Marco Pugliese

According to our database1, Marco Pugliese authored at least 15 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020

An Authenticated Key Scheme over Elliptic Curves for Topological Networks.
CoRR, 2020

SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15.4 WSN Applications.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

2018
TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks.
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, 2018

2015
A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security.
EAI Endorsed Trans. Ubiquitous Environ., 2015

2014
Enhancing security in public transportation services of Roma: The PANDORA system.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
Definition and Development of a Topology-Based Cryptographic Scheme for Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software - 4th International ICST Conference, 2013

The Mean-Variance Estimator Technique in Monitoring Applications Using Mobile Agents over Wireless Sensor Networks.
Proceedings of the 2013 International Conference on MOBILe Wireless MiddleWARE, 2013

A Middleware Approach to Provide Security in IEEE 802.15.4 Wireless Sensor Networks.
Proceedings of the 2013 International Conference on MOBILe Wireless MiddleWARE, 2013

WINSOME: A middleware platform for the provision of secure monitoring services over Wireless Sensor Networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

A cryptographic scheme for real-world wireless sensor networks applications.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

2010
Topology Optimization and Network Deployment Algorithm in WSNs for Mobile Agent-based Applications.
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010

2009
Weak Process Models for Attack Detection in a Clustered Sensor Network Using Mobile Agents.
Proceedings of the Sensor Systems and Software, 2009

Agent-based scalable design of a cross-layer security framework for Wireless Sensor Networks Monitoring Applications.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

2008
Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008


  Loading...