Claudio Soriente
Claudio Soriente
NEC Labs
Verified email at neclab.eu
TitleCited byYear
Streamcloud: An elastic and scalable data streaming system
V Gulisano, R Jimenez-Peris, M Patino-Martinez, C Soriente, P Valduriez
IEEE Transactions on Parallel and Distributed Systems 23 (12), 2351-2365, 2012
2942012
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
International Workshop on Public Key Cryptography, 481-500, 2009
2222009
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1812009
HAPADEP: human-assisted pure audio device pairing
C Soriente, G Tsudik, E Uzun
International Conference on Information Security, 385-400, 2008
1482008
Hummingbird: Privacy at the time of twitter
E De Cristofaro, C Soriente, G Tsudik, A Williams
2012 IEEE Symposium on Security and Privacy, 285-299, 2012
1382012
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1382008
Sound-proof: usable two-factor authentication based on ambient sound
N Karapanos, C Marforio, C Soriente, S Capkun
24th {USENIX} Security Symposium ({USENIX} Security 15), 483-498, 2015
1052015
BEDA: Button-enabled device association
C Soriente, G Tsudik, E Uzun
962007
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
E De Cristofaro, C Soriente
Proceedings of the fourth ACM conference on Wireless network security, 23-28, 2011
922011
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
A Castiglione, A De Santis, C Soriente
Journal of Systems and Software 80 (5), 750-764, 2007
912007
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
2008 Symposium on Reliable Distributed Systems, 185-194, 2008
822008
Participatory privacy: Enabling privacy in participatory sensing
E De Cristofaro, C Soriente
IEEE network 27 (1), 32-36, 2013
802013
Data security in unattended wireless sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
IEEE Transactions on Computers 58 (11), 1500-1511, 2009
782009
Smartphones as Practical and Secure Location Verification Tokens for Payments.
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
NDSS 14, 23-26, 2014
662014
Collaborative authentication in unattended WSNs
R Di Pietro, C Soriente, A Spognardi, G Tsudik
Proceedings of the second ACM conference on Wireless network security, 237-244, 2009
532009
New adversary and new threats: security in unattended sensor networks
D Ma, C Soriente, G Tsudik
IEEE network 23 (2), 43-48, 2009
502009
Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI)
E De Cristofaro, C Soriente
IEEE Transactions on Information Forensics and Security 8 (12), 2021-2033, 2013
472013
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
Ad Hoc Networks 7 (8), 1463-1475, 2009
472009
Intrusion-resilience in mobile unattended WSNs
R Di Pietro, G Oligeri, C Soriente, G Tsudik
2010 Proceedings IEEE INFOCOM, 1-9, 2010
442010
Using audio in secure device pairing
MT Goodrich, M Sirivianos, J Solis, C Soriente, G Tsudik, E Uzun
International Journal of Security and Networks 4 (1-2), 57-68, 2009
422009
The system can't perform the operation now. Try again later.
Articles 1–20