Streamcloud: An elastic and scalable data streaming system V Gulisano, R Jimenez-Peris, M Patino-Martinez, C Soriente, P Valduriez IEEE Transactions on Parallel and Distributed Systems 23 (12), 2351-2365, 2012 | 383 | 2012 |
An accumulator based on bilinear maps and efficient revocation for anonymous credentials J Camenisch, M Kohlweiss, C Soriente International workshop on public key cryptography, 481-500, 2009 | 309 | 2009 |
On the difficulty of software-based attestation of embedded devices C Castelluccia, A Francillon, D Perito, C Soriente Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 251 | 2009 |
{Sound-Proof}: Usable {Two-Factor} Authentication Based on Ambient Sound N Karapanos, C Marforio, C Soriente, S Capkun 24th USENIX Security Symposium (USENIX Security 15), 483-498, 2015 | 200 | 2015 |
HAPADEP: human-assisted pure audio device pairing C Soriente, G Tsudik, E Uzun International Conference on Information Security, 385-400, 2008 | 174 | 2008 |
Hummingbird: Privacy at the time of twitter E De Cristofaro, C Soriente, G Tsudik, A Williams 2012 IEEE Symposium on Security and Privacy, 285-299, 2012 | 170 | 2012 |
Catch me (if you can): Data survival in unattended sensor networks R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik 2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008 | 152 | 2008 |
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure E De Cristofaro, C Soriente Proceedings of the fourth ACM conference on Wireless network security, 23-28, 2011 | 114 | 2011 |
BEDA: Button-enabled device pairing C Soriente, G Tsudik, E Uzun Cryptology ePrint Archive, 2007 | 111 | 2007 |
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata A Castiglione, A De Santis, C Soriente Journal of Systems and Software 80 (5), 750-764, 2007 | 104 | 2007 |
Participatory privacy: Enabling privacy in participatory sensing E De Cristofaro, C Soriente IEEE network 27 (1), 32-36, 2013 | 100 | 2013 |
Smartphones as Practical and Secure Location Verification Tokens for Payments. C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun NDSS 14, 23-26, 2014 | 89 | 2014 |
Data security in unattended wireless sensor networks R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik IEEE Transactions on Computers 58 (11), 1500-1511, 2009 | 89 | 2009 |
Posh: Proactive co-operative self-healing in unattended wireless sensor networks R Di Pietro, D Ma, C Soriente, G Tsudik 2008 Symposium on Reliable Distributed Systems, 185-194, 2008 | 88 | 2008 |
Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI) E De Cristofaro, C Soriente IEEE Transactions on Information Forensics and Security 8 (12), 2021-2033, 2013 | 65 | 2013 |
New adversary and new threats: security in unattended sensor networks D Ma, C Soriente, G Tsudik IEEE network 23 (2), 43-48, 2009 | 61 | 2009 |
Collaborative authentication in unattended wsns R Di Pietro, C Soriente, A Spognardi, G Tsudik Proceedings of the second ACM conference on Wireless network security, 237-244, 2009 | 58 | 2009 |
Solving revocation with efficient update of anonymous credentials J Camenisch, M Kohlweiss, C Soriente International Conference on Security and Cryptography for Networks, 454-471, 2010 | 51 | 2010 |
Security and privacy issues in the Portable Document Format A Castiglione, A De Santis, C Soriente Journal of Systems and Software 83 (10), 1813-1822, 2010 | 49 | 2010 |
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik Ad Hoc Networks 7 (8), 1463-1475, 2009 | 49 | 2009 |