Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Claudio Soriente
@inproceedings{DBLP:conf/acsac/BriongosKSW23, author = {Samira Briongos and Ghassan Karame and Claudio Soriente and Annika Wilde}, title = {No Forking Way: Detecting Cloning Attacks on Intel {SGX} Applications}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {744--758}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627187}, doi = {10.1145/3627106.3627187}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BriongosKSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Balbas0VRS23, author = {David Balb{\'{a}}s and Dario Fiore and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Damien Robissout and Claudio Soriente}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1437--1451}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623160}, doi = {10.1145/3576915.3623160}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Balbas0VRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-02208, author = {Elina van Kempen and Qifei Li and Giorgia Azzurra Marson and Claudio Soriente}, title = {{LISA:} LIghtweight single-server Secure Aggregation with a public source of randomness}, journal = {CoRR}, volume = {abs/2308.02208}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.02208}, doi = {10.48550/ARXIV.2308.02208}, eprinttype = {arXiv}, eprint = {2308.02208}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-02208.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-03002, author = {Samira Briongos and Ghassan Karame and Claudio Soriente and Annika Wilde}, title = {No Forking Way: Detecting Cloning Attacks on Intel {SGX} Applications}, journal = {CoRR}, volume = {abs/2310.03002}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.03002}, doi = {10.48550/ARXIV.2310.03002}, eprinttype = {arXiv}, eprint = {2310.03002}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-03002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalbasFVRS23, author = {David Balb{\'{a}}s and Dario Fiore and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Damien Robissout and Claudio Soriente}, title = {Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1342}, year = {2023}, url = {https://eprint.iacr.org/2023/1342}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalbasFVRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/SforzinMSK22, author = {Alessandro Sforzin and Matteo Maso and Claudio Soriente and Ghassan Karame}, title = {On the Storage Overhead of Proof-of-Work Blockchains}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2022, Espoo, Finland, August 22-25, 2022}, pages = {258--265}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/Blockchain55522.2022.00043}, doi = {10.1109/BLOCKCHAIN55522.2022.00043}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/SforzinMSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FaonioVST22, author = {Antonio Faonio and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Claudio Soriente and Hien Thi Thu Truong}, editor = {Alastair R. Beresford and Arpita Patra and Emanuele Bellini}, title = {Auditable Asymmetric Password Authenticated Public Key Establishment}, booktitle = {Cryptology and Network Security - 21st International Conference, {CANS} 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13641}, pages = {122--142}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20974-1\_6}, doi = {10.1007/978-3-031-20974-1\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/FaonioVST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FaonioFNS22, author = {Antonio Faonio and Dario Fiore and Luca Nizzardo and Claudio Soriente}, editor = {Steven D. Galbraith}, title = {Subversion-Resilient Enhanced Privacy {ID}}, booktitle = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, pages = {562--588}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6\_23}, doi = {10.1007/978-3-030-95312-6\_23}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/FaonioFNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FioreGKST22, author = {Dario Fiore and Lydia Garms and Dimitris Kolonelos and Claudio Soriente and Ida Tucker}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Ring Signatures with User-Controlled Linkability}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {405--426}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_20}, doi = {10.1007/978-3-031-17146-8\_20}, timestamp = {Tue, 27 Sep 2022 21:07:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FioreGKST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiangSK22, author = {Jianyu Jiang and Claudio Soriente and Ghassan Karame}, title = {On the Challenges of Detecting Side-Channel Attacks in {SGX}}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {86--98}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545972}, doi = {10.1145/3545948.3545972}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/JiangSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-04108, author = {Alessandro Sforzin and Matteo Maso and Claudio Soriente and Ghassan Karame}, title = {On the Storage Overhead of Proof-of-Work Blockchains}, journal = {CoRR}, volume = {abs/2205.04108}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.04108}, doi = {10.48550/ARXIV.2205.04108}, eprinttype = {arXiv}, eprint = {2205.04108}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-04108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreGKST22, author = {Dario Fiore and Lydia Garms and Dimitris Kolonelos and Claudio Soriente and Ida Tucker}, title = {Ring Signatures