BibTeX records: Claudio Soriente

download as .bib file

@inproceedings{DBLP:conf/acsac/BriongosKSW23,
  author       = {Samira Briongos and
                  Ghassan Karame and
                  Claudio Soriente and
                  Annika Wilde},
  title        = {No Forking Way: Detecting Cloning Attacks on Intel {SGX} Applications},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {744--758},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627187},
  doi          = {10.1145/3627106.3627187},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BriongosKSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Balbas0VRS23,
  author       = {David Balb{\'{a}}s and
                  Dario Fiore and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Damien Robissout and
                  Claudio Soriente},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Modular Sumcheck Proofs with Applications to Machine Learning and
                  Image Processing},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1437--1451},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623160},
  doi          = {10.1145/3576915.3623160},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Balbas0VRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-02208,
  author       = {Elina van Kempen and
                  Qifei Li and
                  Giorgia Azzurra Marson and
                  Claudio Soriente},
  title        = {{LISA:} LIghtweight single-server Secure Aggregation with a public
                  source of randomness},
  journal      = {CoRR},
  volume       = {abs/2308.02208},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.02208},
  doi          = {10.48550/ARXIV.2308.02208},
  eprinttype    = {arXiv},
  eprint       = {2308.02208},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-02208.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-03002,
  author       = {Samira Briongos and
                  Ghassan Karame and
                  Claudio Soriente and
                  Annika Wilde},
  title        = {No Forking Way: Detecting Cloning Attacks on Intel {SGX} Applications},
  journal      = {CoRR},
  volume       = {abs/2310.03002},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.03002},
  doi          = {10.48550/ARXIV.2310.03002},
  eprinttype    = {arXiv},
  eprint       = {2310.03002},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-03002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalbasFVRS23,
  author       = {David Balb{\'{a}}s and
                  Dario Fiore and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Damien Robissout and
                  Claudio Soriente},
  title        = {Modular Sumcheck Proofs with Applications to Machine Learning and
                  Image Processing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1342},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1342},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalbasFVRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/SforzinMSK22,
  author       = {Alessandro Sforzin and
                  Matteo Maso and
                  Claudio Soriente and
                  Ghassan Karame},
  title        = {On the Storage Overhead of Proof-of-Work Blockchains},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2022, Espoo,
                  Finland, August 22-25, 2022},
  pages        = {258--265},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/Blockchain55522.2022.00043},
  doi          = {10.1109/BLOCKCHAIN55522.2022.00043},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/SforzinMSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FaonioVST22,
  author       = {Antonio Faonio and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Claudio Soriente and
                  Hien Thi Thu Truong},
  editor       = {Alastair R. Beresford and
                  Arpita Patra and
                  Emanuele Bellini},
  title        = {Auditable Asymmetric Password Authenticated Public Key Establishment},
  booktitle    = {Cryptology and Network Security - 21st International Conference, {CANS}
                  2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13641},
  pages        = {122--142},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20974-1\_6},
  doi          = {10.1007/978-3-031-20974-1\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/FaonioVST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FaonioFNS22,
  author       = {Antonio Faonio and
                  Dario Fiore and
                  Luca Nizzardo and
                  Claudio Soriente},
  editor       = {Steven D. Galbraith},
  title        = {Subversion-Resilient Enhanced Privacy {ID}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {562--588},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_23},
  doi          = {10.1007/978-3-030-95312-6\_23},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FaonioFNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FioreGKST22,
  author       = {Dario Fiore and
                  Lydia Garms and
                  Dimitris Kolonelos and
                  Claudio Soriente and
                  Ida Tucker},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Ring Signatures with User-Controlled Linkability},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {405--426},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_20},
  doi          = {10.1007/978-3-031-17146-8\_20},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FioreGKST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiangSK22,
  author       = {Jianyu Jiang and
                  Claudio Soriente and
                  Ghassan Karame},
  title        = {On the Challenges of Detecting Side-Channel Attacks in {SGX}},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {86--98},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545972},
  doi          = {10.1145/3545948.3545972},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/JiangSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-04108,
  author       = {Alessandro Sforzin and
                  Matteo Maso and
                  Claudio Soriente and
                  Ghassan Karame},
  title        = {On the Storage Overhead of Proof-of-Work Blockchains},
  journal      = {CoRR},
  volume       = {abs/2205.04108},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.04108},
  doi          = {10.48550/ARXIV.2205.04108},
  eprinttype    = {arXiv},
  eprint       = {2205.04108},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-04108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreGKST22,
  author       = {Dario Fiore and
