Luigi Vincenzo Mancini
Luigi Vincenzo Mancini
University Professor, Sapienza Universita` di Roma, Italy
Dirección de correo verificada de di.uniroma1.it - Página principal
Título
Citado por
Citado por
Año
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
14432008
Random key-assignment for secure wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
3992003
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
2922007
Distributed detection of clone attacks in wireless sensor networks
M Conti, R Di Pietro, L Mancini, A Mei
IEEE transactions on dependable and secure computing 8 (5), 685-698, 2010
2212010
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
R Di Pietro, LV Mancini, YW Law, S Etalle, P Havinga
2003 International Conference on Parallel Processing Workshops, 2003 …, 2003
2052003
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici
International Journal of Security and Networks 10 (3), 137-150, 2015
1822015
Intrusion detection systems
R Di Pietro, LV Mancini
Springer Science & Business Media, 2008
1782008
A graph-based formalism for RBAC
M Koch, LV Mancini, F Parisi-Presicce
ACM Transactions on Information and System Security (TISSEC) 5 (3), 332-365, 2002
1672002
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
1572015
REMUS: A security-enhanced operating system
M Bernaschi, E Gabrielli, LV Mancini
ACM Transactions on Information and System Security (TISSEC) 5 (1), 36-61, 2002
1492002
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1462008
Fault-tolerant rate-monotonic first-fit scheduling in hard-real-time systems
AA Bertossi, LV Mancini, F Rossini
IEEE Transactions on Parallel and Distributed Systems 10 (9), 934-945, 1999
1441999
pDCS: Security and privacy support for data-centric sensor networks
M Shao, S Zhu, W Zhang, G Cao, Y Yang
IEEE Transactions on Mobile Computing 8 (8), 1023-1038, 2008
1332008
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the first ACM conference on Wireless network security, 214-219, 2008
1172008
Operating system enhancements to prevent the misuse of system calls
M Bernaschi, E Gabrielli, LV Mancini
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1112000
Redoubtable sensor networks
R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan
ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-22, 2008
1072008
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Wireless Networks 12 (6), 709-721, 2006
1052006
Secure dynamic fragment and replica allocation in large-scale distributed file systems
A Mei, LV Mancini, S Jajodia
IEEE Transactions on Parallel and Distributed systems 14 (9), 885-896, 2003
1052003
Security and privacy issues of handheld and wearable wireless devices
R Di Pietro, LV Mancini
Communications of the ACM 46 (9), 74-79, 2003
1032003
Towards a formal model for security policies specification and validation in the selinux system
G Zanin, LV Mancini
Proceedings of the ninth ACM symposium on Access control models and …, 2004
1002004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20