with User-Controlled Linkability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1743}, year = {2022}, url = {https://eprint.iacr.org/2022/1743}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FioreGKST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AmbronaFS21, author = {Miguel Ambrona and Dario Fiore and Claudio Soriente}, title = {Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {1}, pages = {21--42}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0003}, doi = {10.2478/POPETS-2021-0003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/AmbronaFS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VascoPS21, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Angel L. P{\'{e}}rez del Pozo and Claudio Soriente}, title = {A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1336--1353}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2919013}, doi = {10.1109/TDSC.2019.2919013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/VascoPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/GonzalezSCGIN21, author = {Roberto Gonzalez and Claudio Soriente and Juan Miguel Carrascosa and Alberto Garc{\'{\i}}a{-}Dur{\'{a}}n and Costas Iordanou and Mathias Niepert}, editor = {Georg Carle and J{\"{o}}rg Ott}, title = {User profiling by network observers}, booktitle = {CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7 - 10, 2021}, pages = {212--222}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485983.3494859}, doi = {10.1145/3485983.3494859}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/GonzalezSCGIN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-14599, author = {Jianyu Jiang and Claudio Soriente and Ghassan Karame}, title = {Monitoring Performance Metrics is not Enough to Detect Side-Channel Attacks on Intel {SGX}}, journal = {CoRR}, volume = {abs/2011.14599}, year = {2020}, url = {https://arxiv.org/abs/2011.14599}, eprinttype = {arXiv}, eprint = {2011.14599}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-14599.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioVST20, author = {Antonio Faonio and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Claudio Soriente and Hien Thi Thu Truong}, title = {Auditable Asymmetric Password Authenticated Public Key Establishment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2020}, url = {https://eprint.iacr.org/2020/060}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioVST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioFNS20, author = {Antonio Faonio and Dario Fiore and Luca Nizzardo and Claudio Soriente}, title = {Subversion-Resilient Enhanced Privacy {ID}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1450}, year = {2020}, url = {https://eprint.iacr.org/2020/1450}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaonioFNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/KarameSLC19, author = {Ghassan O. Karame and Claudio Soriente and Krzysztof Lichota and Srdjan Capkun}, title = {Securing Cloud Data Under Key Exposure}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {7}, number = {3}, pages = {838--849}, year = {2019}, url = {https://doi.org/10.1109/TCC.2017.2670559}, doi = {10.1109/TCC.2017.2670559}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/KarameSLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/PerinoVS19, author = {Diego Perino and Matteo Varvello and Claudio Soriente}, title = {Long-term Measurement and Analysis of the Free Proxy Ecosystem}, journal = {{ACM} Trans. Web}, volume = {13}, number = {4}, pages = {18:1--18:22}, year = {2019}, url = {https://doi.org/10.1145/3360695}, doi = {10.1145/3360695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/PerinoVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/TruongAKS19, author = {Hien Thi Thu Truong and Miguel Almeida and Ghassan Karame and Claudio Soriente}, title = {Towards Secure and Decentralized Sharing of IoT Data}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {176--183}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00031}, doi = {10.1109/BLOCKCHAIN.2019.00031}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/TruongAKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/IordanouKCSCL19, author = {Costas Iordanou and Nicolas Kourtellis and Juan Miguel Carrascosa and Claudio Soriente and Rub{\'{e}}n Cuevas and Nikolaos Laoutaris}, editor = {Aziz Mohaisen and Zhi{-}Li Zhang}, title = {Beyond content analysis: detecting targeted ads via distributed counting}, booktitle = {Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, CoNEXT 2019, Orlando, FL, USA, December 09-12, 2019}, pages = {110--122}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359989.3365428}, doi = {10.1145/3359989.3365428}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/IordanouKCSCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SorienteKLF19, author = {Claudio Soriente and Ghassan Karame and Wenting Li and Sergey Fedorov}, title = {ReplicaTEE: Enabling Seamless Replication of {SGX} Enclaves in the Cloud}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {158--171}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00021}, doi = {10.1109/EUROSP.2019.00021}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/SorienteKLF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/TruongTNSTA19, author = {Hien Thi Thu Truong and Juhani Toivonen and Thien Duc Nguyen and Claudio Soriente and Sasu Tarkoma and N. Asokan}, title = {DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification}, booktitle = {2019 {IEEE} International Conference on Pervasive Computing and Communications, PerCom, Kyoto, Japan, March 11-15, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PERCOM.2019.8767404}, doi = {10.1109/PERCOM.2019.8767404}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/TruongTNSTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-01862, author = {Costas Iordanou and Nicolas Kourtellis and Juan Miguel Carrascosa and Claudio Soriente and Rub{\'{e}}n Cuevas and Nikolaos Laoutaris}, title = {Beyond content analysis: Detecting targeted ads via distributed counting}, journal = {CoRR}, volume = {abs/1907.01862}, year = {2019}, url = {http://arxiv.org/abs/1907.01862}, eprinttype = {arXiv}, eprint = {1907.01862}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01862.