                  Lydia Garms and
                  Dimitris Kolonelos and
                  Claudio Soriente and
                  Ida Tucker},
  title        = {Ring Signatures with User-Controlled Linkability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1743},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1743},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreGKST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AmbronaFS21,
  author       = {Miguel Ambrona and
                  Dario Fiore and
                  Claudio Soriente},
  title        = {Controlled Functional Encryption Revisited: Multi-Authority Extensions
                  and Efficient Schemes for Quadratic Functions},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {1},
  pages        = {21--42},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0003},
  doi          = {10.2478/POPETS-2021-0003},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/AmbronaFS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VascoPS21,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Angel L. P{\'{e}}rez del Pozo and
                  Claudio Soriente},
  title        = {A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated
                  Key Exchange Protocols},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1336--1353},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2919013},
  doi          = {10.1109/TDSC.2019.2919013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/VascoPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/GonzalezSCGIN21,
  author       = {Roberto Gonzalez and
                  Claudio Soriente and
                  Juan Miguel Carrascosa and
                  Alberto Garc{\'{\i}}a{-}Dur{\'{a}}n and
                  Costas Iordanou and
                  Mathias Niepert},
  editor       = {Georg Carle and
                  J{\"{o}}rg Ott},
  title        = {User profiling by network observers},
  booktitle    = {CoNEXT '21: The 17th International Conference on emerging Networking
                  EXperiments and Technologies, Virtual Event, Munich, Germany, December
                  7 - 10, 2021},
  pages        = {212--222},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485983.3494859},
  doi          = {10.1145/3485983.3494859},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/GonzalezSCGIN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-14599,
  author       = {Jianyu Jiang and
                  Claudio Soriente and
                  Ghassan Karame},
  title        = {Monitoring Performance Metrics is not Enough to Detect Side-Channel
                  Attacks on Intel {SGX}},
  journal      = {CoRR},
  volume       = {abs/2011.14599},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.14599},
  eprinttype    = {arXiv},
  eprint       = {2011.14599},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-14599.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioVST20,
  author       = {Antonio Faonio and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Claudio Soriente and
                  Hien Thi Thu Truong},
  title        = {Auditable Asymmetric Password Authenticated Public Key Establishment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/060},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioVST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioFNS20,
  author       = {Antonio Faonio and
                  Dario Fiore and
                  Luca Nizzardo and
                  Claudio Soriente},
  title        = {Subversion-Resilient Enhanced Privacy {ID}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1450},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1450},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioFNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/KarameSLC19,
  author       = {Ghassan O. Karame and
                  Claudio Soriente and
                  Krzysztof Lichota and
                  Srdjan Capkun},
  title        = {Securing Cloud Data Under Key Exposure},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {7},
  number       = {3},
  pages        = {838--849},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCC.2017.2670559},
  doi          = {10.1109/TCC.2017.2670559},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/KarameSLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/PerinoVS19,
  author       = {Diego Perino and
                  Matteo Varvello and
                  Claudio Soriente},
  title        = {Long-term Measurement and Analysis of the Free Proxy Ecosystem},
  journal      = {{ACM} Trans. Web},
  volume       = {13},
  number       = {4},
  pages        = {18:1--18:22},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360695},
  doi          = {10.1145/3360695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tweb/PerinoVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/TruongAKS19,
  author       = {Hien Thi Thu Truong and
                  Miguel Almeida and
                  Ghassan Karame and
                  Claudio Soriente},
  title        = {Towards Secure and Decentralized Sharing of IoT Data},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {176--183},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00031},
  doi          = {10.1109/BLOCKCHAIN.2019.00031},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/TruongAKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/IordanouKCSCL19,
  author       = {Costas Iordanou and
                  Nicolas Kourtellis and
                  Juan Miguel Carrascosa and
                  Claudio Soriente and
                  Rub{\'{e}}n Cuevas and
                  Nikolaos Laoutaris},
  editor       = {Aziz Mohaisen and
                  Zhi{-}Li Zhang},
  title        = {Beyond content analysis: detecting targeted ads via distributed counting},
  booktitle    = {Proceedings of the 15th International Conference on Emerging Networking
                  Experiments And Technologies, CoNEXT 2019, Orlando, FL, USA, December
                  09-12, 2019},
  pages        = {110--122},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359989.3365428},
  doi          = {10.1145/3359989.3365428},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/IordanouKCSCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SorienteKLF19,
  author       = {Claudio Soriente and
                  Ghassan Karame and
                  Wenting Li and
                  Sergey Fedorov},
  title        = {ReplicaTEE: Enabling Seamless Replication of {SGX} Enclaves in the
                  Cloud},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {158--171},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00021},
