CONTI, MAURO

CONTI, MAURO  

Dipartimento di Matematica "Tullio Levi-Civita" - DM  

Mostra records
Risultati 1 - 20 di 371 (tempo di esecuzione: 0.027 secondi).
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN. 2006 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics (SMC '06), Special Session on Wireless Sensor Networks.
Secure Cooperative Channel Establishment in Wireless Sensor Networks 2006 CONTI, MAURODI PIETRO, ROBERTOMancini LV - - Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW) - Workshop on Pervasive Computing and Communication Security
RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy 2007 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW) - Workshop on Pervasive Computing and Communication Security
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization. 2007 CONTI, MAURODI PIETRO, ROBERTO + - - PROCEEDINGS OF THE 33TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY (IECON 07)
ECCE: Enhanced Cooperative Channel Establishment for secure pair-wise communication in Wireless Sensor Networks. 2007 CONTI, MAURODI PIETRO, ROBERTO + AD HOC NETWORKS - -
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. 2007 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007),
Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks 2008 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the First ACM Conference on Wireless Network Security (WiSec 2008)
Securely Computing an Approximate Median in Wireless Sensor Networks 2008 CONTI, MAURO + - - Proceedings of the Fourth International Conference on Security and Privacy in Communication Networks (SecureComm 2008)
Distributed Data Source Verification in Wireless Sensor Networks 2009 CONTI, MAURODI PIETRO, ROBERTO + INFORMATION FUSION - -
Secure Median Computation in Wireless Sensor Networks 2009 CONTI, MAURO + AD HOC NETWORKS - -
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks 2009 CONTI, MAURODI PIETRO, ROBERTO + LECTURE NOTES IN COMPUTER SCIENCE - Proceedings of the Seventh International Conference on Wired / Wireless Internet Communications(WWIC 2009)
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN 2009 CONTI, MAURODI PIETRO, ROBERTO + LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL INFORMATICS AND TELECOMMUNICATIONS ENGINEERING - Proceedings of the Fifth International Conference on Security and Privacy in Communication Networks(ICST SecureComm 2009)
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks 2009 CONTI, MAURODI PIETRO, ROBERTO + SECURITY AND COMMUNICATION NETWORKS - -
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs 2009 CONTI, MAURODI PIETRO, ROBERTO + EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING - -
Censorship-Resilient Communications Throughout Information Scattering (Transcript of Discussion) 2010 CONTI, MAURO LECTURE NOTES IN COMPUTER SCIENCE - Lecture Notes in Computer Science - Security Protocols XIIX
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance 2010 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (IEEE TSP 2010)
CED2: Communication Efficient Disjointness Decision 2010 CONTI, MAURODI PIETRO, ROBERTO + LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL INFORMATICS AND TELECOMMUNICATIONS ENGINEERING - Proceedings of the Sixth International Conference on Security and Privacy in Communication Networks(ICST SecureComm 2010)
User authentication method for access to a mobile user terminal and corresponding mobile user terminal 2010 CONTI, MAURO + - - -
eRIPP-FS: Enforcing Privacy and Security in RFID 2010 CONTI, MAURODI PIETRO, ROBERTO + SECURITY AND COMMUNICATION NETWORKS - -
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks 2010 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications(IEEE TSP 2010)