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-09015, author = {Hien Thi Thu Truong and Miguel Almeida and Ghassan Karame and Claudio Soriente}, title = {Towards Secure and Decentralized Sharing of IoT Data}, journal = {CoRR}, volume = {abs/1908.09015}, year = {2019}, url = {http://arxiv.org/abs/1908.09015}, eprinttype = {arXiv}, eprint = {1908.09015}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-09015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RitzdorfSKMGC18, author = {Hubert Ritzdorf and Claudio Soriente and Ghassan O. Karame and Srdjan Marinovic and Damian Gruber and Srdjan Capkun}, title = {Toward Shared Ownership in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3019--3034}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2837648}, doi = {10.1109/TIFS.2018.2837648}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/RitzdorfSKMGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CerulliCS18, author = {Andrea Cerulli and Emiliano De Cristofaro and Claudio Soriente}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Nothing Refreshes Like a RePSI: Reactive Private Set Intersection}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {280--300}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_15}, doi = {10.1007/978-3-319-93387-0\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/CerulliCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/PyrgelisKLSS18, author = {Apostolos Pyrgelis and Nicolas Kourtellis and Ilias Leontiadis and Joan Serr{\`{a}} and Claudio Soriente}, editor = {Naoki Abe and Huan Liu and Calton Pu and Xiaohua Hu and Nesreen K. Ahmed and Mu Qiao and Yang Song and Donald Kossmann and Bing Liu and Kisung Lee and Jiliang Tang and Jingrui He and Jeffrey S. Saltz}, title = {There goes Wally: Anonymously sharing your location gives you away}, booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018), Seattle, WA, USA, December 10-13, 2018}, pages = {1218--1227}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BigData.2018.8622184}, doi = {10.1109/BIGDATA.2018.8622184}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/PyrgelisKLSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/PerinoVS18, author = {Diego Perino and Matteo Varvello and Claudio Soriente}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {ProxyTorrent: Untangling the Free {HTTP(S)} Proxy Ecosystem}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {197--206}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186086}, doi = {10.1145/3178876.3186086}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/PerinoVS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02701, author = {Apostolos Pyrgelis and Nicolas Kourtellis and Ilias Leontiadis and Joan Serr{\`{a}} and Claudio Soriente}, title = {There goes Wally: Anonymously sharing your location gives you away}, journal = {CoRR}, volume = {abs/1806.02701}, year = {2018}, url = {http://arxiv.org/abs/1806.02701}, eprinttype = {arXiv}, eprint = {1806.02701}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02701.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-05027, author = {Claudio Soriente and Ghassan Karame and Wenting Li and Sergey Fedorov}, title = {ReplicaTEE: Enabling Seamless Replication of {SGX} Enclaves in the Cloud}, journal = {CoRR}, volume = {abs/1809.05027}, year = {2018}, url = {http://arxiv.org/abs/1809.05027}, eprinttype = {arXiv}, eprint = {1809.05027}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-05027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CerulliCS18, author = {Andrea Cerulli and Emiliano De Cristofaro and Claudio Soriente}, title = {Nothing Refreshes Like a RePSI: Reactive Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2018}, url = {https://eprint.iacr.org/2018/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CerulliCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/DArcoVPSS17, author = {Paolo D'Arco and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Angel L. P{\'{e}}rez del Pozo and Claudio Soriente and Rainer Steinwandt}, title = {Private set intersection: New generic constructions and feasibility results}, journal = {Adv. Math. Commun.}, volume = {11}, number = {3}, pages = {481--502}, year = {2017}, url = {https://doi.org/10.3934/amc.2017040}, doi = {10.3934/AMC.2017040}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/DArcoVPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/FioreVS17, author = {Dario Fiore and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Claudio Soriente}, title = {Partitioned Group Password-Based Authenticated Key Exchange}, journal = {Comput. J.