Follow
leonardo maccari
Title
Cited by
Cited by
Year
A broadband wireless communications system for emergency management
F Chiti, R Fantacci, L Maccari, D Marabissi, D Tarchi
IEEE Wireless Communications 15 (3), 8-14, 2008
922008
A week in the life of three large Wireless Community Networks
L Maccari, RL Cigno
Ad Hoc Networks 24, 175-190, 2015
802015
Short authentication procedure in wireless data communications networks
L Costa, G Freguglia, F Frosali, R Fantacci, L Maccari, T Pecorella
US Patent 8,621,201, 2013
672013
Short authentication procedure in wireless data communications networks
L Costa, G Freguglia, F Frosali, R Fantacci, L Maccari, T Pecorella
US Patent 8,621,201, 2013
672013
Short authentication procedure in wireless data communications networks
L Costa, G Freguglia, F Frosali, R Fantacci, L Maccari, T Pecorella
US Patent 8,621,201, 2013
672013
Do we need a contact tracing app?
L Maccari, V Cagno
Computer Communications 166, 9-18, 2021
552021
Security analysis of IEEE 802.16
L Maccari, M Paoli, R Fantacci
2007 IEEE International Conference on Communications, 1160-1165, 2007
472007
An analysis of the Ninux wireless community network
L Maccari
2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013
422013
How to Reduce and Stabilize MPR sets in OLSR networks
L Maccari, RL Cigno
Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 …, 2012
382012
Avoiding eclipse attacks on kad/kademlia: an identity based approach
R Fantacci, L Maccari, M Rosi, L Chisci, LM Aiello, M Milanesio
Communications, 2009. ICC'09. IEEE International Conference on, 1-5, 2009
352009
A secure and performant token-based authentication for infrastructure and mesh 802.1 X networks
R Fantacci, L Maccari, T Pecorella, F Frosali
IEEE Conference on Computer Communications (INFOCOM), 2006
302006
A secure and performant token-based authentication for infrastructure and mesh 802.1 X networks
R Fantacci, L Maccari, T Pecorella, F Frosali
IEEE Conference on Computer Communications (INFOCOM), 2006
302006
On the computation of centrality metrics for network security in mesh networks
L Maccari, Q Nguyen, RL Cigno
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
282016
Pop-routing: Centrality-based tuning of control messages for faster route convergence
L Maccari, RL Cigno
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
272016
Analysis of secure handover for IEEE 802.1 x-based wireless ad hoc networks
R Fantacci, L Maccari, T Pecorella, F Frosali
IEEE Wireless Communications 14 (5), 21-29, 2007
272007
Mesh network firewalling with bloom filters
L Maccari, R Fantacci, P Neira, RM Gasca
2007 IEEE International Conference on Communications, 1546-1551, 2007
272007
Augustus: a CCN router for programmable networks
D Kirchner, R Ferdous, RL Cigno, L Maccari, M Gallo, D Perino, L Saino
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 31-39, 2016
262016
What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things
L Ghiro, F Restuccia, S D'Oro, S Basagni, T Melodia, L Maccari, RL Cigno
arXiv preprint arXiv:2102.03750, 2021
252021
Proof of networking: Can blockchains boost the next generation of distributed networks?
L Ghiro, L Maccari, RL Cigno
2018 14th Annual Conference on Wireless On-demand Network Systems and …, 2018
212018
Improving P2P streaming in wireless community networks
L Baldesi, L Maccari, RL Cigno
Computer Networks 93, 389-403, 2015
212015
The system can't perform the operation now. Try again later.
Articles 1–20