2002 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems.
IEEE Trans. Intelligent Transportation Systems, 2018

Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs.
CoRR, 2018

VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure.
CoRR, 2018

Analysis of the Effect of the Distance-Decreasing Attacks on GNSS Authenticated Signals.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Privacy Preservation through Uniformity.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Expedited Beacon Verification for VANET.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Towards Battery-free Radio Tomographic Imaging.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Security on Harvested Power.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Hardened Registration Process for Participatory Sensing.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

On the capacity of Gaussian "dirty" Z-interference channel with common state.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

2017
Secrecy Capacity Scaling in Large Cooperative Wireless Networks.
IEEE Trans. Information Theory, 2017

SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things.
Future Generation Comp. Syst., 2017

RHyTHM: A Randomized Hybrid Scheme To Hide in the Mobile Crowd.
CoRR, 2017

CLIMEX: A Wireless Physical Layer Security Protocol Based on Clocked Impulse Exchanges.
CoRR, 2017

SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems.
CoRR, 2017

Preserving Confidentiality in The Gaussian Broadcast Channel Using Compute-and-Forward.
CoRR, 2017

Toward a Taxonomy and Attacker Model for Secure Routing Protocols.
Computer Communication Review, 2017

Bloom filter based certificate validation for VANET: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Resilient privacy protection for location-based services through decentralization.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

RHyTHM: A randomized hybrid scheme to hide in the mobile crowd.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Optimal secure partial-repair in distributed storage systems.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
2D Hash Chain robust Random Key Distribution scheme.
Inf. Process. Lett., 2016

Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems.
IEEE Internet of Things Journal, 2016

Secure Estimation and Zero-Error Secrecy Capacity.
CoRR, 2016

Uncertain Wiretap Channels and Secure Estimation.
CoRR, 2016

Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel.
CoRR, 2016

Evaluating On-demand Pseudonym Acquisition Policies in Vehicular Communication Systems.
CoRR, 2016

The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems.
CoRR, 2016

Towards Deploying a Scalable & Robust Vehicular Identity and Credential Management Infrastructure.
CoRR, 2016

Security in The Gaussian Interference Channel: Weak and Moderately Weak Interference Regimes.
CoRR, 2016

Proactive certificate validation for VANETs.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Evaluating on-demand pseudonym acquisition policies in vehicular communication systems.
Proceedings of the First International Workshop on Internet of Vehicles and Vehicles of Internet, 2016

Android privacy C(R)ache: reading your external storage and sensors for fun and profit.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

Uncertain wiretap channels and secure estimation.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Security in the Gaussian interference channel: Weak and moderately weak interference regimes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Secure estimation for unstable systems.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Security on Wheels: Security and Privacy for Vehicular Communication Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems.
IEEE Trans. Intelligent Transportation Systems, 2015

Key splitting: making random key distribution schemes resistant against node capture.
Security and Communication Networks, 2015

Frequency hopping does not increase anti-jamming resilience of wireless channels.
CoRR, 2015

Pairwise Secret Key Agreement based on Location-derived Common Randomness.
CoRR, 2015

Key Agreement over an Interference Channel with Noiseless Feedback: Achievable Region & Distributed Allocation.
CoRR, 2015

Finite-SNR Regime Analysis of The Gaussian Wiretap Multiple-Access Channel.
CoRR, 2015

SHIELD: a data verification framework for participatory sensing systems.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Scaling VANET security through cooperative message verification.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

Resilient Collaborative Privacy for Location-Based Services.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

GNSS receiver tracking performance analysis under distance-decreasing attacks.
Proceedings of the International Conference on Location and GNSS, 2015

Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocation.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration.
IEEE Trans. Dependable Sec. Comput., 2014

Active Adversaries from an Information-Theoretic Perspective: Data Modification Attacks.
CoRR, 2014

SPPEAR: security & privacy-preserving architecture for participatory-sensing applications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Towards deploying a scalable & robust vehicular identity and credential management infrastructure.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Trustworthy People-Centric Sensing: Privacy, security and user incentives road-map.
Proceedings of the 13th Annual Mediterranean Ad Hoc Networking Workshop, 2014

Colluding eavesdroppers in large cooperative wireless networks.
Proceedings of the Iran Workshop on Communication and Information Theory, 2014

Active adversaries from an information-theoretic perspective: Data modification attacks.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Scaling laws for secrecy capacity in cooperative wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2013

Formal Analysis of Secure Neighbor Discovery in Wireless Networks.
IEEE Trans. Dependable Sec. Comput., 2013

Constrained Colluding Eavesdroppers: An Information-Theoretic Model.
CoRR, 2013

Scaling Laws for Secrecy Capacity in Cooperative Wireless Networks.
CoRR, 2013

Towards a secure and privacy-preserving multi-service vehicular architecture.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

