Mauro Conti
Mauro Conti
Full Professor at University of Padua - Affiliate Prof. at TU Delft and UW Seattle
Bestätigte E-Mail-Adresse bei math.unipd.it - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Mobile ad hoc networking: Cutting edge directions
S Basagni, M Conti, S Giordano, I Stojmenovic
John Wiley & Sons, 2013
13152013
Smart health: a context-aware health paradigm within smart cities
A Solanas, C Patsakis, M Conti, IS Vlachos, V Ramos, F Falcone, ...
IEEE Communications Magazine 52 (8), 74-81, 2014
4842014
A survey on security and privacy issues of bitcoin
M Conti, ES Kumar, C Lal, S Ruj
IEEE Communications Surveys & Tutorials 20 (4), 3416-3452, 2018
4392018
Android Security: A Survey of Issues, Malware Penetration and Defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, M Gaur, M Conti, ...
IEEE Communications Surveys & Tutorials 17 (2), 2015
4082015
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
3472013
Crepe: Context-related policy enforcement for android
M Conti, VTN Nguyen, B Crispo
International Conference on Information Security, 331-345, 2010
3322010
Internet of Things security and forensics: Challenges and opportunities
M Conti, A Dehghantanha, K Franke, S Watson
Future Generation Computer Systems 78, 544-546, 2018
3032018
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
2922007
A Survey of Man In The Middle Attacks
M Conti, N Dragoni, V Lesyk
IEEE Communications Surveys & Tutorials, 2016
2612016
Distributed detection of clone attacks in wireless sensor networks
M Conti, R Di Pietro, L Mancini, A Mei
IEEE transactions on dependable and secure computing 8 (5), 685-698, 2010
2222010
A survey on homomorphic encryption schemes: Theory and implementation
A Acar, H Aksu, AS Uluagac, M Conti
ACM Computing Surveys (CSUR) 51 (4), 1-35, 2018
2062018
Flowfence: Practical data protection for emerging iot application frameworks
E Fernandes, J Paupore, A Rahmati, D Simionato, M Conti, A Prakash
25th {USENIX} Security Symposium ({USENIX} Security 16), 531-548, 2016
1842016
Secure data aggregation in wireless sensor networks
S Roy, M Conti, S Setia, S Jajodia
IEEE Transactions on Information Forensics and Security 7 (3), 1040-1052, 2012
1692012
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Computer Communications 107, 30-48, 2017
1622017
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1482015
Providing source location privacy in wireless sensor networks: A survey
M Conti, J Willemsen, B Crispo
IEEE Communications Surveys & Tutorials 15 (3), 1238-1280, 2013
1482013
Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call
M Conti, I Zachia-Zlatea, B Crispo
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1462011
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
1432015
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
1342017
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KKR Choo
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1141-1152, 2018
1322018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20