Gianluca Dini
Orcid: 0000-0002-6029-5467Affiliations:
- University of Pisa, Italy
According to our database1,
Gianluca Dini
authored at least 140 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Comput. Electr. Eng., 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Internet Things J., 2022
Proceedings of the 4th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks.
J. Comput. Virol. Hacking Tech., 2021
SAPIENT: Enabling Real-Time Monitoring and Control in the Future Communication Infrastructure of Air Traffic Management.
IEEE Trans. Intell. Transp. Syst., 2021
Performance Evaluation of Attribute-Based Encryption in Automotive Embedded Platform for Secure Software Over-The-Air Update.
Sensors, 2021
SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks.
J. Inf. Secur. Appl., 2021
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware.
Int. J. Inf. Sec., 2021
SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks.
CoRR, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
2020
MeSmart-Pro: Advanced Processing at the Edge for Smart Urban Monitoring and Reconfigurable Services.
J. Sens. Actuator Networks, 2020
CYBERWISER.eu: Innovative Cyber Range Platform for Cybersecurity Training in Industrial Systems.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020
Comput. Commun., 2020
Comput. Commun., 2020
Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
DISH: DIstributed SHuffling Against Selective Jamming Attack in IEEE 802.15.4e TSCH Networks.
ACM Trans. Sens. Networks, 2019
Proceedings of the IEEE International Conference on Smart Computing, 2019
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems.
Proceedings of the IEEE International Conference on Smart Computing, 2019
BRUSCHETTA: An IoT Blockchain-Based Framework for Certifying Extra Virgin Olive Oil Supply Chain.
Proceedings of the IEEE International Conference on Smart Computing, 2019
Virtual private ledgers: embedding private distributed ledgers over a public blockchain by cryptography.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019
2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the 14th Annual Conference on Wireless On-demand Network Systems and Services, 2018
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Dependable Secur. Comput., 2017
Kassandra: A framework for distributed simulation of heterogeneous cooperating objects.
J. Syst. Archit., 2017
Int. J. Ad Hoc Ubiquitous Comput., 2017
IEEE Commun. Lett., 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Secure Positioning in Wireless Sensor Networks through Enlargement Miscontrol Detection.
ACM Trans. Sens. Networks, 2016
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016
Using AUTOSAR High-Level Specifications for the Synthesis of Security Components in Automotive Systems.
Proceedings of the Modelling and Simulation for Autonomous Systems, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
2015
Robotics Auton. Syst., 2015
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015
Proceedings of the Computer Safety, Reliability, and Security, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
2014
Wirel. Networks, 2014
On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding.
IEEE Commun. Lett., 2014
Comput. Commun., 2014
Proceedings of the Sensor Systems and Software - 5th International Conference, 2014
Proceedings of the Modelling and Simulation for Autonomous Systems, 2014
Proceedings of the IEEE Symposium on Computers and Communications, 2014
2013
IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-642-37368-8, 2013
J. Organ. End User Comput., 2013
Mobile Underwater Sensor Networks for Protection and Security: Field Experience at the UAN11 Experiment.
J. Field Robotics, 2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013
STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming.
Proceedings of the SENSORNETS 2013, 2013
Proceedings of 4th International Workshop on Networks of Cooperating Objects for Smart Cities 2013, 2013
SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks.
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network.
Sensors, 2012
Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network.
Ad Hoc Networks, 2012
LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks.
Ad Hoc Networks, 2012
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
2011
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks.
ACM Trans. Embed. Comput. Syst., 2011
RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks.
Pers. Ubiquitous Comput., 2011
LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Ambient Systems, 2011
Neighbourhood monitoring for decentralised coordination in multi-agent systems: A case-study.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Proceedings of the Distributed Computing in Sensor Systems, 2011
2010
Int. J. Wirel. Inf. Networks, 2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
A reputation-based approach to tolerate misbehaving carriers in Delay Tolerant Networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
RiSeG: A logical ring based secure group communication protocol for Wireless Sensor Networks.
Proceedings of the International Conference on Wireless and Ubiquitous Systems , 2010
2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
2008
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008
Proceedings of the Wireless Sensor Networks, 5th European Conference, 2008
Proceedings of the Distributed Computing in Sensor Systems, 2008
2007
Eur. J. Control, 2007
A methodology for verification of digital items in fair exchange protocols with active trustee.
Electron. Commer. Res., 2007
Improving authentication of remote card transactions with mobile personal trusted devices.
Comput. Commun., 2007
Practical Verification of Untrusted Terminals using Remote Attestation.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Proceedings of the 46th IEEE Conference on Decision and Control, 2007
Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2007
2006
Comput. J., 2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
Scalable and Secure Group Rekeying in Wireless Sensor Networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006
An Overview of VOAC, a Virtual Organizations Access Control Infrastructure.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006
2005
FACT: A Tool for Code Generation from Communicating Automata.
Proceedings of the IASTED International Conference on Software Engineering, 2005
2003
A secure and available electronic voting service for a large-scale distributed system.
Future Gener. Comput. Syst., 2003
2002
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
2001
Int. J. Softw. Tools Technol. Transf., 2001
2000
Future Gener. Comput. Syst., 2000
Concurr. Pract. Exp., 2000
Proceedings of the Persistent Object Systems, 9th International Workshop, 2000
1999
Implementing a Distributed Single Address Space in the Presence of Failures.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Recoverable-Persistence in a Distributed Single Address Space.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999
Proceedings of the Advances in Distributed Systems, 1999
1998
Microprocess. Microsystems, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Enriched View Synchrony: A Programming Paradigm for Partitionable Asynchronous Distributed Systems.
IEEE Trans. Computers, 1997
1996
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996
1995
IEEE Parallel Distributed Technol. Syst. Appl., 1995
Distributed Syst. Eng., 1995
1994
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994
1991
Supporting load distribution strategies in message-passing multiprocessors: a case study.
Microprocess. Microsystems, 1991