SEROSA: SERvice oriented security architecture for Vehicular Communications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

On secret key generation through multipath for wireless networks.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Allocating adversarial resources in wireless networks.
Proceedings of the 21st European Signal Processing Conference, 2013

2012
On Secure and Precise IR-UWB Ranging.
IEEE Trans. Wireless Communications, 2012

Smartphone-based traffic information system for sustainable cities.
Mobile Computing and Communications Review, 2012

Key splitting for random key distribution schemes.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Stealthy pre-attacks against random key pre-distribution security.
Proceedings of IEEE International Conference on Communications, 2012

2011
Secure Vehicular Communication Systems.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures.
IEEE Trans. Wireless Communications, 2011

On the Performance of Secure Vehicular Communication Systems.
IEEE Trans. Dependable Sec. Comput., 2011

ACM WiSec 2011 poster and demo session.
Mobile Computing and Communications Review, 2011

Secure neighbor position discovery in vehicular networks.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

Collaborative Location Privacy.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Resilient data aggregation for unattended WSNs.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

A mobile world of security - The model.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

2010
Design and Performance of Secure Geocast for Vehicular Communication.
IEEE Trans. Vehicular Technology, 2010

A randomized countermeasure against parasitic adversaries in wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2010

Secure Neighbor Position Discovery in VANETs
CoRR, 2010

Effectiveness of distance-decreasing attacks against impulse radio ranging.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Castor: Scalable Secure Routing for Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

10402 Report - Working Group on Security and Privacy.
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010

2009
VANET Connectivity Analysis
CoRR, 2009

Wireless Sensor Networking for Rain-fed Farming Decision Support
CoRR, 2009

How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
CoRR, 2009

Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges
CoRR, 2009

Secure Vehicular Communication Systems: Design and Architecture
CoRR, 2009

"On the Road" - Reflections on the Security of Vehicular Communication Systems
CoRR, 2009

Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation.
IEEE Communications Magazine, 2009

A practical secure neighbor verification protocol for wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Adaptive message authentication for vehicular networks.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Privacy-Preserving Relationship Path Discovery in Social Networks.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
TraNS: realistic joint traffic and network simulator for VANETs.
Mobile Computing and Communications Review, 2008

Report on the "secure vehicular communications: results and challenges ahead" workshop.
Mobile Computing and Communications Review, 2008

Efficient and Robust Secure Aggregation for Sensor Networks
CoRR, 2008

Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility
CoRR, 2008

Impact of Vehicular Communications Security on Transportation Safety
CoRR, 2008

Report on the "Secure Vehicular Communications: Results and Challenges Ahead" Workshop
CoRR, 2008

GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
CoRR, 2008

Towards Provable Secure Neighbor Discovery in Wireless Networks
CoRR, 2008

Secure neighborhood discovery: a fundamental element for mobile ad hoc networking.
IEEE Communications Magazine, 2008

Secure vehicular communication systems: design and architecture.
IEEE Communications Magazine, 2008

Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Communications Magazine, 2008

Secure and Privacy-Enhancing Vehicular Communication: Demonstration of Implementation and Operation.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Fast Exclusion of Errant Devices from Vehicular Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Wireless sensor networking for rain-fed farming decision support.
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions, 2008

Certificate revocation list distribution in vehicular communication systems.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008

On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Towards provable secure neighbor discovery in wireless networks.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

Secure neighbor discovery in wireless networks: formal investigation of possibility.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks.
IEEE Journal on Selected Areas in Communications, 2007

Secure Position-Based Routing for VANETs.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Efficient and robust pseudonymous authentication in VANET.
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007

Efficient and Adjustable Recipient Anonymity in Mobile Ad Hoc Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

2006
Securing Vehicular Communications.
IEEE Wireless Commun., 2006

Secure data communication in mobile ad hoc networks.
IEEE Journal on Selected Areas in Communications, 2006

A Cross Layer Design of IEEE 802.15.4 MAC Protocol.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Impact of Pseudonym Changes on Geographic Routing in VANETs.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
A bandwidth sharing approach to improve licensed spectrum utilization.
IEEE Communications Magazine, 2005

Securing Ad Hoc Networks.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

2004
Securing Mobile Ad Hoc Networks.
Proceedings of the Mobile Computing Handbook., 2004

2003
Secure message transmission in mobile ad hoc networks.
Ad Hoc Networks, 2003

Secure data transmission in mobile ad hoc networks.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Secure Link State Routing for Mobile Ad Hoc Networks.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

2002
Path set selection in mobile ad hoc networks.
Proceedings of the 3rd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2002


  Loading...