  doi          = {10.1109/EUROSP.2019.00021},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/SorienteKLF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/TruongTNSTA19,
  author       = {Hien Thi Thu Truong and
                  Juhani Toivonen and
                  Thien Duc Nguyen and
                  Claudio Soriente and
                  Sasu Tarkoma and
                  N. Asokan},
  title        = {DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence
                  Verification},
  booktitle    = {2019 {IEEE} International Conference on Pervasive Computing and Communications,
                  PerCom, Kyoto, Japan, March 11-15, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PERCOM.2019.8767404},
  doi          = {10.1109/PERCOM.2019.8767404},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/TruongTNSTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-01862,
  author       = {Costas Iordanou and
                  Nicolas Kourtellis and
                  Juan Miguel Carrascosa and
                  Claudio Soriente and
                  Rub{\'{e}}n Cuevas and
                  Nikolaos Laoutaris},
  title        = {Beyond content analysis: Detecting targeted ads via distributed counting},
  journal      = {CoRR},
  volume       = {abs/1907.01862},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.01862},
  eprinttype    = {arXiv},
  eprint       = {1907.01862},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-01862.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-09015,
  author       = {Hien Thi Thu Truong and
                  Miguel Almeida and
                  Ghassan Karame and
                  Claudio Soriente},
  title        = {Towards Secure and Decentralized Sharing of IoT Data},
  journal      = {CoRR},
  volume       = {abs/1908.09015},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.09015},
  eprinttype    = {arXiv},
  eprint       = {1908.09015},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-09015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RitzdorfSKMGC18,
  author       = {Hubert Ritzdorf and
                  Claudio Soriente and
                  Ghassan O. Karame and
                  Srdjan Marinovic and
                  Damian Gruber and
                  Srdjan Capkun},
  title        = {Toward Shared Ownership in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3019--3034},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2837648},
  doi          = {10.1109/TIFS.2018.2837648},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/RitzdorfSKMGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CerulliCS18,
  author       = {Andrea Cerulli and
                  Emiliano De Cristofaro and
                  Claudio Soriente},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Nothing Refreshes Like a RePSI: Reactive Private Set Intersection},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {280--300},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_15},
  doi          = {10.1007/978-3-319-93387-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CerulliCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/PyrgelisKLSS18,
  author       = {Apostolos Pyrgelis and
                  Nicolas Kourtellis and
                  Ilias Leontiadis and
                  Joan Serr{\`{a}} and
                  Claudio Soriente},
  editor       = {Naoki Abe and
                  Huan Liu and
                  Calton Pu and
                  Xiaohua Hu and
                  Nesreen K. Ahmed and
                  Mu Qiao and
                  Yang Song and
                  Donald Kossmann and
                  Bing Liu and
                  Kisung Lee and
                  Jiliang Tang and
                  Jingrui He and
                  Jeffrey S. Saltz},
  title        = {There goes Wally: Anonymously sharing your location gives you away},
  booktitle    = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018),
                  Seattle, WA, USA, December 10-13, 2018},
  pages        = {1218--1227},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BigData.2018.8622184},
  doi          = {10.1109/BIGDATA.2018.8622184},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/PyrgelisKLSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/PerinoVS18,
  author       = {Diego Perino and
                  Matteo Varvello and
                  Claudio Soriente},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {ProxyTorrent: Untangling the Free {HTTP(S)} Proxy Ecosystem},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {197--206},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186086},
  doi          = {10.1145/3178876.3186086},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/PerinoVS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02701,
  author       = {Apostolos Pyrgelis and
                  Nicolas Kourtellis and
                  Ilias Leontiadis and
                  Joan Serr{\`{a}} and
                  Claudio Soriente},
  title        = {There goes Wally: Anonymously sharing your location gives you away},
  journal      = {CoRR},
  volume       = {abs/1806.02701},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02701},
  eprinttype    = {arXiv},
  eprint       = {1806.02701},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02701.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-05027,
  author       = {Claudio Soriente and
                  Ghassan Karame and
                  Wenting Li and
                  Sergey Fedorov},
  title        = {ReplicaTEE: Enabling Seamless Replication of {SGX} Enclaves in the
                  Cloud},
  journal      = {CoRR},
  volume       = {abs/1809.05027},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.05027},
  eprinttype    = {arXiv},
  eprint       = {1809.05027},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-05027.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CerulliCS18,
  author       = {Andrea Cerulli and
                  Emiliano De Cristofaro and
                  Claudio Soriente},
  title        = {Nothing Refreshes Like a RePSI: Reactive Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CerulliCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/DArcoVPSS17,
  author       = {Paolo D'Arco and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Angel L. P{\'{e}}rez del Pozo and
                  Claudio Soriente and
                  Rainer Steinwandt},
  title        = {Private set intersection: New generic constructions and feasibility
                  results},
