CONTI, MAURO

CONTI, MAURO  

Dipartimento di Matematica "Tullio Levi-Civita" - DM  

Mostra records
Risultati 1 - 20 di 387 (tempo di esecuzione: 0.064 secondi).
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
Secure Cooperative Channel Establishment in Wireless Sensor Networks 2006 CONTI, MAURODI PIETRO, ROBERTOMancini LV - - Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW) - Workshop on Pervasive Computing and Communication Security
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN. 2006 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics (SMC '06), Special Session on Wireless Sensor Networks.
RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy 2007 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW) - Workshop on Pervasive Computing and Communication Security
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. 2007 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007),
ECCE: Enhanced Cooperative Channel Establishment for secure pair-wise communication in Wireless Sensor Networks. 2007 CONTI, MAURODI PIETRO, ROBERTO + AD HOC NETWORKS - -
FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization. 2007 CONTI, MAURODI PIETRO, ROBERTO + - - PROCEEDINGS OF THE 33TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY (IECON 07)
Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks 2008 CONTI, MAURODI PIETRO, ROBERTO + - - Proceedings of the First ACM Conference on Wireless Network Security (WiSec 2008)
Securely Computing an Approximate Median in Wireless Sensor Networks 2008 CONTI, MAURO + - - Proceedings of the Fourth International Conference on Security and Privacy in Communication Networks (SecureComm 2008)
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs 2009 CONTI, MAURODI PIETRO, ROBERTO + EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING - -
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN 2009 CONTI, MAURODI PIETRO, ROBERTO + LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL INFORMATICS AND TELECOMMUNICATIONS ENGINEERING - Proceedings of the Fifth International Conference on Security and Privacy in Communication Networks(ICST SecureComm 2009)
Secure Median Computation in Wireless Sensor Networks 2009 CONTI, MAURO + AD HOC NETWORKS - -
Distributed Data Source Verification in Wireless Sensor Networks 2009 CONTI, MAURODI PIETRO, ROBERTO + INFORMATION FUSION - -
Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks 2009 CONTI, MAURODI PIETRO, ROBERTO + SECURITY AND COMMUNICATION NETWORKS - -
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks 2009 CONTI, MAURODI PIETRO, ROBERTO + LECTURE NOTES IN COMPUTER SCIENCE - Proceedings of the Seventh International Conference on Wired / Wireless Internet Communications(WWIC 2009)
eRIPP-FS: Enforcing Privacy and Security in RFID 2010 CONTI, MAURODI PIETRO, ROBERTO + SECURITY AND COMMUNICATION NETWORKS - -
User authentication method for access to a mobile user terminal and corresponding mobile user terminal 2010 CONTI, MAURO + - - -
Time Warp: How Time Affects Privacy in LBSs 2010 DI PIETRO, ROBERTOCONTI, MAURO + LECTURE NOTES IN COMPUTER SCIENCE - Information and Communications Security: 12th International Conference: ICICS 2010: Proceedings
Censorship-Resilient Communications Throughout Information Scattering 2010 CONTI, MAURO + LECTURE NOTES IN COMPUTER SCIENCE - Proceedings of the Eighteenth International Workshop on Security Protocols
Censorship-Resilient Communications Throughout Information Scattering (Transcript of Discussion) 2010 CONTI, MAURO LECTURE NOTES IN COMPUTER SCIENCE - Lecture Notes in Computer Science - Security Protocols XIIX
CED2: Communication Efficient Disjointness Decision 2010 CONTI, MAURODI PIETRO, ROBERTO + LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL INFORMATICS AND TELECOMMUNICATIONS ENGINEERING - Proceedings of the Sixth International Conference on Security and Privacy in Communication Networks(ICST SecureComm 2010)