Luigi Vincenzo Mancini
Luigi Vincenzo Mancini
University Professor, Sapienza Universita` di Roma, Italy
Bestätigte E-Mail-Adresse bei di.uniroma1.it - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
15182008
Random key-assignment for secure wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
4042003
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
2972007
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici
International Journal of Security and Networks 10 (3), 137-150, 2015
2412015
Distributed detection of clone attacks in wireless sensor networks
M Conti, R Di Pietro, L Mancini, A Mei
IEEE transactions on dependable and secure computing 8 (5), 685-698, 2010
2302010
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
R Di Pietro, LV Mancini, YW Law, S Etalle, P Havinga
2003 International Conference on Parallel Processing Workshops, 2003 …, 2003
2042003
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
2022015
Intrusion detection systems
R Di Pietro, LV Mancini
Springer Science & Business Media, 2008
1852008
A graph-based formalism for RBAC
M Koch, LV Mancini, F Parisi-Presicce
ACM Transactions on Information and System Security (TISSEC) 5 (3), 332-365, 2002
1702002
REMUS: A security-enhanced operating system
M Bernaschi, E Gabrielli, LV Mancini
ACM Transactions on Information and System Security (TISSEC) 5 (1), 36-61, 2002
1542002
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1502008
Fault-tolerant rate-monotonic first-fit scheduling in hard-real-time systems
AA Bertossi, LV Mancini, F Rossini
IEEE Transactions on Parallel and Distributed Systems 10 (9), 934-945, 1999
1461999
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the first ACM conference on Wireless network security, 214-219, 2008
1292008
Operating system enhancements to prevent the misuse of system calls
M Bernaschi, E Gabrielli, LV Mancini
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1192000
Redoubtable sensor networks
R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan
ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-22, 2008
1092008
Secure dynamic fragment and replica allocation in large-scale distributed file systems
A Mei, LV Mancini, S Jajodia
IEEE Transactions on Parallel and Distributed systems 14 (9), 885-896, 2003
1092003
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Wireless Networks 12 (6), 709-721, 2006
1072006
Security and privacy issues of handheld and wearable wireless devices
R Di Pietro, LV Mancini
Communications of the ACM 46 (9), 74-79, 2003
1042003
Towards a formal model for security policies specification and validation in the selinux system
G Zanin, LV Mancini
Proceedings of the ninth ACM symposium on Access control models and …, 2004
1032004
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis
M Conti, LV Mancini, R Spolaor, NV Verde
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
1002015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20