  journal      = {Adv. Math. Commun.},
  volume       = {11},
  number       = {3},
  pages        = {481--502},
  year         = {2017},
  url          = {https://doi.org/10.3934/amc.2017040},
  doi          = {10.3934/AMC.2017040},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/DArcoVPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/FioreVS17,
  author       = {Dario Fiore and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Claudio Soriente},
  title        = {Partitioned Group Password-Based Authenticated Key Exchange},
  journal      = {Comput. J.},
  volume       = {60},
  number       = {12},
  pages        = {1912--1922},
  year         = {2017},
  url          = {https://doi.org/10.1093/comjnl/bxx078},
  doi          = {10.1093/COMJNL/BXX078},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/FioreVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/IordanouSSL17,
  author       = {Costas Iordanou and
                  Claudio Soriente and
                  Michael Sirivianos and
                  Nikolaos Laoutaris},
  title        = {Who is Fiddling with Prices?: Building and Deploying a Watchdog Service
                  for E-commerce},
  booktitle    = {Proceedings of the Conference of the {ACM} Special Interest Group
                  on Data Communication, {SIGCOMM} 2017, Los Angeles, CA, USA, August
                  21-25, 2017},
  pages        = {376--389},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098822.3098850},
  doi          = {10.1145/3098822.3098850},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/IordanouSSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreVS17,
  author       = {Dario Fiore and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Claudio Soriente},
  title        = {Partitioned Group Password-Based Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/141},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RitzdorfSKMGC17,
  author       = {Hubert Ritzdorf and
                  Claudio Soriente and
                  Ghassan O. Karame and
                  Srdjan Marinovic and
                  Damian Gruber and
                  Srdjan Capkun},
  title        = {Towards Shared Ownership in the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RitzdorfSKMGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RitzdorfKSC16,
  author       = {Hubert Ritzdorf and
                  Ghassan Karame and
                  Claudio Soriente and
                  Srdjan Capkun},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Elli Androulaki and
                  Michael K. Reiter},
  title        = {On Information Leakage in Deduplicated Storage Systems},
  booktitle    = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
                  {CCSW} 2016, Vienna, Austria, October 28, 2016},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996429.2996432},
  doi          = {10.1145/2996429.2996432},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RitzdorfKSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MarforioMSKC16,
  author       = {Claudio Marforio and
                  Ramya Jayaram Masti and
                  Claudio Soriente and
                  Kari Kostiainen and
                  Srdjan Capkun},
  editor       = {Long Lu and
                  Mohammad Mannan},
  title        = {Hardened Setup of Personalized Security Indicators to Counter Phishing
                  Attacks in Mobile Banking},
  booktitle    = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994462},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MarforioMSKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/MarforioMSKC16,
  author       = {Claudio Marforio and
                  Ramya Jayaram Masti and
                  Claudio Soriente and
                  Kari Kostiainen and
                  Srdjan Capkun},
  editor       = {Jofish Kaye and
                  Allison Druin and
                  Cliff Lampe and
                  Dan Morris and
                  Juan Pablo Hourcade},
  title        = {Evaluation of Personalized Security Indicators as an Anti-Phishing
                  Mechanism for Smartphone Applications},
  booktitle    = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
                  Systems, San Jose, CA, USA, May 7-12, 2016},
  pages        = {540--551},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2858036.2858085},
  doi          = {10.1145/2858036.2858085},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/MarforioMSKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/GonzalezSL16,
  author       = {Roberto Gonzalez and
                  Claudio Soriente and
                  Nikolaos Laoutaris},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {User Profiling in the Time of {HTTPS}},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {373--379},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987451},
  timestamp    = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/GonzalezSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/YuRMSC16,
  author       = {Der{-}Yeuan Yu and
                  Aanjhan Ranganathan and
                  Ramya Jayaram Masti and
                  Claudio Soriente and
                  Srdjan Capkun},
  editor       = {Yingying Chen and
                  Marco Gruteser and
                  Y. Charlie Hu and
                  Karthik Sundaresan},
  title        = {{SALVE:} server authentication with location verification},
  booktitle    = {Proceedings of the 22nd Annual International Conference on Mobile
                  Computing and Networking, MobiCom 2016, New York City, NY, USA, October
                  3-7, 2016},
  pages        = {401--414},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2973750.2973766},
  doi          = {10.1145/2973750.2973766},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/YuRMSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/YuRMSC16,
  author       = {Der{-}Yeuan Yu and
                  Aanjhan Ranganathan and
                  Ramya Jayaram Masti and
                  Claudio Soriente and
                  Srdjan Capkun},
  title        = {{SALVE:} Server Authentication with Location VErification},
  journal      = {CoRR},
  volume       = {abs/1608.04563},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.04563},
  eprinttype    = {arXiv},
  eprint       = {1608.04563},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/YuRMSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PerinoSV16,
  author       = {Diego Perino and
                  Claudio Soriente and
                  Matteo Varvello},
