Elenco Pubblicazioni
Transcript
Elenco Pubblicazioni
Elenco Pubblicazioni • Riviste Internazionali 1. Gabriele Oligeri, Stefano Chessa, Roberto Di Pietro, and Gaetano Giunta. Robust and Efficient Authentication of Video Stream Broadcasting. In ACM Transactions on Information Systems Security (TISSEC) (ACM press), in press. 2. Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, and Luigi V. Mancini. Secure Topology Maintenance and Events Collection in WSN. In Security and Communication Networks (Wiley)—Special Issue on Security and Privacy in Wireless Systems—, in press. 3. Flavio Lombardi and Roberto Di Pietro. Secure Virtualization for Cloud Computing. In Journal of Network and Computer Applications (JNCA) (Elsevier)—Special Issue on Recent Advances in Cloud Computing—, in press. 4. Roberto Di Pietro and Alexandre Viejo. Location Privacy and Resilience in Wireless Sensor Networks Querying. In Computer Communications (Elsevier),—Special Issue on Information and Future Communication Security—, in press. 5. Roberto Di Pietro and Refik Molva. An optimal probabilistic solution for information confinement, privacy, and security in RFID systems. In Journal of Network and Computer Applications (JNCA) (Elsevier)–Special Issue on RFID Technology, Systems, and Applications—, in press. 6. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V. Verde. A New Role Mining Framework to Elicit Business Roles and to Mitigate Enterprise Risk. In Decision Support Systems (DSS) (Elsevier)—Special Issue on Enterprise Risk and Security Management—, in press. 7. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Distributed Detection of Clone Attacks in Wireless Sensor Networks. In IEEE Transactions on Dependable and Secure Computing (TDSC), in press. 8. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Hierarchies of Keys in Secure Multicast Communications. In Journal of Computer Security, Vol. 18(5), September 2010, pages 839-860, 2010. 9. Alessandro Colantonio and Roberto Di Pietro. CONCISE: Compressed ’n’ Composable Integer Set. In Information Processing Letters (IPL), vol. 110(16), pages 644-650, 31 July 2010. 10. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V. Verde. Taming Role Mining Complexity in RBAC. In Computers & Security 1 (Elsevier)—Special Issue on Challenges for Security, Privacy & Trust—, vol. 29(5), pages 548-564, July 2010. 11. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi. eRIPP-FS: Enforcing Privacy and Security in RFID. In Security and Communication Networks (Wiley)—Special Issue on Security in Next Generation Wireless Networks—, vol. 3(1), pages 58-70, Jan-Feb 2010. 12. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, and Gene Tsudik. Data Security in Unattended Wireless Sensor Networks. In IEEE Transactions on Computers (ToC)—Special Issue on Autonomic Network Computing—, vol. 50(11), pages 1500-1511, November 2009. 13. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, and Gene Tsudik. Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks. In Journal of Ad Hoc Networks (Elsevier)—Special Issue on Privacy and Security in Wireless Sensor and Ad Hoc Networks—, vol. 7(4), pages 1463-1475, November 2009. 14. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Distributed Data Source Verification in Wireless Sensor Networks. In Information Fusion (Elsevier)—Special Issue on Information Fusion in Computer Security—, vol. 10(4), pages 342-353, October 2009. 15. Mauro Conti, Roberto Di Pietro, Alessandro Mei, Luigi V. Mancini. Mobility and Cooperation to Thwart Node Capture Attacks in MANETs. In Journal on Wireless Communications and Networking (EURASIP), vol. 2009, pages 1–13, July 2009. 16. Michele Albano, Stefano Chessa, and Roberto Di Pietro. A model with applications for data survivability in Critical Infrastructures. In Journal of Information Assurance and Security, vol. 4(6), pages 629-639, June 2009. 17. Roberto Di Pietro, Pietro Michiardi, and Refik Molva. Confidentiality and Integrity for Data Aggregation in WSN Using Peer Monitoring. In Security and Communication Networks (Wiley), vol. 2(2), pages 181-194, April 2009. 18. Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, and Luigi Vincenzo Mancini. Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks. In Security and Communication Networks (Wiley)—Special Issue on Security in Wireless Sensor Networks—, vol.2(2), pages 195-213, Jan 2009. 19. Roberto Di Pietro and Stefano Iannitti. Maximizing service availability for secure satellite broadcasting. In International Journal of Satellite Communications and Networking (Wiley), vol. 26(4), pages 269-289, August 2008. 2 20. Paolo Cencioni and Roberto Di Pietro. A mechanism to enforce privacy in vehicle-to-infrastructure communication. In Computer Communications (Elsevier), vol. 31(12), pages 2790-2802, July 2008. 21. Roberto Di Pietro, Alessandro Mei, Luigi V. Mancini, Alessandro Panconesi, and Jaikumar Radhakrishnan. Redoubtable Sensor Networks. In ACM Transactions on Information Systems Security (TISSEC) (ACM press), vol. 11(3), pages 1-22, March 2008. 22. Giorgio Zanin, Roberto Di Pietro, and Luigi V. Mancini. Robust RSA Distributed Signature for Large-scale Long-lived Ad-hoc Networks. In Journal of Computer Security, vol. 15(1), pages 171-196, January 2007. 23. Mauro Conti, Roberto Di Pietro, and Luigi V. Mancini. ECCE: Enhanced Cooperative Channel Establishment for secure pair-wise communication in WSN. In Journal of AdHoc Networks (Elsevier), vol. 5(1), pages 49-62, January 2007. 24. Roberto Di Pietro, Luigi V. Mancini, and Giorgio Zanin. Efficient and Adaptive Threshold Signatures for Adhoc networks. In Electr. Notes Theor. Comput. Sci. (ENTCS), Vol. 171(1), pages 93-105, 2007. 25. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Energy Efficient Node-to-Node Authentication and Communication Confidentiality in Wireless Sensor Networks. In Wireless Networks, vol. 12(6), pages 709-721, December 2006. 26. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Key Management for High Bandwidth Secure Multicast. In Journal of Computer Security, vol. 12(5), pages 693-709, October 2004. 27. Roberto Di Pietro, Luigi V. Mancini, and Sushil Jajodia. Providing secrecy in key management protocols for large wireless sensors networks. In Journal of AdHoc Networks (Elsevier), vol. 1(4), pages 455-468, November 2003. 28. Roberto Di Pietro and Luigi V. Mancini. Security and privacy issues of handheld/wearable wireless devices. In Communications of the ACM, vol. 46(9), pages 75-79, September 2003. • Conferenze e Workshops (referate) 29. Mauro Conti, Bruno Crispo, Roberto Di Pietro, and Luciana Marconi. Time Warp: how time affects privacy in LBSs. In Proceedings of the 12th International Conference on Information and Communications Security (ICICS’10), December 15-17, 2010, Barcelona-Spain, in press. 3 30. Flavio Lombardi and Roberto Di Pietro. CUDACS: Securing the Cloud with CUDA-enabled Secure Virtualization. In Proceedings of the 12th International Conference on Information and Communications Security (ICICS’10), December 15-17, 2010, Barcelona-Spain, in press. 31. Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, and Gene Tsudik. Securing Mobile Unattended WSNs against a mobile adversary. In Proceedings of the 29th IEEE International Symposium on Reliable Distributed Systems (SRDS’10), October 31November 3, 2010, New Delhi, India, in press. 32. Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, and Alessandro Mei. The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack. In Proceedings of the 8th ACM International Symposium on Mobility Management and Wireless Access (MobiWac’10), Bodrum, Turkey October 17-21, 2010, in press. 33. Luciana Marconi, Mauro Conti, and Roberto Di Pietro. CED2 : Communication Efficient Disjointness Decision . In Proceedings of the 6th International Conference on Security and Privacy in Communication Networks (SecureComm’10), September 7-10, 2010, Singapore, in press. 34. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V. Verde. Mining Business-Relevant RBAC States Through Decomposition. In Proceedings of the 25th IFIP International Conference on Information Security (SEC’10), in press. 35. Roberto Bragantini and Mauro Conti and Roberto Di Pietro. Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance. In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10), in press. 