Gianluca Dini

Orcid: 0000-0002-6029-5467

Affiliations:
  • University of Pisa, Italy


According to our database1, Gianluca Dini authored at least 140 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On hardware acceleration of quantum-resistant FOTA systems in automotive.
Comput. Electr. Eng., 2024

Attacks detection in Cyber-Physical Systems with Neural Networks: a case study.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

On Implementing Linear Regression on Homomorphically Encrypted Data: A Case-Study.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Cybersecurity in the digital world.
Future Gener. Comput. Syst., July, 2023

2022
Indirect Revocable KP-ABE With Revocation Undoing Resistance.
IEEE Trans. Serv. Comput., 2022

A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things.
IEEE Internet Things J., 2022

A Rational Mining Strategy for Proof-of-Work Consensus Algorithms.
Proceedings of the 4th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2022

SegWit Extension and Improvement of the BlockSim Bitcoin Simulator.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks.
J. Comput. Virol. Hacking Tech., 2021

SAPIENT: Enabling Real-Time Monitoring and Control in the Future Communication Infrastructure of Air Traffic Management.
IEEE Trans. Intell. Transp. Syst., 2021

Performance Evaluation of Attribute-Based Encryption in Automotive Embedded Platform for Secure Software Over-The-Air Update.
Sensors, 2021

SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks.
J. Inf. Secur. Appl., 2021

Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware.
Int. J. Inf. Sec., 2021

SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks.
CoRR, 2021

Assessing the Cost of Quantum Security for Automotive Over -The-Air Updates.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

On Improving SimBlock Blockchain Simulator.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
MeSmart-Pro: Advanced Processing at the Edge for Smart Urban Monitoring and Reconfigurable Services.
J. Sens. Actuator Networks, 2020

Group rekeying based on member join history.
Int. J. Inf. Sec., 2020

CYBERWISER.eu: Innovative Cyber Range Platform for Cybersecurity Training in Industrial Systems.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020

A lightweight and scalable attribute-based encryption system for smart cities.
Comput. Commun., 2020

Evaluating and improving the scalability of RPL security in the Internet of Things.
Comput. Commun., 2020

Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

An Analysis of Routing Attacks Against IOTA Cryptocurrency.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
DISH: DIstributed SHuffling Against Selective Jamming Attack in IEEE 802.15.4e TSCH Networks.
ACM Trans. Sens. Networks, 2019

fABElous: An Attribute-Based Scheme for Industrial Internet of Things.
Proceedings of the IEEE International Conference on Smart Computing, 2019

On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems.
Proceedings of the IEEE International Conference on Smart Computing, 2019

BRUSCHETTA: An IoT Blockchain-Based Framework for Certifying Extra Virgin Olive Oil Supply Chain.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Virtual private ledgers: embedding private distributed ledgers over a public blockchain by cryptography.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

2018
Verifying data secure flow in AUTOSAR models.
J. Comput. Virol. Hacking Tech., 2018

MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2018

Risk analysis of Android applications: A user-centric solution.
Future Gener. Comput. Syst., 2018

Implementation of a wormhole attack against a rpl network: Challenges and effects.
Proceedings of the 14th Annual Conference on Wireless On-demand Network Systems and Services, 2018

ABE-Cities: An Attribute-Based Encryption System for Smart Cities.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

2017
Drone Path Planning for Secure Positioning and Secure Position Verification.
IEEE Trans. Mob. Comput., 2017

JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs.
IEEE Trans. Dependable Secur. Comput., 2017

Kassandra: A framework for distributed simulation of heterogeneous cooperating objects.
J. Syst. Archit., 2017

Protected pointers in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2017

DIO Suppression Attack Against Routing in the Internet of Things.
IEEE Commun. Lett., 2017

Modeling and generation of secure component communications in AUTOSAR.
Proceedings of the Symposium on Applied Computing, 2017

