Claudio Soriente
Orcid: 0000-0002-8215-5457
According to our database1,
Claudio Soriente
authored at least 80 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The SPATIAL Architecture: Design and Development Experiences from Gauging and Monitoring the AI Inference Capabilities of Modern Applications.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
IACR Cryptol. ePrint Arch., 2023
LISA: LIghtweight single-server Secure Aggregation with a public source of randomness.
CoRR, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols.
IEEE Trans. Dependable Secur. Comput., 2021
Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions.
Proc. Priv. Enhancing Technol., 2021
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Monitoring Performance Metrics is not Enough to Detect Side-Channel Attacks on Intel SGX.
CoRR, 2020
2019
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Adv. Math. Commun., 2017
Who is Fiddling with Prices?: Building and Deploying a Watchdog Service for E-commerce.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017
2016
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms.
CoRR, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
2013
IEEE Trans. Mob. Comput., 2013
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI).
IEEE Trans. Inf. Forensics Secur., 2013
Ad Hoc Networks, 2013
Proceedings of the SPSM'13, 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Data Eng. Bull., 2012
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Pervasive Mob. Comput., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
IEEE Netw., 2009
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptol. ePrint Arch., 2008
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the Information Security, 11th International Conference, 2008
2007
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata.
J. Syst. Softw., 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2004