Luigi Vincenzo Mancini
Titolo
Citata da
Citata da
Anno
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
13532008
Random key-assignment for secure wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
3972003
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
2892007
Proving program termination
B Cook, A Podelski, A Rybalchenko
Communications of the ACM 54 (5), 88-98, 2011
223*2011
Distributed detection of clone attacks in wireless sensor networks
M Conti, R Di Pietro, L Mancini, A Mei
IEEE transactions on dependable and secure computing 8 (5), 685-698, 2010
2162010
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
R Di Pietro, LV Mancini, YW Law, S Etalle, P Havinga
2003 International Conference on Parallel Processing Workshops, 2003 …, 2003
2082003
Intrusion detection systems
R Di Pietro, LV Mancini
Springer Science & Business Media, 2008
1712008
A graph-based formalism for RBAC
M Koch, LV Mancini, F Parisi-Presicce
ACM Transactions on Information and System Security (TISSEC) 5 (3), 332-365, 2002
1662002
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici
International Journal of Security and Networks 10 (3), 137-150, 2015
1512015
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1452008
Remus: a security-enhanced operating system
M Bernaschi, E Gabrielli, LV Mancini
ACM Transactions on Information and System Security (TISSEC) 5 (1), 36-61, 2002
1432002
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
1392015
Fault-tolerant rate-monotonic first-fit scheduling in hard-real-time systems
AA Bertossi, LV Mancini, F Rossini
IEEE Transactions on Parallel and Distributed Systems 10 (9), 934-945, 1999
1381999
pDCS: Security and privacy support for data-centric sensor networks
M Shao, S Zhu, W Zhang, G Cao, Y Yang
IEEE Transactions on Mobile Computing 8 (8), 1023-1038, 2008
1292008
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the first ACM conference on Wireless network security, 214-219, 2008
1122008
Operating system enhancements to prevent the misuse of system calls
M Bernaschi, E Gabrielli, LV Mancini
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1072000
Redoubtable sensor networks
R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan
ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-22, 2008
1042008
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Wireless Networks 12 (6), 709-721, 2006
1012006
Secure dynamic fragment and replica allocation in large-scale distributed file systems
A Mei, LV Mancini, S Jajodia
IEEE Transactions on Parallel and Distributed systems 14 (9), 885-896, 2003
1012003
Towards a formal model for security policies specification and validation in the selinux system
G Zanin, LV Mancini
Proceedings of the ninth ACM symposium on Access control models and …, 2004
1002004
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20