  title        = {Your Are "Proxy" And {I} Know It},
  journal      = {CoRR},
  volume       = {abs/1612.06126},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.06126},
  eprinttype    = {arXiv},
  eprint       = {1612.06126},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PerinoSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MastiMKSC15,
  author       = {Ramya Jayaram Masti and
                  Claudio Marforio and
                  Kari Kostiainen and
                  Claudio Soriente and
                  Srdjan Capkun},
  title        = {Logical Partitions on Many-Core Platforms},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {451--460},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818026},
  doi          = {10.1145/2818000.2818026},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MastiMKSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SorienteKRMC15,
  author       = {Claudio Soriente and
                  Ghassan O. Karame and
                  Hubert Ritzdorf and
                  Srdjan Marinovic and
                  Srdjan Capkun},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Commune: Shared Ownership in an Agnostic Cloud},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752972},
  doi          = {10.1145/2752952.2752972},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/SorienteKRMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KarapanosMSC15,
  author       = {Nikolaos Karapanos and
                  Claudio Marforio and
                  Claudio Soriente and
                  Srdjan Capkun},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {483--498},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/karapanos},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KarapanosMSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MarforioMSKC15,
  author       = {Claudio Marforio and
                  Ramya Jayaram Masti and
                  Claudio Soriente and
                  Kari Kostiainen and
                  Srdjan Capkun},
  title        = {Personalized Security Indicators to Detect Application Phishing Attacks
                  in Mobile Platforms},
  journal      = {CoRR},
  volume       = {abs/1502.06824},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.06824},
  eprinttype    = {arXiv},
  eprint       = {1502.06824},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MarforioMSKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KarapanosMSC15,
  author       = {Nikolaos Karapanos and
                  Claudio Marforio and
                  Claudio Soriente and
                  Srdjan Capkun},
  title        = {Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound},
  journal      = {CoRR},
  volume       = {abs/1503.03790},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.03790},
  eprinttype    = {arXiv},
  eprint       = {1503.03790},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KarapanosMSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuRMSC15,
  author       = {Der{-}Yeuan Yu and
                  Aanjhan Ranganathan and
                  Ramya Jayaram Masti and
                  Claudio Soriente and
                  Srdjan Capkun},
  title        = {{W-SPS:} Designing a Wide-Area Secure Positioning System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuRMSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/AndroulakiSMC14,
  author       = {Elli Androulaki and
                  Claudio Soriente and
                  Luka Malisa and
                  Srdjan Capkun},
  title        = {Enforcing Location and Time-Based Access Control on Cloud-Stored Data},
  booktitle    = {{IEEE} 34th International Conference on Distributed Computing Systems,
                  {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014},
  pages        = {637--648},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCS.2014.71},
  doi          = {10.1109/ICDCS.2014.71},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/AndroulakiSMC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MarforioKSKC14,
  author       = {Claudio Marforio and
                  Nikolaos Karapanos and
                  Claudio Soriente and
                  Kari Kostiainen and
                  Srdjan Capkun},
  title        = {Smartphones as Practical and Secure Location Verification Tokens for
                  Payments},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/smartphones-practical-and-secure-location-verification-tokens-payments},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MarforioKSKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarameSLC14,
  author       = {Ghassan O. Karame and
                  Claudio Soriente and
                  Krzysztof Lichota and
                  Srdjan Capkun},
  title        = {Securing Cloud Data in the New Attacker Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarameSLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/BarsocchiOS13,
  author       = {Paolo Barsocchi and
                  Gabriele Oligeri and
                  Claudio Soriente},
  title        = {{SHAKE:} Single HAsh key establishment for resource constrained devices},
  journal      = {Ad Hoc Networks},
  volume       = {11},
  number       = {1},
  pages        = {288--297},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.adhoc.2012.05.013},
  doi          = {10.1016/J.ADHOC.2012.05.013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/BarsocchiOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/CristofaroS13,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente},
  title        = {Participatory privacy: Enabling privacy in participatory sensing},
  journal      = {{IEEE} Netw.},
  volume       = {27},
  number       = {1},
  pages        = {32--36},
  year         = {2013},
  url          = {https://doi.org/10.1109/MNET.2013.6423189},
  doi          = {10.1109/MNET.2013.6423189},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/CristofaroS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CristofaroS13,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente},
  title        = {Extended Capabilities for a Privacy-Enhanced Participatory Sensing
                  Infrastructure {(PEPSI)}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {12},
  pages        = {2021--2033},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2287092},
  doi          = {10.1109/TIFS.2013.2287092},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CristofaroS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/PietroOST13,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {United We Stand: Intrusion Resilience in Mobile Unattended WSNs},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {12},
