Roberto Di Pietro
Orcid: 0000-0003-1909-0336Affiliations:
- HBKU-CSE, Hamad Bin Khalifa University - College of Science and Engineering, Doha, Qatar
- Roma Tre University, Rome, Italy (former)
According to our database1,
Roberto Di Pietro
authored at least 288 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2023, "For contributions to the security of distributed systems".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Physical Layer Security in Power Line Communications - Fundamentals, Models and Applications
Advances in Information Security 108, Springer, ISBN: 978-3-031-57348-4, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Expert Syst. Appl., 2024
IEEE Commun. Surv. Tutorials, 2024
MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning.
Comput. Secur., 2024
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure.
Comput. Commun., 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2024
2023
Extending device noise measurement capacity for OFDM-based PLC systems: Design, implementation, and on-field validation.
Comput. Networks, December, 2023
Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions.
Comput. Commun., April, 2023
IEEE Trans. Inf. Forensics Secur., 2023
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A<sup>2</sup>RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones.
IEEE Internet Things J., 2023
LENTO: Unpredictable Latency-based continuous authEntication for Network inTensive IoT envirOnments.
Future Gener. Comput. Syst., 2023
Inferring Power Grid Information with Power Line Communications: Review and Insights.
CoRR, 2023
Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication.
CoRR, 2023
PulseOblivion: An Effective Session-Based Continuous Authentication Scheme Using PPG Signals.
IEEE Access, 2023
Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Performance Analysis of Physical Layer Security in Power Line Communication Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Fourth International Conference on Intelligent Data Science Technologies and Applications, 2023
Characterizing the 2022- Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Key Findings.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Understanding Polkadot Through Graph Analysis: Transaction Model, Network Properties, and Insights.
Proceedings of the Financial Cryptography and Data Security, 2023
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
ACM Trans. Web, 2022
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts.
IEEE Trans. Dependable Secur. Comput., 2022
Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons.
IEEE Secur. Priv., 2022
IEEE Secur. Priv., 2022
Future Gener. Comput. Syst., 2022
Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings.
CoRR, 2022
Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions.
CoRR, 2022
Satellite-based communications security: A survey of threats, solutions, and research challenges.
Comput. Networks, 2022
Comput. Networks, 2022
IEEE Access, 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT.
Proceedings of the Security and Privacy in Communication Networks, 2022
Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal.
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
Advances in Information Security 84, Springer, ISBN: 978-3-030-60617-6, 2021
ACM Trans. Knowl. Discov. Data, 2021
ACM Trans. Embed. Comput. Syst., 2021
SOS: Standard-Compliant and Packet Loss Tolerant Security Framework for ADS-B Communications.
IEEE Trans. Dependable Secur. Comput., 2021
Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures.
J. Netw. Comput. Appl., 2021
IEEE Internet Things J., 2021
DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges.
Future Gener. Comput. Syst., 2021
ACM Comput. Surv., 2021
A Novel Framework for the Analysis of Unknown Transactions in Bitcoin: Theory, Model, and Experimental Results.
CoRR, 2021
CoRR, 2021
Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges.
IEEE Commun. Surv. Tutorials, 2021
Comput. Commun., 2021
IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-Enabled Architecture for Contact Tracing.
IEEE Commun. Mag., 2021
Cyber security research in the Arab region: a blooming ecosystem with global ambitions.
Commun. ACM, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions.
Proceedings of the Italian Conference on Cybersecurity, 2021
Modelling a Communication Channel under Jamming: Experimental Model and Applications.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Internet Things J., 2020
Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges.
IEEE Commun. Surv. Tutorials, 2020
Emergent properties, models, and laws of behavioral similarities within groups of twitter users.
Comput. Commun., 2020
PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis.
Comput. Networks, 2020
IEEE Commun. Mag., 2020
A Longitudinal Study on Web-Sites Password Management (in)Security: Evidence and Remedies.
IEEE Access, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
New Dimensions of Information Warfare: The Economic Pillar - Fintech and Cryptocurrencies.
Proceedings of the Risks and Security of Internet and Systems, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Secur. Commun. Networks, 2019
CoRR, 2019
IEEE Access, 2019
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments).
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Reliability of ADS-B communications: novel insights based on an experimental assessment.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Next Generation Information Warfare: Challenges and Research Directions.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions.
Proceedings of the Edge Computing - EDGE 2019, 2019
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019
Proceedings of the 2019 IEEE International Conference on Data Science and Advanced Analytics, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling.
IEEE Trans. Dependable Secur. Comput., 2018
Sensors, 2018
A Spark Is Enough in a Straw World: A Study of Websites Password Management in the Wild.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
Proceedings of the 2018 IEEE World Congress on Services, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives.
Proceedings of the From Database to Cyber Security, 2018
2017
Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results.
J. Netw. Comput. Appl., 2017
Comput. Networks, 2017
The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017
2016
IEEE Trans. Mob. Comput., 2016
ACM Trans. Embed. Comput. Syst., 2016
IEEE Trans. Dependable Secur. Comput., 2016
IEEE Intell. Syst., 2016
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution.
Comput. Commun., 2016
CURE - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments.
Comput. Commun., 2016
Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel.
Comput. Networks, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
2015
Proceedings of the Advanced Research in Data Privacy, 2015
IEEE Trans. Serv. Comput., 2015
ACM Trans. Inf. Syst. Secur., 2015
Future Gener. Comput. Syst., 2015
Decis. Support Syst., 2015
Digit. Investig., 2015
Comput. Networks, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
2014
J. Comput. Syst. Sci., 2014
Future Gener. Comput. Syst., 2014
ERCIM News, 2014
IEEE Commun. Mag., 2014
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
IEEE Trans. Mob. Comput., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Telecommun. Syst., 2013
IEEE Syst. J., 2013
Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps.
Pervasive Mob. Comput., 2013
CoRR, 2013
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
IEEE Trans. Dependable Secur. Comput., 2011
Secur. Commun. Networks, 2011
Pervasive Mob. Comput., 2011
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems.
J. Netw. Comput. Appl., 2011
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.
Int. J. Inf. Sec., 2011
"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation.
EURASIP J. Wirel. Commun. Netw., 2011
A new role mining framework to elicit business roles and to mitigate enterprise risk.
Decis. Support Syst., 2011
Cross-border co-operation and education in digital investigations: A European perspective.
Digit. Investig., 2011
Comput. Commun., 2011
Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 2011 eCrime Researchers Summit, 2011
2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the Open Research Problems in Network Security, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Secur. Commun. Networks, 2009
Secur. Commun. Networks, 2009
EURASIP J. Wirel. Commun. Netw., 2009
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
2008
Int. J. Satell. Commun. Netw., 2008
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptol. ePrint Arch., 2008
Comput. Commun., 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Gossip-based aggregate computation: computing faster with non address-oblivious schemes.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
J. Comput. Secur., 2007
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007
Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Towards threat-adaptive dynamic fragment replication in large scale distributed systems.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
Proceedings of the Computer Security, 2007
2006
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks.
Wirel. Networks, 2006
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005
2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004
Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2.
Proceedings of the Wireless On-Demand Network Systems, First IFIP TC6 Working Conference, 2004
BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004
2003
Commun. ACM, 2003
Ad Hoc Networks, 2003
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003
A Time Driven Methodology for Key Dimensioning in Multicast Communications.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003
2002
Secure Selective Exclusion in Ad Hoc Wireless Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002
Proceedings of the Formal Aspects of Security, First International Conference, 2002