36. Lei Zhang and Honggang Zhang and Mauro Conti and Roberto Di Pietro and Sushil Jajodia and Luigi V. Mancini. Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10), in press. 37. Flavio Lombardi and Roberto Di Pietro. A Security Management Architecture for the protection of Kernel Virtual Machines. In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10), in press. 38. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V. Verde. Evaluating the Risk of Adopting RBAC Roles. In Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec’10), in press. 4 39. Stefano Ortolani, Mauro Conti, Bruno Crispo and Roberto di Pietro. Event Handoff Unobservability in WSN. In Open Research Problems in Network Security (IFIP - iNetSec 2010 ), in press. 40. Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, and Gene Tsudik. Intrusion-Resilience in Mobile Unattended WSNs. In Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM’10), pages 1-9, March 15-19, 2010, San Diego - CA, USA. 41. Flavio Lombardi and Roberto Di Pietro. Transparent Security for Cloud. In Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC’10), pages 414-415, March 22-26, 2010, Sierre, Switzerland. 42. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V. Verde. ABBA: Adaptive Bicluster-Based Approach to Impute Missing Values in Binary Matrices. In Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC’10), pages 1026-1033, March 22-26, 2010, Sierre, Switzerland. 43. Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, and Luigi V. Mancini. Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. In Proceedings of the 5th International Conference on Security and Privacy in Communication Networks (SecureComm’09), pages 265-284, September 14-18, 2009, Athens-Greece. 44. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V. Verde. An Activity-Based Framework for Modeling, Managing, and Relaxing SoD Constraints. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT’09), pages 85-94, June 3–5, 2009, Stresa, Italy. 45. Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, and Alessandro Mei. The Quest for Mobility Model to analyse Security in Mobile ad Hoc Networks. In Proceedings of the 7th International Conference on Wired/Wireless Internet Communications (WWIC’09), pages 85-96, May 2729, 2009, Enschede, The Netherlands. 46. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V. Verde. Mining Stable Roles in RBAC. In Proceedings of the 24th IFIP International Conference on Information Security (SEC’09), pages 259–269, May 18–20, 2009, Pafos-Greece. 47. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V. Verde. A Probabilistic Bound on the Basic Role Mining Problem and its Applications. In Proceedings of the 24th IFIP International Conference on Information Security (SEC’09), pages 376–386, May 18–20, 2009, Pafos-Greece. 48. Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, and Gene Tsudik. Collaborative Authentication in Unattended WSNs. In Proceedings of the 2nd 5 ACM Conference on Wireless Network Security (WiSec’09), pages 237-244, March 16–18, 2009, Zurich, Switzerland. 49. Flavio Lombardi and Roberto Di Pietro. KvmSec: A Security Extension for Linux Kernel Virtual Machines. In Proceedings of the 24th ACM Symposium on Applied Computing (ACM SAC’09), pages 2029-2034, March 8-12, 2009, Honolulu, Hawaii-USA. 50. Agusti Solanas and Roberto Di Pietro. A Linear-Time Multivariate Microaggregation for Privacy Protection in Uniform Very Large Data Sets. In Proceedings of the 5th Modeling Decisions for Artificial Intelligence Modeling Decisions for Artificial Intelligence (MDAI’08), pages 203–214, Sabadell (Barcelona), Spain, October 30-31, 2008 51. Roberto Di Pietro, Di Ma, Claudio Soriente, and Gene Tsudik. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks In Proceedings of the 27th IEEE International Symposium on Reliable Distributed Systems (SRDS’08), pages 185–194, Napoli, Italy, October 6-8, 2008 52. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini and Gene Tsudik. Scalable and Efficient Provable Data Possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm’08), September 22-26, 2008 Istanbul, Turkey. 53. Roberto Di Pietro and Andrea Cirulli. PEAC: a Probabilistic, Efficient, and resilient Authentication protocol for broadcast Communications. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm’08), September 22-26, 2008 Istanbul, Turkey. 54. Michele Albano, Steano Chessa, and Roberto Di Pietro. Information Assurance in Critical Infrastructures via Wireless Sensor Networks. In Proceedings of the 4th International Conference on Information Assurance and Security (IAS’08), pages 305–310, September 8 - 10, 2008, Naples, Italy. 55. Alessandro Colantonio, Roberto Di Pietro, and Alberto Ocello. Leveraging Lattices to Improve Role Mining. In Proceedings of the 23rd IFIP International Information Security Conference (SEC’08), pages 333–347, September 8 - 10, 2008, Milan, Italy. 56. Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini. A Live Digital Forensic system for Windows network. In Proceedings of the 23rd IFIP International Information Security Conference (SEC 2008), pages 653-667, September 8 - 10, 2008, Milan, Italy. 57. Roberto Di Pietro, and Pietro Michiardi. Brief announcement: Gossipbased aggregate computation, computing faster with non address-oblivious schemes. In Proceedings of the 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), page 442, August 18-21, 2008, Toronto, Canada. 6 58. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks. In Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec ’08), pages 214-219, March 31-April 2, 2008, Alexandria, VA-USA. 59. Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, and Melanie R. Rieback. RFID security and privacy: long-term research or short-term tinkering? In Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec ’08), page 160, March 31-April 2, 2008, Alexandria, VA-USA. 60. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, and Gene Tsudik. Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), pages 185-194, Hong Kong, March 17 - 21, 2008. 61. Alessandro Colantonio, Roberto Di Pietro, and Alberto Ocello. A CostDriven Approach to Role Engineering. In Proceedings of the 23rd ACM Symposium on Applied Computing (SAC08), pages 2129–2136, Fortaleza, Ceará, Brazil, March 16-20, 2008. 62. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Angelo Spognardi. FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization. In Proceedings of the 33rd Annual Conference of the IEEE Industrial Electronics Society (IEEE IECON 07), pages 52–57, Taipei, Taiwan, November 5, 2007. 63. Paolo Cencioni and Roberto Di Pietro. VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol. In Proceedings of the 1st IEEE International Workshop on Mobile Vehicular Networks (MoVeNet 2007), pages 1–6, Pisa, Italy, October 12, 2007. 64. Yee Wei Law, Li-Hsing Yen, Roberto Di Pietro, and Marimuthu Palaniswami. Secure k-Connectivity Properties of Wireless Sensor Networks. In Proceedings of the 3rd IEEE International Workshop on Wireless and Sensor Networks Security (WSNS), pages 1–6, Pisa, Italy, October 8, 2007. 65. Roberto Di Pietro and Refik Molva. Information confinement, privacy, and security in RFID systems. In Proceedings of the 12th European Symposium Research Computer Security. (ESORICS’07), pages 187-202, September 2426, 2007, Dresden, Germany. 66. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. In Proceedings of the 8th 7 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’07), pages 80-89, September 9-14, 2007, Montréal, Quebec, Canada, Canada. 67. Stefano Chessa and Roberto Di Pietro and Erina Ferro and Gaetano Giunta and Gabriele Oligeri. Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. In Proceedings of the 2007 IEEE 65th Vehicular Technology Conference VTC 2007-Spring, pages 634 - 638, 22 - 25 April 2007, Dublin, Ireland. 68. Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei. Towards threatadaptive dynamic fragment replication in large scale distributed systems. In Proceedings of IEEE International Symposium on Parallel and Distributed Processing (IPDPS’07), pages 1-8, March 26-30 2007, Long Beach, California USA 69. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Angelo Spognardi. RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy. In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW ’07), pages 229-234, 19 March 2007, New York, USA. 70. Roberto Di Pietro, Alessandro Mei, Luigi V. Mancini, Alessandro Panconesi, and Jaikumar Radhakrishnan. Sensor Networks that Are Provably Resilient. In Proceedings of the 2nd IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2006), pages 1-10, August 28 - September 1, 2006, Baltimore-MD, USA. 71. Roberto Di Pietro and Stefano Iannitti. Optimal key scheduling for secure satellite broadcasting to mobile users. In Proceedings of 2nd International Workshop on Satellite and Space Communications 2006 (IWSSC2006), pages 34-38, September 14 - 15, 2006, Madrid - Spain, IEEE press. 72. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN. In Proceedings of IEEE SMC, Special Session on Wireless Sensor Networks, pages 1468–1473, 29 april 2006, Taipei, Taiwan. 73. Angelo Spognardi and Roberto Di Pietro. A formal framework for the performance analysis of P2P networks protocols. In Proceedings of the 3rd IEEE International Workshop on Hot Topics in Peer-to Peer Systems (HOT-P2P’06). 29 april 2006, Rhodes Island, Greece. 74. Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, and Vishwas Patil. Addressing the Shortcomings of One-Way Chains. In Proceedings of the 1st ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2006), pages 289-296, March 21 - 24, 2006, Taipei - Taiwan, ACM press. 8 75. Mauro Conti, Roberto Di Pietro, and Luigi V. Mancini. Secure Cooperative Channel Establishment in Wireless Sensor Networks. In Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW), pages 327-331, March 13, 2006, Pisa, Italy. 76. Roberto Di Pietro, Stefano Chessa, and Piero Maestrini. Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast. In Proceedings of the 1st IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), pages 13-22, September 5 - 9, 2005, Athens, Greece, IEEE Press. 77. Roberto Di Pietro and Antonio Durante and Luigi V. Mancini, Vishwas Patil. Short paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. In Proceedings of the 1st IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), pages 400-402, September 5 - 9, 2005, Athens, Greece, IEEE Press. 78. Angelo Spognardi, Alessandro Lucarelli, and Roberto Di Pietro. A methodology for P2P file-sharing traffic detection. In Proceedings of the 2nd IEEE International Workshop on Hot Topics in Peer-to Peer Systems (HOT-P2P’05), pages 52-61. San Diego, CA, USA, 21 July 2005, IEEE press. 79. Roberto Di Pietro, Gianluigi Me, and Maurizio A. Strangio. A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. In Proceedings of the 4th IEEE International Conference on Mobile Business (ICMB’05), pages 28-34, Sidney, Australia, 11 July 2005. 80. Roberto Di Pietro, Mauro Mochi, Gianluigi Me, and Maurizio A. Strangio. An Effective Methodology to Deal with Slack Space Analysis. In Proceedings of the International Conference on E-Crime and Computer Evidence (ECCE’05). Monaco, Montecarlo, 29th March 2005. 81. Roberto Di Pietro, Alessandro Mei, Luigi V. Mancini, Alessandro Panconesi, and Jaikumar Radhakrishnan. Connectivity Properties of Secure Wireless Sensor Networks. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), pages 53-68. Washington DC, USA, 25 October 2004. 82. Angelo Spognardi, Roberto Di Pietro, and Luigi V. Mancini. BaRT, Balanced Randomized Tree: A scalable and distributed protocol for look-up in peer-topeer networks. In In Proceedings of the 1st IEEE International Workshop on Hot Topics in Peer-to Peer Systems (HOT-P2P’04), pages 22-29. Volendam, The Netherlands, 8 October 2004. 83. Roberto Di Pietro and Gianluigi Me. Securing GPRS With Ipsec: Experimental Assessment. In Proceedings of the 5th World Wireless Congress, pages 469-474. 25-28 May 2004, San Francisco, California-USA. 9 84. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment. In Proceedings of the 18th IEEE International Parallel and Distributed Processing Symposium (IPDPS04), pages 217-224. 26-30 April 2004, Santa Fe, New Mexico, USA. 85. Stefano Chessa, Roberto Di Pietro, and Piero Maestrini. Dependable and Secure Data Storage in Wireless Ad Hoc Networks: an Assessment of DS2. In Proceedings of the IFIP Wireless On-demand Network Systems (WONS ’04). 21-23 January 2004, Trento-Italy, LNCS 2928, pages 184-198, Springer 2004. 