Sensing the cities with social-aware unmanned aerial vehicles.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Verifying Data Secure Flow in AUTOSAR Models by Static Analysis.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

An Implementation and Evaluation of the Security Features of RPL.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2017

A Low-Cost UAV-Based Secure Location Verification Method.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Secure Positioning in Wireless Sensor Networks through Enlargement Miscontrol Detection.
ACM Trans. Sens. Networks, 2016

Modeling Enlargement Attacks Against UWB Distance Bounding Protocols.
IEEE Trans. Inf. Forensics Secur., 2016

Performance and Security Evaluation of SDN Networks in OMNeT++/INET.
CoRR, 2016

Localization with Guaranteed Bound on the Position Error using a Drone.
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016

Using AUTOSAR High-Level Specifications for the Synthesis of Security Components in Automotive Systems.
Proceedings of the Modelling and Simulation for Autonomous Systems, 2016

GREP: A group rekeying protocol based on member join history.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Data-Sluice: Fine-grained traffic control for Android application.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
Distributed motion misbehavior detection in teams of heterogeneous aerial robots.
Robotics Auton. Syst., 2015

Distributed storage protection in wireless sensor networks.
J. Syst. Archit., 2015

A uniformity-based approach to location privacy.
Comput. Commun., 2015

On Designing Resilient Location-Privacy Obfuscators.
Comput. J., 2015

Password systems: Design and implementation.
Comput. Electr. Eng., 2015

Key propagation in wireless sensor networks.
Comput. Electr. Eng., 2015

The verifier bee: A path planner for drone-based secure location verification.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Simulative Evaluation of Security Attacks in Networked Critical Infrastructures.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Secure positioning with non-ideal distance bounding protocols.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks.
Wirel. Networks, 2014

Social and Q&A interfaces for app download.
Inf. Process. Manag., 2014

On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding.
IEEE Commun. Lett., 2014

On evaluating the performance impact of the IEEE 802.15.4 security sub-layer.
Comput. Commun., 2014

HUMsim: A Privacy-Oriented Human Mobility Simulator.
Proceedings of the Sensor Systems and Software - 5th International Conference, 2014

A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems.
Proceedings of the Modelling and Simulation for Autonomous Systems, 2014

A performance evaluation method for WSNs security.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-642-37368-8, 2013

A Social-Feedback Enriched Interface for Software Download.
J. Organ. End User Comput., 2013

Mobile Underwater Sensor Networks for Protection and Security: Field Experience at the UAN11 Experiment.
J. Field Robotics, 2013

HISS: A HIghly Scalable Scheme for Group Rekeying.
Comput. J., 2013

Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming.
Proceedings of the SENSORNETS 2013, 2013

STaR: a Reconfigurable and Transparent middleware for WSNs security.
Proceedings of 4th International Workshop on Networks of Cooperating Objects for Smart Cities 2013, 2013

SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks.
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013

On simulative analysis of attack impact in Wireless Sensor Networks.
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Integration of Privacy Protection Mechanisms in Location-Based Services.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Probabilistic Contract Compliance for Mobile Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A Secure Communication Suite for Underwater Acoustic Sensor Networks.
Sensors, 2012

Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network.
Sensors, 2012

Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network.
Ad Hoc Networks, 2012

LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks.
Ad Hoc Networks, 2012

ASF: An attack simulation framework for wireless sensor networks.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

MADAM: A Multi-level Anomaly Detector for Android Malware.
Proceedings of the Computer Network Security, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Uniform Obfuscation for Location Privacy.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2011
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks.
ACM Trans. Embed. Comput. Syst., 2011

RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks.
Pers. Ubiquitous Comput., 2011

LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Distributed Intrusion Detection for the Security of Societies of Robots
CoRR, 2011

Neighbourhood monitoring for decentralised coordination in multi-agent systems: A case-study.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

A cryptographic suite for underwater cooperative applications.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