}, volume = {60}, number = {12}, pages = {1912--1922}, year = {2017}, url = {https://doi.org/10.1093/comjnl/bxx078}, doi = {10.1093/COMJNL/BXX078}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/FioreVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/IordanouSSL17, author = {Costas Iordanou and Claudio Soriente and Michael Sirivianos and Nikolaos Laoutaris}, title = {Who is Fiddling with Prices?: Building and Deploying a Watchdog Service for E-commerce}, booktitle = {Proceedings of the Conference of the {ACM} Special Interest Group on Data Communication, {SIGCOMM} 2017, Los Angeles, CA, USA, August 21-25, 2017}, pages = {376--389}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098822.3098850}, doi = {10.1145/3098822.3098850}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/IordanouSSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreVS17, author = {Dario Fiore and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Claudio Soriente}, title = {Partitioned Group Password-Based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2017}, url = {http://eprint.iacr.org/2017/141}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FioreVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RitzdorfSKMGC17, author = {Hubert Ritzdorf and Claudio Soriente and Ghassan O. Karame and Srdjan Marinovic and Damian Gruber and Srdjan Capkun}, title = {Towards Shared Ownership in the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2017}, url = {http://eprint.iacr.org/2017/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RitzdorfSKMGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RitzdorfKSC16, author = {Hubert Ritzdorf and Ghassan Karame and Claudio Soriente and Srdjan Capkun}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {On Information Leakage in Deduplicated Storage Systems}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {61--72}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996432}, doi = {10.1145/2996429.2996432}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RitzdorfKSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MarforioMSKC16, author = {Claudio Marforio and Ramya Jayaram Masti and Claudio Soriente and Kari Kostiainen and Srdjan Capkun}, editor = {Long Lu and Mohammad Mannan}, title = {Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking}, booktitle = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {83--92}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994462}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MarforioMSKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/MarforioMSKC16, author = {Claudio Marforio and Ramya Jayaram Masti and Claudio Soriente and Kari Kostiainen and Srdjan Capkun}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {540--551}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858085}, doi = {10.1145/2858036.2858085}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/MarforioMSKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/GonzalezSL16, author = {Roberto Gonzalez and Claudio Soriente and Nikolaos Laoutaris}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {User Profiling in the Time of {HTTPS}}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {373--379}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987451}, timestamp = {Tue, 06 Nov 2018 11:07:19 +0100}, biburl = {https://dblp.org/rec/conf/imc/GonzalezSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/YuRMSC16, author = {Der{-}Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun}, editor = {Yingying Chen and Marco Gruteser and Y. Charlie Hu and Karthik Sundaresan}, title = {{SALVE:} server authentication with location verification}, booktitle = {Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, MobiCom 2016, New York City, NY, USA, October 3-7, 2016}, pages = {401--414}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2973750.2973766}, doi = {10.1145/2973750.2973766}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/YuRMSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YuRMSC16, author = {Der{-}Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun}, title = {{SALVE:} Server Authentication with Location VErification}, journal = {CoRR}, volume = {abs/1608.04563}, year = {2016}, url = {http://arxiv.org/abs/1608.04563}, eprinttype = {arXiv}, eprint = {1608.04563}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YuRMSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PerinoSV16, author = {Diego Perino and Claudio Soriente and Matteo Varvello}, title = {Your Are "Proxy" And {I} Know It}, journal = {CoRR}, volume = {abs/1612.06126}, year = {2016}, url = {http://arxiv.org/abs/1612.06126}, eprinttype = {arXiv}, eprint = {1612.06126}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PerinoSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MastiMKSC15, author = {Ramya Jayaram Masti and Claudio Marforio and Kari Kostiainen and Claudio Soriente and Srdjan Capkun}, title = {Logical Partitions on Many-Core Platforms}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {451--460}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818026}, doi = {10.1145/2818000.2818026}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MastiMKSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SorienteKRMC15, author = {Claudio Soriente and Ghassan O. Karame and Hubert Ritzdorf and Srdjan Marinovic and Srdjan Capkun}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Commune: Shared Ownership in an Agnostic Cloud}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {39--50}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752972}, doi = {10.1145/2752952.2752972}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SorienteKRMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KarapanosMSC15, author = {Nikolaos Karapanos and Claudio Marforio and Claudio Soriente and Srdjan Capkun}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {483--498}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/karapanos}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/KarapanosMSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MarforioMSKC15, author = {Claudio Marforio and Ramya Jayaram Masti and Claudio Soriente and Kari Kostiainen and Srdjan Capkun}, title = {Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms}, journal = {CoRR}, volume = {abs/1502.06824}, year = {2015}, url = {http://arxiv.org/abs/1502.06824}, eprinttype = {arXiv}, eprint = {1502.06824}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MarforioMSKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KarapanosMSC15, author = {Nikolaos Karapanos and Claudio Marforio and Claudio Soriente and Srdjan Capkun}, title = {Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound}, journal = {CoRR}, volume = {abs/1503.03790}, year = {2015}, url = {http://arxiv.org/abs/1503.03790}, eprinttype = {arXiv}, eprint = {1503.03790}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KarapanosMSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuRMSC15, author = {Der{-}Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun}, title = {{W-SPS:} Designing a Wide-Area Secure Positioning System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2015}, url = {http://eprint.iacr.org/2015/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuRMSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/AndroulakiSMC14, author = {Elli Androulaki and Claudio Soriente and Luka Malisa and Srdjan Capkun}, title = {Enforcing Location and Time-Based Access Control on Cloud-Stored Data}, booktitle = {{IEEE} 34th International Conference on Distributed Computing Systems, {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014}, pages = {637--648}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCS.2014.71}, doi = {10.1109/ICDCS.2014.71}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/AndroulakiSMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MarforioKSKC14, author = {Claudio Marforio and Nikolaos Karapanos and Claudio Soriente and Kari Kostiainen and Srdjan Capkun}, title = {Smartphones as Practical and Secure Location Verification Tokens for Payments}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/smartphones-practical-and-secure-location-verification-tokens-payments}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MarforioKSKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarameSLC14, author = {Ghassan O. Karame and Claudio Soriente and Krzysztof Lichota and Srdjan Capkun}, title = {Securing Cloud Data in the New Attacker Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2014}, url = {http://eprint.iacr.org/2014/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarameSLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/BarsocchiOS13, author = {Paolo Barsocchi and Gabriele Oligeri and Claudio Soriente}, title = {{SHAKE:} Single HAsh key establishment for resource constrained devices}, journal = {Ad Hoc Networks}, volume = {11}, number = {1}, pages = {288--297}, year = {2013}, url = {https://doi.org/10.1016/j.adhoc.2012.05.013}, doi = {10.1016/J.ADHOC.2012.05.013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/BarsocchiOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/CristofaroS13, author = {Emiliano De Cristofaro and Claudio Soriente}, title = {Participatory privacy: Enabling privacy in participatory sensing}, journal = {{IEEE} Netw.}, volume = {27}, number = {1}, pages = {32--36}, year = {2013}, url = {https://doi.org/10.1109/MNET.2013.6423189}, doi = {10.1109/MNET.2013.6423189}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/CristofaroS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CristofaroS13, author = {Emiliano De Cristofaro and Claudio Soriente}, title = {Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure {(PEPSI)}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {12}, pages = {2021--2033}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2287092}, doi = {10.1109/TIFS.2013.2287092}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CristofaroS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/PietroOST13, author = {Roberto Di Pietro and Gabriele Oligeri and Claudio Soriente and Gene Tsudik}, title = {United We Stand: Intrusion Resilience in Mobile Unattended WSNs}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {12}, number = {7}, pages = {1456--1468}, year = {2013}, url = {https://doi.org/10.1109/TMC.2012.126}, doi = {10.1109/TMC.2012.126}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/PietroOST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MarforioKSKC13, author = {Claudio Marforio and Nikolaos Karapanos and Claudio Soriente and Kari Kostiainen and Srdjan Capkun}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Secure enrollment and practical migration for mobile trusted execution environments}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {93--98}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516764}, doi = {10.1145/2516760.2516764}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MarforioKSKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CristofaroS13, author = {Emiliano De Cristofaro and Claudio Soriente}, title = {Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure {(PEPSI)}}, journal = {CoRR}, volume = {abs/1308.2921}, year = {2013}, url = {http://arxiv.org/abs/1308.2921}, eprinttype = {arXiv}, eprint = {1308.2921}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CristofaroS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SorienteKRMC13, author = {Claudio Soriente and Ghassan Karame and Hubert Ritzdorf and Srdjan Marinovic and Srdjan Capkun}, title = {Commune: Shared Ownership in an Agnostic Cloud}, journal = {CoRR}, volume = {abs/1311.6236}, year = {2013}, url = {http://arxiv.org/abs/1311.6236}, eprinttype = {arXiv}, eprint = {1311.6236}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SorienteKRMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/CristofaroSTW12, author = {Emiliano De Cristofaro and Claudio Soriente and Gene Tsudik and Andrew Williams}, title = {Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs}, journal = {{IEEE} Data Eng. Bull.}, volume = {35}, number = {4}, pages = {93--100}, year = {2012}, url = {http://sites.computer.org/debull/A12dec/humming.pdf}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/debu/CristofaroSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/PietroMST12, author = {Roberto Di Pietro and Di Ma and Claudio Soriente and Gene Tsudik}, title = {Self-healing in unattended wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {9}, number = {1}, pages = {7:1--7:21}, year = {2012}, url = {https://doi.org/10.1145/2379799.2379806}, doi = {10.1145/2379799.2379806}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosn/PietroMST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/GulisanoJPSV12, author = {Vincenzo Gulisano and Ricardo Jim{\'{e}}nez{-}Peris and Marta Pati{\~{n}}o{-}Mart{\'{\i}}nez and Claudio Soriente and Patrick Valduriez}, title = {StreamCloud: An Elastic and Scalable Data Streaming System}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {23}, number = {12}, pages = {2351--2365}, year = {2012}, url = {https://doi.org/10.1109/TPDS.2012.24}, doi = {10.1109/TPDS.2012.24}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/GulisanoJPSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/DArcoVPS12, author = {Paolo D'Arco and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Angel L. P{\'{e}}rez del Pozo and Claudio Soriente}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Size-Hiding in Private Set Intersection: Existential Results and Constructions}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {378--394}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_23}, doi = {10.1007/978-3-642-31410-0\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/DArcoVPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ManciniSSVV12, author = {Luigi Vincenzo Mancini and Angelo Spognardi and Claudio Soriente and Antonio Villani and Domenico Vitali}, title = {Relieve Internet Routing Security of Public Key Infrastructure}, booktitle = {21st International Conference on Computer Communications and Networks, {ICCCN} 2012, Munich, Germany, July 30 - August 2, 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCCN.2012.6289235}, doi = {10.1109/ICCCN.2012.6289235}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/ManciniSSVV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CristofaroSTW12, author = {Emiliano De Cristofaro and Claudio Soriente and Gene Tsudik and Andrew Williams}, title = {Hummingbird: Privacy at the Time of Twitter}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {285--299}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.26}, doi = {10.1109/SP.2012.26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CristofaroSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1201-4376, author = {Emiliano De Cristofaro and Claudio Soriente}, title = {Participatory Privacy: Enabling Privacy in Participatory Sensing}, journal = {CoRR}, volume = {abs/1201.4376}, year = {2012}, url = {http://arxiv.org/abs/1201.4376}, eprinttype = {arXiv}, eprint = {1201.4376}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1201-4376.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/GulisanoJPSV12, author = {Vincenzo Gulisano and Ricardo Jim{\'{e}}nez{-}Peris and Marta Pati{\~{n}}o{-}Mart{\'{\i}}nez and Claudio Soriente and Patrick Valduriez}, title = {A Big Data Platform for Large Scale Event Processing}, journal = {{ERCIM} News}, volume = {2012}, number = {89}, year = {2012}, url = {http://ercim-news.ercim.eu/en89/special/a-big-data-platform-for-large-scale-event-processing}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/GulisanoJPSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/PietroSST11, author = {Roberto Di Pietro and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Intrusion-resilient integrity in data-centric unattended WSNs}, journal = {Pervasive Mob. Comput.}, volume = {7}, number = {4}, pages = {495--508}, year = {2011}, url = {https://doi.org/10.1016/j.pmcj.2010.12.003}, doi = {10.1016/J.PMCJ.2010.12.