Roberto Di Pietro, ACM DS
Roberto Di Pietro, ACM DS
HBKU, College of Science and Engineering, Doha-Qatar
Verified email at hbku.edu.qa - Homepage
TitleCited byYear
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
12802008
Secure virtualization for cloud computing
F Lombardi, R Di Pietro
Journal of network and computer applications 34 (4), 1113-1122, 2011
4652011
Smart health: a context-aware health paradigm within smart cities
A Solanas, C Patsakis, M Conti, I Vlachos, V Ramos, F Falcone, ...
Communications Magazine, IEEE 52 (8), 74-81, 2014
3942014
Random key-assignment for secure wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
3942003
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
2832007
Boosting efficiency and security in proof of ownership for deduplication
R Di Pietro, A Sorniotti
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
2132012
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
R Di Pietro, LV Mancini, YW Law, S Etall, P Havinga
Parallel Processing Workshops, 2003. Proceedings. 2003 International …, 2003
2052003
Distributed detection of clone attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Dependable and Secure Computing, IEEE Transactions on 8 (5), 685-698, 2011
1982011
Intrusion detection systems
R Di Pietro, LV Mancini
Springer Science & Business Media, 2008
1522008
Fame for sale: Efficient detection of fake Twitter followers
S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi
Decision Support Systems 80, 56-71, 2015
1432015
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE …, 2008
1392008
Security in wireless ad-hoc networks–a survey
R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer
Computer Communications 51, 1-20, 2014
1372014
The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race
S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi
Proceedings of the 26th international conference on World Wide Web companion …, 2017
1082017
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the first ACM conference on Wireless network security, 214-219, 2008
1072008
Redoubtable sensor networks
R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan
ACM Transactions on Information and System Security (TISSEC) 11 (3), 13, 2008
1002008
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Wireless Networks 12 (6), 709-721, 2006
962006
Security and Privacy issues of Handheld and Wearable Wireless Devices
R Di Pietro, LV Mancini
Communications of the ACM 46 (9), 75-79, 2003
942003
Efficient and secure keys management for wireless mobile communications
R Di Pietro, LV Mancini, S Jajodia
Proceedings of the second ACM international workshop on Principles of mobile …, 2002
842002
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
Reliable Distributed Systems, 2008. SRDS'08. IEEE Symposium on, 185-194, 2008
832008
To Docker or Not to Docker: A Security Perspective.
T Combe, A Martin, R Di Pietro
IEEE Cloud Computing 3 (5), 54-62, 2016
822016
The system can't perform the operation now. Try again later.
Articles 1–20