Roberto Di Pietro

According to our database1, Roberto Di Pietro
  • authored at least 181 papers between 2002 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling.
IEEE Trans. Dependable Sec. Comput., 2018

A Spark is Enough in a Straw World: a Study of Websites Password Management in the Wild.
CoRR, 2018

Docker ecosystem - Vulnerability Analysis.
Computer Communications, 2018

A blockchain-based Trust System for the Internet of Things.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

2017
Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results.
J. Network and Computer Applications, 2017

Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling.
CoRR, 2017

The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race.
CoRR, 2017

Enabling broadcast communications in presence of jamming via probabilistic pairing.
Computer Networks, 2017

The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

HyBIS: Advanced Introspection for Effective Windows Guest Protection.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT.
Proceedings of the IEEE International Conference on Communications, 2017

CoLLIDE: CLoud Latency-based IDEntification.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

2016
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware.
IEEE Trans. Mob. Comput., 2016

CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix.
ACM Trans. Embedded Comput. Syst., 2016

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments.
IEEE Trans. Dependable Sec. Comput., 2016

DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection.
IEEE Intelligent Systems, 2016

Social Fingerprinting - or the Truth About You.
ERCIM News, 2016

HyBIS: Windows Guest Protection through Advanced Memory Introspection.
CoRR, 2016

DNA-inspired online behavioral modeling and its application to spambot detection.
CoRR, 2016

Proof of ownership for deduplication systems: A secure, scalable, and efficient solution.
Computer Communications, 2016

CURE - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments.
Computer Communications, 2016

Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel.
Computer Networks, 2016

To Docker or Not to Docker: A Security Perspective.
IEEE Cloud Computing, 2016

Logical key hierarchy for groups management in Distributed Online Social Network.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
Privacy for LBSs: On Using a Footprint Model to Face the Enemy.
Proceedings of the Advanced Research in Data Privacy, 2015

Provable Storage Medium for Data Storage Outsourcing.
IEEE Trans. Services Computing, 2015

Silence is Golden: Exploiting Jamming and Radio Silence to Communicate.
ACM Trans. Inf. Syst. Secur., 2015

AntiCheetah: Trustworthy computing in an outsourced (cheating) environment.
Future Generation Comp. Syst., 2015

EXPEDITE: EXPress closED ITemset Enumeration.
Expert Syst. Appl., 2015

Fame for sale: Efficient detection of fake Twitter followers.
Decision Support Systems, 2015

The impact of GPU-assisted malware on memory forensics: A case study.
Digital Investigation, 2015

Fame for sale: efficient detection of fake Twitter followers.
CoRR, 2015

CloRoFor: Cloud Robust Forensics.
CoRR, 2015

ESC: An efficient, scalable, and crypto-less solution to secure wireless networks.
Computer Networks, 2015

Freedom of speech: thwarting jammers via a probabilistic approach.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

VISIO: A Visual Approach for Singularity Detection in Recommendation Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Visual detection of singularities in review platforms.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

2014
Clone wars: Distributed detection of clone attacks in mobile WSNs.
J. Comput. Syst. Sci., 2014

CloRExPa: Cloud resilience via execution path analysis.
Future Generation Comp. Syst., 2014

Discriminating Between the Wheat and the Chaff in Online Recommendation Systems.
ERCIM News, 2014

Thwarting Obfuscated Malware via Differential Fault Analysis.
IEEE Computer, 2014

Security in wireless ad-hoc networks - A survey.
Computer Communications, 2014

Smart health: A context-aware health paradigm within smart cities.
IEEE Communications Magazine, 2014

A Lot of Slots - Outliers Confinement in Review-Based Systems.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments.
Proceedings of the SECRYPT 2014, 2014

SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

A Criticism to Society (As Seen by Twitter Analytics).
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

A tunable proof of ownership scheme for deduplication using Bloom filters.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
United We Stand: Intrusion Resilience in Mobile Unattended WSNs.
IEEE Trans. Mob. Comput., 2013

COKE Crypto-Less Over-the-Air Key Establishment.
IEEE Trans. Information Forensics and Security, 2013

Preserving privacy against external and internal threats in WSN data aggregation.
Telecommunication Systems, 2013

Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems.
IEEE Systems Journal, 2013

Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps.
Pervasive and Mobile Computing, 2013

Jamming mitigation in cognitive radio networks.
IEEE Network, 2013

Windows Mobile LiveSD Forensics.
J. Network and Computer Applications, 2013

Silence is Golden: exploiting jamming and radio silence to communicate.
CoRR, 2013

Mapping the File Systems Genome: rationales, technique, results and applications.
CoRR, 2013

CUDA Leaks: Information Leakage in GPU Architectures.
CoRR, 2013

Titans' revenge: Detecting Zeus via its own flaws.
Computer Networks, 2013

Track me if you can: Transparent obfuscation for Location based Services.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Data confidentiality and availability via secret sharing and node mobility in UWSN.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

CREPUSCOLO: A collusion resistant privacy preserving location verification system.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Self-healing in unattended wireless sensor networks.
TOSN, 2012

Visual Role Mining: A Picture Is Worth a Thousand Roles.
IEEE Trans. Knowl. Data Eng., 2012

A business-driven decomposition methodology for role mining.
Computers & Security, 2012

Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Secure Cloud Browser: Model and Architecture to Support Secure WEB Navigation.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
Proceedings of the Security Protocols XX, 2012

PRISM - Privacy-Preserving Search in MapReduce.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Preserving Query Privacy in Urban Sensing Systems.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Wireless Sensor Replica Detection in Mobile Environments.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Boosting efficiency and security in proof of ownership for deduplication.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Robust and efficient authentication of video stream broadcasting.
ACM Trans. Inf. Syst. Secur., 2011