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/PietroSST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/MaS11, author = {Di Ma and Claudio Soriente}, title = {Building Trust for lambda-Congenial Secret Groups}, booktitle = {2011 International Conference on Broadband, Wireless Computing, Communication and Applications, {BWCCA} 2011, Barcelona, Spain, October 26-28, 2011}, pages = {222--229}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/BWCCA.2011.35}, doi = {10.1109/BWCCA.2011.35}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bwcca/MaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CristofaroS11, author = {Emiliano De Cristofaro and Claudio Soriente}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: {PEPSI} - privacy-enhanced participatory sensing infrastructure}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {23--28}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998418}, doi = {10.1145/1998412.1998418}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CristofaroS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroSTW11, author = {Emiliano De Cristofaro and Claudio Soriente and Gene Tsudik and Andrew Williams}, title = {Hummingbird: Privacy at the time of Twitter}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2011}, url = {http://eprint.iacr.org/2011/640}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroSTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/CastiglioneSS10, author = {Aniello Castiglione and Alfredo De Santis and Claudio Soriente}, title = {Security and privacy issues in the Portable Document Format}, journal = {J. Syst. Softw.}, volume = {83}, number = {10}, pages = {1813--1822}, year = {2010}, url = {https://doi.org/10.1016/j.jss.2010.04.062}, doi = {10.1016/J.JSS.2010.04.062}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/CastiglioneSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PietroOST10, author = {Roberto Di Pietro and Gabriele Oligeri and Claudio Soriente and Gene Tsudik}, title = {Intrusion-Resilience in Mobile Unattended WSNs}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {2303--2311}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462056}, doi = {10.1109/INFCOM.2010.5462056}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/PietroOST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CamenischKS10, author = {Jan Camenisch and Markulf Kohlweiss and Claudio Soriente}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Solving Revocation with Efficient Update of Anonymous Credentials}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {454--471}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_28}, doi = {10.1007/978-3-642-15317-4\_28}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/CamenischKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/PietroOST10, author = {Roberto Di Pietro and Gabriele Oligeri and Claudio Soriente and Gene Tsudik}, title = {Securing Mobile Unattended WSNs against a Mobile Adversary}, booktitle = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010), New Delhi, Punjab, India, October 31 - November 3, 2010}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SRDS.2010.10}, doi = {10.1109/SRDS.2010.10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/PietroOST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/LombardiPS10, author = {Flavio Lombardi and Roberto Di Pietro and Claudio Soriente}, title = {CReW: Cloud Resilience for Windows Guests through Monitored Virtualization}, booktitle = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010), New Delhi, Punjab, India, October 31 - November 3, 2010}, pages = {338--342}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SRDS.2010.48}, doi = {10.1109/SRDS.2010.48}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/LombardiPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/PietroMSST09, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {8}, pages = {1463--1475}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2009.04.002}, doi = {10.1016/J.ADHOC.2009.04.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/PietroMSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SorienteTU09, author = {Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {Secure pairing of interface constrained devices}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {17--26}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023423}, doi = {10.1504/IJSN.2009.023423}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SorienteTU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GoodrichSSSTU09, author = {Michael T. Goodrich and Michael Sirivianos and John Solis and Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {Using audio in secure device pairing}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {57--68}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023426}, doi = {10.1504/IJSN.2009.023426}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/GoodrichSSSTU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/MaST09, author = {Di Ma and Claudio Soriente and Gene Tsudik}, title = {New adversary and new threats: security in unattended sensor networks}, journal = {{IEEE} Netw.}, volume = {23}, number = {2}, pages = {43--48}, year = {2009}, url = {https://doi.org/10.1109/MNET.2009.4804335}, doi = {10.1109/MNET.2009.4804335}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/MaST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/PietroMSST09, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Data Security in Unattended Wireless Sensor Networks}, journal = {{IEEE} Trans. Computers}, volume = {58}, number = {11}, pages = {1500--1511}, year = {2009}, url = {https://doi.org/10.1109/TC.2009.109}, doi = {10.1109/TC.2009.109}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/PietroMSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CastellucciaFPS09, author = {Claude Castelluccia and Aur{\'{e}}lien Francillon and Daniele Perito and Claudio Soriente}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {On the difficulty of