  number       = {7},
  pages        = {1456--1468},
  year         = {2013},
  url          = {https://doi.org/10.1109/TMC.2012.126},
  doi          = {10.1109/TMC.2012.126},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/PietroOST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MarforioKSKC13,
  author       = {Claudio Marforio and
                  Nikolaos Karapanos and
                  Claudio Soriente and
                  Kari Kostiainen and
                  Srdjan Capkun},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Secure enrollment and practical migration for mobile trusted execution
                  environments},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {93--98},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516764},
  doi          = {10.1145/2516760.2516764},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MarforioKSKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CristofaroS13,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente},
  title        = {Extended Capabilities for a Privacy-Enhanced Participatory Sensing
                  Infrastructure {(PEPSI)}},
  journal      = {CoRR},
  volume       = {abs/1308.2921},
  year         = {2013},
  url          = {http://arxiv.org/abs/1308.2921},
  eprinttype    = {arXiv},
  eprint       = {1308.2921},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CristofaroS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SorienteKRMC13,
  author       = {Claudio Soriente and
                  Ghassan Karame and
                  Hubert Ritzdorf and
                  Srdjan Marinovic and
                  Srdjan Capkun},
  title        = {Commune: Shared Ownership in an Agnostic Cloud},
  journal      = {CoRR},
  volume       = {abs/1311.6236},
  year         = {2013},
  url          = {http://arxiv.org/abs/1311.6236},
  eprinttype    = {arXiv},
  eprint       = {1311.6236},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SorienteKRMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/CristofaroSTW12,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente and
                  Gene Tsudik and
                  Andrew Williams},
  title        = {Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {35},
  number       = {4},
  pages        = {93--100},
  year         = {2012},
  url          = {http://sites.computer.org/debull/A12dec/humming.pdf},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/debu/CristofaroSTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/PietroMST12,
  author       = {Roberto Di Pietro and
                  Di Ma and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {Self-healing in unattended wireless sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {9},
  number       = {1},
  pages        = {7:1--7:21},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379799.2379806},
  doi          = {10.1145/2379799.2379806},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosn/PietroMST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/GulisanoJPSV12,
  author       = {Vincenzo Gulisano and
                  Ricardo Jim{\'{e}}nez{-}Peris and
                  Marta Pati{\~{n}}o{-}Mart{\'{\i}}nez and
                  Claudio Soriente and
                  Patrick Valduriez},
  title        = {StreamCloud: An Elastic and Scalable Data Streaming System},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {23},
  number       = {12},
  pages        = {2351--2365},
  year         = {2012},
  url          = {https://doi.org/10.1109/TPDS.2012.24},
  doi          = {10.1109/TPDS.2012.24},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/GulisanoJPSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/DArcoVPS12,
  author       = {Paolo D'Arco and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Angel L. P{\'{e}}rez del Pozo and
                  Claudio Soriente},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Size-Hiding in Private Set Intersection: Existential Results and Constructions},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {378--394},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_23},
  doi          = {10.1007/978-3-642-31410-0\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/DArcoVPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ManciniSSVV12,
  author       = {Luigi Vincenzo Mancini and
                  Angelo Spognardi and
                  Claudio Soriente and
                  Antonio Villani and
                  Domenico Vitali},
  title        = {Relieve Internet Routing Security of Public Key Infrastructure},
  booktitle    = {21st International Conference on Computer Communications and Networks,
                  {ICCCN} 2012, Munich, Germany, July 30 - August 2, 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICCCN.2012.6289235},
  doi          = {10.1109/ICCCN.2012.6289235},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/ManciniSSVV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CristofaroSTW12,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente and
                  Gene Tsudik and
                  Andrew Williams},
  title        = {Hummingbird: Privacy at the Time of Twitter},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {285--299},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.26},
  doi          = {10.1109/SP.2012.26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CristofaroSTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1201-4376,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente},
  title        = {Participatory Privacy: Enabling Privacy in Participatory Sensing},
  journal      = {CoRR},
  volume       = {abs/1201.4376},
  year         = {2012},
  url          = {http://arxiv.org/abs/1201.4376},
  eprinttype    = {arXiv},
  eprint       = {1201.4376},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1201-4376.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/GulisanoJPSV12,
  author       = {Vincenzo Gulisano and
                  Ricardo Jim{\'{e}}nez{-}Peris and
                  Marta Pati{\~{n}}o{-}Mart{\'{\i}}nez and
                  Claudio Soriente and
                  Patrick Valduriez},
  title        = {A Big Data Platform for Large Scale Event Processing},
  journal      = {{ERCIM} News},
  volume       = {2012},
  number       = {89},
  year         = {2012},
  url          = {http://ercim-news.ercim.eu/en89/special/a-big-data-platform-for-large-scale-event-processing},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/GulisanoJPSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/PietroSST11,