Distributed Detection of Clone Attacks in Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2011

Secure topology maintenance and events collection in WSNs.
Security and Communication Networks, 2011

Intrusion-resilient integrity in data-centric unattended WSNs.
Pervasive and Mobile Computing, 2011

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems.
J. Network and Computer Applications, 2011

Secure virtualization for cloud computing.
J. Network and Computer Applications, 2011

CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.
Int. J. Inf. Sec., 2011

PRISM - Privacy-Preserving Search in MapReduce.
IACR Cryptology ePrint Archive, 2011

"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation.
EURASIP J. Wireless Comm. and Networking, 2011

A new role mining framework to elicit business roles and to mitigate enterprise risk.
Decision Support Systems, 2011

Cross-border co-operation and education in digital investigations: A European perspective.
Digital Investigation, 2011

Location privacy and resilience in wireless sensor networks querying.
Computer Communications, 2011

Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Events privacy in WSNs: A new model and its application.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Epidemic data survivability in unattended wireless sensor networks.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Taming Zeus by leveraging its own crypto internals.
Proceedings of the 2011 eCrime Researchers Summit, 2011

2010
eRIPP-FS: Enforcing privacy and security in RFID.
Security and Communication Networks, 2010

Hierarchies of keys in secure multicast communications.
Journal of Computer Security, 2010

Concise: Compressed 'n' Composable Integer Set.
Inf. Process. Lett., 2010

CONCISE: Compressed 'n' Composable Integer Set
CoRR, 2010

Taming role mining complexity in RBAC.
Computers & Security, 2010

Securing Mobile Unattended WSNs against a Mobile Adversary.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

CReW: Cloud Resilience for Windows Guests through Monitored Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

CED2: Communication Efficient Disjointness Decision.
Proceedings of the Security and Privacy in Communication Networks, 2010

Mining Business-Relevant RBAC States through Decomposition.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Transparent security for cloud.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

ABBA: adaptive bicluster-based approach to impute missing values in binary matrices.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

Intrusion-Resilience in Mobile Unattended WSNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Event Handoff Unobservability in WSN.
Proceedings of the Open Research Problems in Network Security, 2010

Time Warp: How Time Affects Privacy in LBSs.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Evaluating the Risk of Adopting RBAC Roles.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

A Security Management Architecture for the Protection of Kernel Virtual Machines.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Data Security in Unattended Wireless Sensor Networks.
IEEE Trans. Computers, 2009

Confidentiality and integrity for data aggregation in WSN using peer monitoring.
Security and Communication Networks, 2009

Privacy-preserving robust data aggregation in wireless sensor networks.
Security and Communication Networks, 2009

Distributed data source verification in wireless sensor networks.
Information Fusion, 2009

Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
EURASIP J. Wireless Comm. and Networking, 2009

The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack
CoRR, 2009

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

Collaborative authentication in unattended WSNs.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009

A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.
Proceedings of the Emerging Challenges for Security, 2009

Mining Stable Roles in RBAC.
Proceedings of the Emerging Challenges for Security, 2009

A formal framework to elicit roles with business meaning in RBAC systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

KvmSec: a security extension for Linux kernel virtual machines.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Redoubtable Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Maximizing service availability for secure satellite broadcasting.
Int. J. Satellite Communications Networking, 2008

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptology ePrint Archive, 2008

Scalable and Efficient Provable Data Possession.
IACR Cryptology ePrint Archive, 2008

An Activity-Based Model for Separation of Duty
CoRR, 2008

A mechanism to enforce privacy in vehicle-to-infrastructure communication.
Computer Communications, 2008

RFID security and privacy: long-term research or short-term tinkering?
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Scalable and efficient provable data possession.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Leveraging Lattices to Improve Role Mining.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Live Digital Forensic system for Windows networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A cost-driven approach to role engineering.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Gossip-based aggregate computation: computing faster with non address-oblivious schemes.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008

Information Assurance in Critical Infrastructures via Wireless Sensor Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Robust RSA distributed signatures for large-scale long-lived ad hoc networks.
Journal of Computer Security, 2007

Efficient and Adaptive Threshold Signatures for Ad hoc networks.
Electr. Notes Theor. Comput. Sci., 2007

ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007

Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

Secure k-Connectivity Properties of Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Towards threat-adaptive dynamic fragment replication in large scale distributed systems.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Information Confinement, Privacy, and Security in RFID Systems.
Proceedings of the Computer Security, 2007

2006
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks.
Wireless Networks, 2006

Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006

Sensor Networks that Are Provably Resilient.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Secure Cooperative Channel Establishment inWireless Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

A formal framework for the performance analysis of P2P networks protocols.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Addressing the shortcomings of one-way chains.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

A methodology for P2P file-sharing traffic detection.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005

2004
Key management for high bandwidth secure multicast.
Journal of Computer Security, 2004

Connectivity properties of secure wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2.
Proceedings of the Wireless On-Demand Network Systems, First IFIP TC6 Working Conference, 2004

BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

2003
Security and privacy issues of handheld and wearable wireless devices.
Commun. ACM, 2003

Providing secrecy in key management protocols for large wireless sensors networks.
Ad Hoc Networks, 2003

A Reliable Key Authentication Schema for Secure Multicast Communications.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

A Time Driven Methodology for Key Dimensioning in Multicast Communications.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Random key-assignment for secure Wireless Sensor Networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

2002
Secure Selective Exclusion in Ad Hoc Wireless Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Efficient and secure keys management for wireless mobile communications.
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002

Formal Specification for Fast Automatic IDS Training.
Proceedings of the Formal Aspects of Security, First International Conference, 2002


  Loading...