On experimentally evaluating the impact of security on IEEE 802.15.4 networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
A Security Architecture for Reconfigurable Networked Embedded Systems.
Int. J. Wirel. Inf. Networks, 2010

Considerations on Security in ZigBee Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

Scalable rekeying in dynamic multi-groups.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

A reputation-based approach to tolerate misbehaving carriers in Delay Tolerant Networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

RiSeG: A logical ring based secure group communication protocol for Wireless Sensor Networks.
Proceedings of the International Conference on Wireless and Ubiquitous Systems , 2010

2009
Bloumail: an interactive tool for blocking spam at the originator.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

On securing publish-subscribe systems with security groups.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
Heterogeneous Wireless Multirobot System.
IEEE Robotics Autom. Mag., 2008

Consensus-based distributed intrusion detection for multi-robot systems.
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008

An Algorithm for Reconnecting Wireless Sensor Network Partitions.
Proceedings of the Wireless Sensor Networks, 5th European Conference, 2008

Decentralized Deployment of Mobile Sensors for Optimal Connected Sensing Coverage.
Proceedings of the Distributed Computing in Sensor Systems, 2008

2007
A Component-Based Approach to the Design of Networked Control Systems.
Eur. J. Control, 2007

A methodology for verification of digital items in fair exchange protocols with active trustee.
Electron. Commer. Res., 2007

Improving authentication of remote card transactions with mobile personal trusted devices.
Comput. Commun., 2007

Practical Verification of Untrusted Terminals using Remote Attestation.
Proceedings of the SECRYPT 2007, 2007

Repairing network partitions in Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Decentralized intrusion detection for secure cooperative multi-agent systems.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2007

2006
Caching and prefetching algorithms for programs with looping reference patterns.
Comput. J., 2006

An Efficient Key Revocation Protocol for Wireless Sensor Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Credentials and Beliefs in Remote Trusted Platforms Attestation.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Scalable and Secure Group Rekeying in Wireless Sensor Networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

An Overview of VOAC, a Virtual Organizations Access Control Infrastructure.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

S2RP: a Secure and Scalable Rekeying Protocol for Wireless Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

2005
FACT: A Tool for Code Generation from Communicating Automata.
Proceedings of the IASTED International Conference on Software Engineering, 2005

2003
A secure and available electronic voting service for a large-scale distributed system.
Future Gener. Comput. Syst., 2003

2002
Increasing security and availability of an Internet voting system.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

2001
Application-controlled memory management in a single address space environment.
Int. J. Softw. Tools Technol. Transf., 2001

Electronic voting in a large-scale distributed system.
Networks, 2001

2000
Sharing objects in a distributed, single address space environment.
Future Gener. Comput. Syst., 2000

Single address space implementation in distributed systems.
Concurr. Pract. Exp., 2000

An Overview of Ulisse, a Distributed Single Address Space System.
Proceedings of the Persistent Object Systems, 9th International Workshop, 2000

1999
Implementing a Distributed Single Address Space in the Presence of Failures.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Recoverable-Persistence in a Distributed Single Address Space.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

Programming Partition-Aware Network Applications.
Proceedings of the Advances in Distributed Systems, 1999

1998
Mechanisms for application-level recoverable-persistence in a single address space.
Microprocess. Microsystems, 1998

Detecting Key-Dependencies.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Enriched View Synchrony: A Programming Paradigm for Partitionable Asynchronous Distributed Systems.
IEEE Trans. Computers, 1997

1996
On Programming with View Synchrony.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Implementing distributed process farms.
Microprocess. Microsystems, 1995

Graphical design of distributed applications through reusable components.
IEEE Parallel Distributed Technol. Syst. Appl., 1995

Reusing sequential software in a distributed environment.
Distributed Syst. Eng., 1995

1994
Replicated File Management in Large-Scale Distributed Systems.
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994

1991
Supporting load distribution strategies in message-passing multiprocessors: a case study.
Microprocess. Microsystems, 1991


  Loading...