  author       = {Roberto Di Pietro and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Intrusion-resilient integrity in data-centric unattended WSNs},
  journal      = {Pervasive Mob. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {495--508},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.pmcj.2010.12.003},
  doi          = {10.1016/J.PMCJ.2010.12.003},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/PietroSST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/MaS11,
  author       = {Di Ma and
                  Claudio Soriente},
  title        = {Building Trust for lambda-Congenial Secret Groups},
  booktitle    = {2011 International Conference on Broadband, Wireless Computing, Communication
                  and Applications, {BWCCA} 2011, Barcelona, Spain, October 26-28, 2011},
  pages        = {222--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/BWCCA.2011.35},
  doi          = {10.1109/BWCCA.2011.35},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/MaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CristofaroS11,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: {PEPSI} - privacy-enhanced participatory sensing infrastructure},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {23--28},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998418},
  doi          = {10.1145/1998412.1998418},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CristofaroS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroSTW11,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente and
                  Gene Tsudik and
                  Andrew Williams},
  title        = {Hummingbird: Privacy at the time of Twitter},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/640},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroSTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/CastiglioneSS10,
  author       = {Aniello Castiglione and
                  Alfredo De Santis and
                  Claudio Soriente},
  title        = {Security and privacy issues in the Portable Document Format},
  journal      = {J. Syst. Softw.},
  volume       = {83},
  number       = {10},
  pages        = {1813--1822},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jss.2010.04.062},
  doi          = {10.1016/J.JSS.2010.04.062},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/CastiglioneSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PietroOST10,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {Intrusion-Resilience in Mobile Unattended WSNs},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {2303--2311},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462056},
  doi          = {10.1109/INFCOM.2010.5462056},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/PietroOST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischKS10,
  author       = {Jan Camenisch and
                  Markulf Kohlweiss and
                  Claudio Soriente},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Solving Revocation with Efficient Update of Anonymous Credentials},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {454--471},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_28},
  doi          = {10.1007/978-3-642-15317-4\_28},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/CamenischKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/PietroOST10,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {Securing Mobile Unattended WSNs against a Mobile Adversary},
  booktitle    = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010),
                  New Delhi, Punjab, India, October 31 - November 3, 2010},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SRDS.2010.10},
  doi          = {10.1109/SRDS.2010.10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/PietroOST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/LombardiPS10,
  author       = {Flavio Lombardi and
                  Roberto Di Pietro and
                  Claudio Soriente},
  title        = {CReW: Cloud Resilience for Windows Guests through Monitored Virtualization},
  booktitle    = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010),
                  New Delhi, Punjab, India, October 31 - November 3, 2010},
  pages        = {338--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SRDS.2010.48},
  doi          = {10.1109/SRDS.2010.48},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/LombardiPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/PietroMSST09,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Playing hide-and-seek with a focused mobile adversary in unattended
                  wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {8},
  pages        = {1463--1475},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2009.04.002},
  doi          = {10.1016/J.ADHOC.2009.04.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/PietroMSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SorienteTU09,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Secure pairing of interface constrained devices},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {17--26},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023423},
  doi          = {10.1504/IJSN.2009.023423},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SorienteTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GoodrichSSSTU09,
  author       = {Michael T. Goodrich and
                  Michael Sirivianos and
                  John Solis and
                  Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Using audio in secure device pairing},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {57--68},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023426},
  doi          = {10.1504/IJSN.2009.023426},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/GoodrichSSSTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/MaST09,
  author       = {Di Ma and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {New adversary and new threats: security in unattended sensor networks},
  journal      = {{IEEE} Netw.},
  volume       = {23},
  number       = {2},
  pages        = {43--48},
  year         = {2009},
  url          = {https://doi.org/10.1109/MNET.2009.4804335},
  doi          = {10.1109/MNET.2009.4804335},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/MaST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/PietroMSST09,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Data Security in Unattended Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {58},
  number       = {11},
  pages        = {1500--1511},
  year         = {2009},
