Claudio Soriente
Claudio Soriente
NEC Labs
Verified email at neclab.eu
TitleCited byYear
Streamcloud: An elastic and scalable data streaming system
V Gulisano, R Jimenez-Peris, M Patino-Martinez, C Soriente, P Valduriez
IEEE Transactions on Parallel and Distributed Systems 23 (12), 2351-2365, 2012
3152012
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
International Workshop on Public Key Cryptography, 481-500, 2009
2372009
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1902009
HAPADEP: human-assisted pure audio device pairing
C Soriente, G Tsudik, E Uzun
International Conference on Information Security, 385-400, 2008
1502008
Hummingbird: Privacy at the time of twitter
E De Cristofaro, C Soriente, G Tsudik, A Williams
2012 IEEE Symposium on Security and Privacy, 285-299, 2012
1442012
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1402008
Sound-proof: usable two-factor authentication based on ambient sound
N Karapanos, C Marforio, C Soriente, S Capkun
24th {USENIX} Security Symposium ({USENIX} Security 15), 483-498, 2015
1132015
BEDA: Button-enabled device association
C Soriente, G Tsudik, E Uzun
992007
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
E De Cristofaro, C Soriente
Proceedings of the fourth ACM conference on Wireless network security, 23-28, 2011
942011
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
A Castiglione, A De Santis, C Soriente
Journal of Systems and Software 80 (5), 750-764, 2007
932007
Participatory privacy: Enabling privacy in participatory sensing
E De Cristofaro, C Soriente
IEEE network 27 (1), 32-36, 2013
882013
Data security in unattended wireless sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
IEEE Transactions on Computers 58 (11), 1500-1511, 2009
832009
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
2008 Symposium on Reliable Distributed Systems, 185-194, 2008
832008
Smartphones as Practical and Secure Location Verification Tokens for Payments.
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
NDSS 14, 23-26, 2014
712014
Collaborative authentication in unattended WSNs
R Di Pietro, C Soriente, A Spognardi, G Tsudik
Proceedings of the second ACM conference on Wireless network security, 237-244, 2009
532009
Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI)
E De Cristofaro, C Soriente
IEEE Transactions on Information Forensics and Security 8 (12), 2021-2033, 2013
502013
New adversary and new threats: security in unattended sensor networks
D Ma, C Soriente, G Tsudik
IEEE network 23 (2), 43-48, 2009
502009
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
Ad Hoc Networks 7 (8), 1463-1475, 2009
482009
Intrusion-resilience in mobile unattended WSNs
R Di Pietro, G Oligeri, C Soriente, G Tsudik
2010 Proceedings IEEE INFOCOM, 1-9, 2010
452010
Using audio in secure device pairing
MT Goodrich, M Sirivianos, J Solis, C Soriente, G Tsudik, E Uzun
International Journal of Security and Networks 4 (1-2), 57-68, 2009
422009
The system can't perform the operation now. Try again later.
Articles 1–20