Marco Tiloca
Orcid: 0000-0001-8842-9810
According to our database1,
Marco Tiloca
authored at least 39 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
5
2
1
1
2
3
2
1
1
2
2
1
2
1
2
2
4
1
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE).
RFC, November, 2024
Using the ACE framework to enforce access and usage control with notifications of revoked access rights.
Int. J. Inf. Sec., October, 2024
Key Provisioning for Group Communication Using Authentication and Authorization for Constrained Environments (ACE).
RFC, September, 2024
IEEE Access, 2024
2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things.
ACM Trans. Internet Things, 2022
Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation.
Comput. Commun., 2022
2021
Evaluating the performance of the OSCORE security protocol in constrained IoT environments.
Internet Things, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the 24th Conference on Innovation in Clouds, 2021
2020
Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020
2019
DISH: DIstributed SHuffling Against Selective Jamming Attack in IEEE 802.15.4e TSCH Networks.
ACM Trans. Sens. Networks, 2019
Int. J. Secur. Networks, 2019
2018
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
IEEE Trans. Dependable Secur. Comput., 2017
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.
Int. J. Inf. Sec., 2017
2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
2015
SMACK: Short message authentication check against battery exhaustion in the Internet of Things.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Proceedings of the Computer Safety, Reliability, and Security, 2015
2014
Wirel. Networks, 2014
Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the Modelling and Simulation for Autonomous Systems, 2014
2013
IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-642-37368-8, 2013
PhD thesis, 2013
STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming.
Proceedings of the SENSORNETS 2013, 2013
Proceedings of 4th International Workshop on Networks of Cooperating Objects for Smart Cities 2013, 2013
SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks.
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013
2012
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012
2011
Proceedings of the Distributed Computing in Sensor Systems, 2011
2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010