Roberto Metere

Orcid: 0000-0001-6992-4285

According to our database1, Roberto Metere authored at least 23 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+.
J. Ambient Intell. Humaniz. Comput., February, 2024

User-Guided Verification of Security Protocols via Sound Animation.
Proceedings of the Software Engineering and Formal Methods - 22nd International Conference, 2024

Enhancing Expressiveness in Stochastic Modelling of Cyber-Physical Systems.
Proceedings of the 13th Mediterranean Conference on Embedded Computing, 2024

2023
A Direct Lazy Sampling Proof Technique in Probabilistic Relational Hoare Logic.
CoRR, 2023

Checking and Automating Confidentiality Theory in Isabelle/UTP.
CoRR, 2023

2022
An Overview of Cyber Security and Privacy on the Electric Vehicle Charging Infrastructure.
CoRR, 2022

cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models.
CoRR, 2022

Automating Cryptographic Protocol Language Generation from Structured Specifications.
Proceedings of the 10th IEEE/ACM International Conference on Formal Methods in Software Engineering, 2022

2021
MetaCP: Cryptographic Protocol Design Tool for Formal Verification.
CoRR, 2021

Securing the Electric Vehicle Charging Infrastructure.
CoRR, 2021

2020
End-to-End Verifiable E-Voting Trial for Polling Station Voting.
IEEE Secur. Priv., 2020

End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead.
IACR Cryptol. ePrint Arch., 2020

2019
Efficient Delegated Private Set Intersection on Outsourced Private Datasets.
IEEE Trans. Dependable Secur. Comput., 2019

TrABin: Trustworthy analyses of binaries.
Sci. Comput. Program., 2019

Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols.
CoRR, 2019

Modelling Load-Changing Attacks in Cyber-Physical Systems.
Proceedings of the Tenth International Workshop on the Practical Application of Stochastic Modelling, 2019

Poster: Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Analyzing and Patching SPEKE in ISO/IEC.
IEEE Trans. Inf. Forensics Secur., 2018

Incentive-driven attacker for corrupting two-party protocols.
Soft Comput., 2018

Socially-conforming cooperative computation in cloud networks.
J. Parallel Distributed Comput., 2018

Analysing and Patching SPEKE in ISO/IEC.
CoRR, 2018

2017
Sound Transpilation from Binary to Machine-Independent Code.
Proceedings of the Formal Methods: Foundations and Applications - 20th Brazilian Symposium, 2017

Automated Cryptographic Analysis of the Pedersen Commitment Scheme.
Proceedings of the Computer Network Security, 2017


  Loading...