86. Roberto Di Pietro, Alessandro Mei, and Luigi V. Mancini. Random Key Assignment for Secure Wireless Sensor Networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’03), pages 62-71. Fairfax-VA, USA, 31 October 2003. 87. Roberto Di Pietro, Y.W. Law, Sandro Etalle, and Luigi V. Mancini. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In Proceedings of the IEEE 2003 International Conference on Parallel Processing Workshops (ICPPW ’03), pages 397-406. IEEE press, Kaohsiung, Taiwan-ROC, 6-9 October, 2003. 88. Roberto Di Pietro, Antonio Durante, and Luigi V. Mancini. A reliable key authentication scheme for secure multicast communications. In Proceedings of the IEEE 22nd Symposium on Reliable Distributed Systems (SRDS) 2003, pages 231-240. IEEE press, 6-8 October 2003, Florence -Italy. 89. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. A time driven methodology for keys dimensioning in secure multicast communications. In Proceedings of the 18th IFIP International Conference on Information Security (SEC’03), pages 121-132. Kluwer, 26-28 May 2003, Athens-Greece. 90. Antonio Durante, Roberto Di Pietro, and Luigi V. Mancini. Formal specification for fast automatic ids training. In Ali Abdallah, Peter Ryan, and Steve Schneider, editors, Proceedings from the BCS-FACS International Conference on Formal Aspects of Security 2002, volume 2629 of LNCS, pages 191-204, Springer 2003. 91. Roberto Di Pietro, Luigi V. Mancini, and Sushil Jajodia. Efficient and secure keys management for wireless mobile communications. In Proceedings of the 2nd ACM SIGSAC international workshop on Principles of mobile computing, pages 66-73. ACM Press, 30-31 October 2002, Toulouse-France. 92. Roberto Di Pietro and G. Me. Military secure communications over public cellular network infrastructure. In IEEE Military Communications Conference -Milcom 2002-, volume 1, pages 400-405. IEEE press, 7-10 October 2002, Anaheim, California-USA. 10 93. Roberto Di Pietro and Luigi V. Mancini. A methodology for computer forensic analysis. In Proceedings of the 3rd Annual IEEE Information Assurance Workshop, pages 41-48. 17-19 June 2002, West Point-NY-USA. 94. Roberto Di Pietro, Luigi V. Mancini, and Sushil Jajodia. Secure selective exclusion in ad hoc wireless network. In Proceedings of the 17th IFIP International Information Security Conference (SEC’02), pages 423-434. Kluwer, 5-7 May 2002, Cairo-Egypt. • Editor dei seguenti libri: 95. Intrusion Detection Systems. Series: Advances in Information Security, Vol. 38 Di Pietro, Roberto; Mancini, Luigi V. (Eds.) 2008, XIV, 249 p. 20 illus. Springer-Verlag publisher. ISBN: 978-0-387-77265-3 • Contributi a libri: 96. Roberto Di Pietro, Nino V. Verde. OS and Network Security. In Handbook of Electronic and Digital Forensics. World-Scientific publisher. ISBN: 978981-283-703-5. 97. Roberto Di Pietro, Nino V. Verde. Authentication. In Handbook of Electronic and Digital Forensics. World-Scientific publisher. ISBN: 978-981-283703-5. 98. Roberto Di Pietro, Nino V. Verde. Digital Forensics Techniques and tools. In Handbook of Electronic and Digital Forensics. World-Scientific publisher. ISBN: 978-981-283-703-5. 99. Roberto Di Pietro, Antonio Durante, and Luigi V. Mancini. Formal Specification for Fast Automatic Profiling of Program Behavior. In Intrusion Detection Systems. Series: Advances in Information Security, Vol. 38. Springer-Verlag publisher. ISBN: 978-0-387-77265-3, May 2008. 100. Roberto Di Pietro, Alessandro Mei, and Luigi V. Mancini. Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks. IEEE Press Book: Sensor Network Operations, ISBN: 0-471-71976-5, May 2006 101. Roberto Di Pietro e Gianluigi Me. L’Information Warfare nel Terzo Millennio. Capitolo 5 del libro “Temi di Criminologia”, curato da G. Marotta, edito da: LED - Edizioni Universitarie, pagine 137-159. ISBN: 8-879-16265-9, 2004. 102. Roberto Di Pietro e Gianluigi Me. Le Investigazioni Informatiche nel Processo Penale. Capitolo 10 del libro “Temi di Criminologia”, curato da G. Marotta, edito da: LED - Edizioni Universitarie, pagine 239-263. ISBN: 8-879-16265-9, 2004. • Deliverable di progetto: 11 103. Roberto Di Pietro, and Chiara Petrioli. EYES Project: Security Architecture. Deliverable 3.6 (final); August 2004. 12