Stefano Guarino
Stefano Guarino
Research Fellow, IAC - CNR
Verified email at iac.cnr.it
TitleCited byYear
Security in wireless ad-hoc networks–a survey
R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer
Computer Communications 51, 1-20, 2014
1282014
Data confidentiality and availability via secret sharing and node mobility in UWSN
R Di Pietro, S Guarino
2013 Proceedings IEEE INFOCOM, 205-209, 2013
122013
Confidentiality and availability issues in mobile unattended wireless sensor networks
R Di Pietro, S Guarino
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
72013
Provable storage medium for data storage outsourcing
S Guarino, ES Canlar, M Conti, R Di Pietro, A Solanas
IEEE Transactions on Services Computing 8 (6), 985-997, 2014
62014
Traffic data: exploratory data analysis with Apache Accumulo
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Italian Conference for the Traffic Police, 129-143, 2017
52017
Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Italian Conference for the Traffic Police, 97-114, 2017
52017
Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results
G Aliberti, R Di Pietro, S Guarino
Journal of Network and Computer Applications 99, 146-165, 2017
42017
Exploring and analyzing the Tor hidden services graph
M Bernaschi, A Celestini, S Guarino, F Lombardi
ACM Transactions on the Web (TWEB) 11 (4), 24, 2017
42017
A novel GPU-based implementation of the cube attack
M Cianfriglia, S Guarino, M Bernaschi, F Lombardi, M Pedicini
International Conference on Applied Cryptography and Network Security, 184-207, 2017
42017
Cryptanalysis on GPUs with the cube attack: design, optimization and performances gains
M Cianfriglia, S Guarino
2017 International Conference on High Performance Computing & Simulation …, 2017
22017
Design, implementation and test of a flexible tor-oriented web mining toolkit
A Celestini, S Guarino
Proceedings of the 7th International Conference on Web Intelligence, Mining …, 2017
22017
Cyber Security in Montenegro: Practice, Framework and Challenges
R Šendelj, F Lombardi, I Ognjanović, S Guarino
INFOFEST, 2014
22014
Reliable and perfectly secret communication over the generalized Ozarow-Wyner’s wire-tap channel
G Aliberti, R Di Pietro, S Guarino
Computer Networks 109, 21-30, 2016
12016
Spiders like Onions: on the Network of Tor Hidden Services
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
The World Wide Web Conference, 105-115, 2019
2019
Analysing the tor web with high performance graph algorithms
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Proceedings of the 16th ACM International Conference on Computing Frontiers …, 2019
2019
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
M Cianfriglia, S Guarino, M Bernaschi, F Lombardi, M Pedicini
Journal of Cryptographic Engineering, 1-18, 2019
2019
Traffic Data Classification for Police Activity
S Guarino, F Leuzzi, F Lombardi, E Mastrostefano
International Symposium on Methodologies for Intelligent Systems, 169-178, 2018
2018
Multi-word Structural Topic Modelling of ToR Drug Marketplaces
S Guarino, M Santoro
2018 IEEE 12th International Conference on Semantic Computing (ICSC), 269-273, 2018
2018
Ciphertext-only reconstruction of LFSR-based stream ciphers
S Guarino, M Pedicini
2010
Security and Privacy for Distributed and Resource-Constrained Systems
S Guarino, R Di Pietro, L Chierchia
The system can't perform the operation now. Try again later.
Articles 1–20