{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound N Karapanos, C Marforio, C Soriente, S Capkun 24th USENIX security symposium (USENIX security 15), 483-498, 2015 | 526* | 2015 |
Streamcloud: An elastic and scalable data streaming system V Gulisano, R Jimenez-Peris, M Patino-Martinez, C Soriente, P Valduriez IEEE Transactions on Parallel and Distributed Systems 23 (12), 2351-2365, 2012 | 443 | 2012 |
An accumulator based on bilinear maps and efficient revocation for anonymous credentials J Camenisch, M Kohlweiss, C Soriente Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009 | 386 | 2009 |
On the difficulty of software-based attestation of embedded devices C Castelluccia, A Francillon, D Perito, C Soriente Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 300 | 2009 |
Hummingbird: Privacy at the time of twitter E De Cristofaro, C Soriente, G Tsudik, A Williams 2012 IEEE Symposium on security and privacy, 285-299, 2012 | 186 | 2012 |
HAPADEP: human-assisted pure audio device pairing C Soriente, G Tsudik, E Uzun Information Security: 11th International Conference, ISC 2008, Taipei …, 2008 | 180 | 2008 |
Catch me (if you can): Data survival in unattended sensor networks R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik 2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008 | 156 | 2008 |
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure E De Cristofaro, C Soriente Proceedings of the fourth ACM conference on Wireless network security, 23-28, 2011 | 117 | 2011 |
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata A Castiglione, A De Santis, C Soriente Journal of Systems and Software 80 (5), 750-764, 2007 | 117 | 2007 |
BEDA: Button-enabled device pairing C Soriente, G Tsudik, E Uzun Cryptology ePrint Archive, 2007 | 116 | 2007 |
Towards secure and decentralized sharing of IoT data HTT Truong, M Almeida, G Karame, C Soriente 2019 IEEE International Conference on Blockchain (Blockchain), 176-183, 2019 | 108 | 2019 |
Participatory privacy: Enabling privacy in participatory sensing E De Cristofaro, C Soriente IEEE network 27 (1), 32-36, 2013 | 108 | 2013 |
Smartphones as Practical and Secure Location Verification Tokens for Payments. C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun NDSS 14, 23-26, 2014 | 105 | 2014 |
Data security in unattended wireless sensor networks R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik IEEE Transactions on Computers 58 (11), 1500-1511, 2009 | 97 | 2009 |
Posh: Proactive co-operative self-healing in unattended wireless sensor networks R Di Pietro, D Ma, C Soriente, G Tsudik 2008 Symposium on Reliable Distributed Systems, 185-194, 2008 | 89 | 2008 |
Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI) E De Cristofaro, C Soriente IEEE Transactions on Information Forensics and Security 8 (12), 2021-2033, 2013 | 80 | 2013 |
Solving revocation with efficient update of anonymous credentials J Camenisch, M Kohlweiss, C Soriente International Conference on Security and Cryptography for Networks, 454-471, 2010 | 65 | 2010 |
New adversary and new threats: security in unattended sensor networks D Ma, C Soriente, G Tsudik IEEE network 23 (2), 43-48, 2009 | 65 | 2009 |
Collaborative authentication in unattended wsns R Di Pietro, C Soriente, A Spognardi, G Tsudik Proceedings of the second ACM conference on Wireless network security, 237-244, 2009 | 59 | 2009 |
Security and privacy issues in the Portable Document Format A Castiglione, A De Santis, C Soriente Journal of Systems and Software 83 (10), 1813-1822, 2010 | 58 | 2010 |