software-based attestation of embedded devices}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {400--409}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653711}, doi = {10.1145/1653662.1653711}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CastellucciaFPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CamenischKS09, author = {Jan Camenisch and Markulf Kohlweiss and Claudio Soriente}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {481--500}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_27}, doi = {10.1007/978-3-642-00468-1\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CamenischKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PietroSST09, author = {Roberto Di Pietro and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Collaborative authentication in unattended WSNs}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {237--244}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514307}, doi = {10.1145/1514274.1514307}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/PietroSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SorienteTU08, author = {Claudio Soriente and Gene Tsudik and Ersin Uzun}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {{HAPADEP:} Human-Assisted Pure Audio Device Pairing}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {385--400}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_27}, doi = {10.1007/978-3-540-85886-7\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/SorienteTU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/PietroMSST08, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Catch Me (If You Can): Data Survival in Unattended Sensor Networks}, booktitle = {Sixth Annual {IEEE} International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong}, pages = {185--194}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PERCOM.2008.31}, doi = {10.1109/PERCOM.2008.31}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/PietroMSST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/PietroMST08, author = {Roberto Di Pietro and Di Ma and Claudio Soriente and Gene Tsudik}, title = {{POSH:} Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks}, booktitle = {27th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2008), Napoli, Italy, October 6-8, 2008}, pages = {185--194}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SRDS.2008.23}, doi = {10.1109/SRDS.2008.23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/PietroMST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/CastellucciaS08, author = {Claude Castelluccia and Claudio Soriente}, editor = {Holger Karl and Dirk Westhoff}, title = {{ABBA:} {A} Balls and bins approach to secure aggregation in WSNs}, booktitle = {6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, {WIOPT} 2008, March 31 - April 4, 2008, Berlin, Germany}, pages = {185--191}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/WIOPT.2008.4586063}, doi = {10.1109/WIOPT.2008.4586063}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wiopt/CastellucciaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PietroMSST08, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2008}, url = {http://eprint.iacr.org/2008/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PietroMSST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischKS08, author = {Jan Camenisch and Markulf Kohlweiss and Claudio Soriente}, title = {An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2008}, url = {http://eprint.iacr.org/2008/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/CastiglioneSS07, author = {Aniello Castiglione and Alfredo De Santis and Claudio Soriente}, title = {Taking advantages of a disadvantage: Digital forensics and steganography using document metadata}, journal = {J. Syst. Softw.}, volume = {80}, number = {5}, pages = {750--764}, year = {2007}, url = {https://doi.org/10.1016/j.jss.2006.07.006}, doi = {10.1016/J.JSS.2006.07.006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/CastiglioneSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SantisS07, author = {Alfredo De Santis and Claudio Soriente}, title = {Modified Original Smart Cards and Smart Card Clone Countermeasures}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {878--882}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.187}, doi = {10.1109/CIS.2007.187}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SantisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SorienteTU07, author = {Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {{HAPADEP:} Human Asisted Pure Audio Device Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2007}, url = {http://eprint.iacr.org/2007/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SorienteTU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SorienteTU07a, author = {Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {{BEDA:} Button-Enabled Device Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2007}, url = {http://eprint.iacr.org/2007/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SorienteTU07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/SantisS04, author = {Alfredo De Santis and Claudio Soriente}, title = {A blocker-proof conditional access system}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {50}, number = {2}, pages = {591--596}, year = {2004}, url = {https://doi.org/10.1109/TCE.2004.1309432}, doi = {10.1109/TCE.2004.1309432}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tce/SantisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.