  url          = {https://doi.org/10.1109/TC.2009.109},
  doi          = {10.1109/TC.2009.109},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/PietroMSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CastellucciaFPS09,
  author       = {Claude Castelluccia and
                  Aur{\'{e}}lien Francillon and
                  Daniele Perito and
                  Claudio Soriente},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {On the difficulty of software-based attestation of embedded devices},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {400--409},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653711},
  doi          = {10.1145/1653662.1653711},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CastellucciaFPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischKS09,
  author       = {Jan Camenisch and
                  Markulf Kohlweiss and
                  Claudio Soriente},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {An Accumulator Based on Bilinear Maps and Efficient Revocation for
                  Anonymous Credentials},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {481--500},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_27},
  doi          = {10.1007/978-3-642-00468-1\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CamenischKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PietroSST09,
  author       = {Roberto Di Pietro and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Collaborative authentication in unattended WSNs},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {237--244},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514307},
  doi          = {10.1145/1514274.1514307},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/PietroSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SorienteTU08,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {{HAPADEP:} Human-Assisted Pure Audio Device Pairing},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {385--400},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_27},
  doi          = {10.1007/978-3-540-85886-7\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SorienteTU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/PietroMSST08,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Catch Me (If You Can): Data Survival in Unattended Sensor Networks},
  booktitle    = {Sixth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications (PerCom 2008), 17-21 March 2008, Hong Kong},
  pages        = {185--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PERCOM.2008.31},
  doi          = {10.1109/PERCOM.2008.31},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/PietroMSST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/PietroMST08,
  author       = {Roberto Di Pietro and
                  Di Ma and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {{POSH:} Proactive co-Operative Self-Healing in Unattended Wireless
                  Sensor Networks},
  booktitle    = {27th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2008),
                  Napoli, Italy, October 6-8, 2008},
  pages        = {185--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SRDS.2008.23},
  doi          = {10.1109/SRDS.2008.23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/PietroMST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/CastellucciaS08,
  author       = {Claude Castelluccia and
                  Claudio Soriente},
  editor       = {Holger Karl and
                  Dirk Westhoff},
  title        = {{ABBA:} {A} Balls and bins approach to secure aggregation in WSNs},
  booktitle    = {6th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc, and Wireless Networks and Workshops, {WIOPT} 2008, March 31
                  - April 4, 2008, Berlin, Germany},
  pages        = {185--191},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/WIOPT.2008.4586063},
  doi          = {10.1109/WIOPT.2008.4586063},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wiopt/CastellucciaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PietroMSST08,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Maximizing data survival in Unattended Wireless Sensor Networks against
                  a focused mobile adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PietroMSST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKS08,
  author       = {Jan Camenisch and
                  Markulf Kohlweiss and
                  Claudio Soriente},
  title        = {An Accumulator Based on Bilinear Maps and Efficient Revocation for
                  Anonymous Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/CastiglioneSS07,
  author       = {Aniello Castiglione and
                  Alfredo De Santis and
                  Claudio Soriente},
  title        = {Taking advantages of a disadvantage: Digital forensics and steganography
                  using document metadata},
  journal      = {J. Syst. Softw.},
  volume       = {80},
  number       = {5},
  pages        = {750--764},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jss.2006.07.006},
  doi          = {10.1016/J.JSS.2006.07.006},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/CastiglioneSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SantisS07,
  author       = {Alfredo De Santis and
                  Claudio Soriente},
  title        = {Modified Original Smart Cards and Smart Card Clone Countermeasures},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007},
  pages        = {878--882},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CIS.2007.187},
  doi          = {10.1109/CIS.2007.187},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SantisS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SorienteTU07,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {{HAPADEP:} Human Asisted Pure Audio Device Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SorienteTU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SorienteTU07a,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {{BEDA:} Button-Enabled Device Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SorienteTU07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/SantisS04,
  author       = {Alfredo De Santis and
                  Claudio Soriente},
  title        = {A blocker-proof conditional access system},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {50},
  number       = {2},
  pages        = {591--596},
  year         = {2004},
  url          = {https://doi.org/10.1109/TCE.2004.1309432},
  doi          = {10.1109/TCE.2004.1309432},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tce/SantisS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics