Elenco Pubblicazioni

Transcript

Elenco Pubblicazioni
Elenco Pubblicazioni
• Riviste Internazionali
1. Gabriele Oligeri, Stefano Chessa, Roberto Di Pietro, and Gaetano Giunta.
Robust and Efficient Authentication of Video Stream Broadcasting. In ACM
Transactions on Information Systems Security (TISSEC) (ACM press), in
press.
2. Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, and Luigi V. Mancini.
Secure Topology Maintenance and Events Collection in WSN. In Security and
Communication Networks (Wiley)—Special Issue on Security and Privacy in
Wireless Systems—, in press.
3. Flavio Lombardi and Roberto Di Pietro. Secure Virtualization for Cloud
Computing. In Journal of Network and Computer Applications (JNCA)
(Elsevier)—Special Issue on Recent Advances in Cloud Computing—, in
press.
4. Roberto Di Pietro and Alexandre Viejo. Location Privacy and Resilience in
Wireless Sensor Networks Querying. In Computer Communications (Elsevier),—Special Issue on Information and Future Communication Security—, in
press.
5. Roberto Di Pietro and Refik Molva. An optimal probabilistic solution for
information confinement, privacy, and security in RFID systems. In Journal
of Network and Computer Applications (JNCA) (Elsevier)–Special Issue on
RFID Technology, Systems, and Applications—, in press.
6. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V.
Verde. A New Role Mining Framework to Elicit Business Roles and to Mitigate Enterprise Risk. In Decision Support Systems (DSS) (Elsevier)—Special
Issue on Enterprise Risk and Security Management—, in press.
7. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei.
Distributed Detection of Clone Attacks in Wireless Sensor Networks. In
IEEE Transactions on Dependable and Secure Computing (TDSC), in press.
8. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Hierarchies of
Keys in Secure Multicast Communications. In Journal of Computer Security,
Vol. 18(5), September 2010, pages 839-860, 2010.
9. Alessandro Colantonio and Roberto Di Pietro. CONCISE: Compressed ’n’
Composable Integer Set. In Information Processing Letters (IPL), vol. 110(16),
pages 644-650, 31 July 2010.
10. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V.
Verde. Taming Role Mining Complexity in RBAC. In Computers & Security
1
(Elsevier)—Special Issue on Challenges for Security, Privacy & Trust—, vol.
29(5), pages 548-564, July 2010.
11. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi.
eRIPP-FS: Enforcing Privacy and Security in RFID. In Security and Communication Networks (Wiley)—Special Issue on Security in Next Generation
Wireless Networks—, vol. 3(1), pages 58-70, Jan-Feb 2010.
12. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi,
and Gene Tsudik. Data Security in Unattended Wireless Sensor Networks.
In IEEE Transactions on Computers (ToC)—Special Issue on Autonomic
Network Computing—, vol. 50(11), pages 1500-1511, November 2009.
13. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi,
and Gene Tsudik. Playing Hide-and-Seek with a Focused Mobile Adversary
in Unattended Wireless Sensor Networks. In Journal of Ad Hoc Networks
(Elsevier)—Special Issue on Privacy and Security in Wireless Sensor and Ad
Hoc Networks—, vol. 7(4), pages 1463-1475, November 2009.
14. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei.
Distributed Data Source Verification in Wireless Sensor Networks. In Information Fusion (Elsevier)—Special Issue on Information Fusion in Computer
Security—, vol. 10(4), pages 342-353, October 2009.
15. Mauro Conti, Roberto Di Pietro, Alessandro Mei, Luigi V. Mancini. Mobility
and Cooperation to Thwart Node Capture Attacks in MANETs. In Journal
on Wireless Communications and Networking (EURASIP), vol. 2009, pages
1–13, July 2009.
16. Michele Albano, Stefano Chessa, and Roberto Di Pietro. A model with
applications for data survivability in Critical Infrastructures. In Journal of
Information Assurance and Security, vol. 4(6), pages 629-639, June 2009.
17. Roberto Di Pietro, Pietro Michiardi, and Refik Molva. Confidentiality and
Integrity for Data Aggregation in WSN Using Peer Monitoring. In Security
and Communication Networks (Wiley), vol. 2(2), pages 181-194, April 2009.
18. Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, and Luigi Vincenzo Mancini. Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks. In Security and Communication Networks
(Wiley)—Special Issue on Security in Wireless Sensor Networks—, vol.2(2),
pages 195-213, Jan 2009.
19. Roberto Di Pietro and Stefano Iannitti. Maximizing service availability for
secure satellite broadcasting. In International Journal of Satellite Communications and Networking (Wiley), vol. 26(4), pages 269-289, August
2008.
2
20. Paolo Cencioni and Roberto Di Pietro. A mechanism to enforce privacy
in vehicle-to-infrastructure communication. In Computer Communications
(Elsevier), vol. 31(12), pages 2790-2802, July 2008.
21. Roberto Di Pietro, Alessandro Mei, Luigi V. Mancini, Alessandro Panconesi, and Jaikumar Radhakrishnan. Redoubtable Sensor Networks. In ACM
Transactions on Information Systems Security (TISSEC) (ACM press), vol.
11(3), pages 1-22, March 2008.
22. Giorgio Zanin, Roberto Di Pietro, and Luigi V. Mancini. Robust RSA Distributed Signature for Large-scale Long-lived Ad-hoc Networks. In Journal
of Computer Security, vol. 15(1), pages 171-196, January 2007.
23. Mauro Conti, Roberto Di Pietro, and Luigi V. Mancini. ECCE: Enhanced
Cooperative Channel Establishment for secure pair-wise communication in
WSN. In Journal of AdHoc Networks (Elsevier), vol. 5(1), pages 49-62,
January 2007.
24. Roberto Di Pietro, Luigi V. Mancini, and Giorgio Zanin. Efficient and Adaptive Threshold Signatures for Adhoc networks. In Electr. Notes Theor.
Comput. Sci. (ENTCS), Vol. 171(1), pages 93-105, 2007.
25. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Energy Efficient Node-to-Node Authentication and Communication Confidentiality in
Wireless Sensor Networks. In Wireless Networks, vol. 12(6), pages 709-721,
December 2006.
26. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Key Management
for High Bandwidth Secure Multicast. In Journal of Computer Security, vol.
12(5), pages 693-709, October 2004.
27. Roberto Di Pietro, Luigi V. Mancini, and Sushil Jajodia. Providing secrecy
in key management protocols for large wireless sensors networks. In Journal
of AdHoc Networks (Elsevier), vol. 1(4), pages 455-468, November 2003.
28. Roberto Di Pietro and Luigi V. Mancini. Security and privacy issues of handheld/wearable wireless devices. In Communications of the ACM, vol. 46(9),
pages 75-79, September 2003.
• Conferenze e Workshops (referate)
29. Mauro Conti, Bruno Crispo, Roberto Di Pietro, and Luciana Marconi. Time
Warp: how time affects privacy in LBSs. In Proceedings of the 12th International Conference on Information and Communications Security (ICICS’10),
December 15-17, 2010, Barcelona-Spain, in press.
3
30. Flavio Lombardi and Roberto Di Pietro. CUDACS: Securing the Cloud with
CUDA-enabled Secure Virtualization. In Proceedings of the 12th International Conference on Information and Communications Security (ICICS’10),
December 15-17, 2010, Barcelona-Spain, in press.
31. Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, and Gene Tsudik. Securing Mobile Unattended WSNs against a mobile adversary. In Proceedings
of the 29th IEEE International Symposium on Reliable Distributed Systems
(SRDS’10), October 31November 3, 2010, New Delhi, India, in press.
32. Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, and
Alessandro Mei. The Smallville Effect: Social Ties Make Mobile Networks
More Secure Against the Node Capture Attack. In Proceedings of the 8th
ACM International Symposium on Mobility Management and Wireless Access
(MobiWac’10), Bodrum, Turkey October 17-21, 2010, in press.
33. Luciana Marconi, Mauro Conti, and Roberto Di Pietro. CED2 : Communication Efficient Disjointness Decision . In Proceedings of the 6th International Conference on Security and Privacy in Communication Networks
(SecureComm’10), September 7-10, 2010, Singapore, in press.
34. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V.
Verde. Mining Business-Relevant RBAC States Through Decomposition.
In Proceedings of the 25th IFIP International Conference on Information
Security (SEC’10), in press.
35. Roberto Bragantini and Mauro Conti and Roberto Di Pietro. Security in
Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance. In Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10), in
press.
36. Lei Zhang and Honggang Zhang and Mauro Conti and Roberto Di Pietro
and Sushil Jajodia and Luigi V. Mancini. Reverse Tree-based Key Routing:
Robust Data Aggregation in Wireless Sensor Networks. In Proceedings of
the 3rd IEEE International Symposium on Trust, Security and Privacy for
Emerging Applications (TSP-10), in press.
37. Flavio Lombardi and Roberto Di Pietro. A Security Management Architecture for the protection of Kernel Virtual Machines. In Proceedings of the 3rd
IEEE International Symposium on Trust, Security and Privacy for Emerging
Applications (TSP-10), in press.
38. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V.
Verde. Evaluating the Risk of Adopting RBAC Roles. In Proceedings of the
24th Annual IFIP WG 11.3 Working Conference on Data and Applications
Security (DBSec’10), in press.
4
39. Stefano Ortolani, Mauro Conti, Bruno Crispo and Roberto di Pietro. Event
Handoff Unobservability in WSN. In Open Research Problems in Network
Security (IFIP - iNetSec 2010 ), in press.
40. Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, and Gene Tsudik.
Intrusion-Resilience in Mobile Unattended WSNs. In Proceedings of the 29th
IEEE Conference on Computer Communications (INFOCOM’10), pages 1-9,
March 15-19, 2010, San Diego - CA, USA.
41. Flavio Lombardi and Roberto Di Pietro. Transparent Security for Cloud.
In Proceedings of the 25th ACM Symposium on Applied Computing (ACM
SAC’10), pages 414-415, March 22-26, 2010, Sierre, Switzerland.
42. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V.
Verde. ABBA: Adaptive Bicluster-Based Approach to Impute Missing Values in Binary Matrices. In Proceedings of the 25th ACM Symposium on
Applied Computing (ACM SAC’10), pages 1026-1033, March 22-26, 2010,
Sierre, Switzerland.
43. Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, and Luigi V. Mancini.
Sec-TMP: a Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. In Proceedings of the 5th International Conference on
Security and Privacy in Communication Networks (SecureComm’09), pages
265-284, September 14-18, 2009, Athens-Greece.
44. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V.
Verde. An Activity-Based Framework for Modeling, Managing, and Relaxing SoD Constraints. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT’09), pages 85-94, June 3–5,
2009, Stresa, Italy.
45. Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, and
Alessandro Mei. The Quest for Mobility Model to analyse Security in Mobile
ad Hoc Networks. In Proceedings of the 7th International Conference on
Wired/Wireless Internet Communications (WWIC’09), pages 85-96, May 2729, 2009, Enschede, The Netherlands.
46. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V.
Verde. Mining Stable Roles in RBAC. In Proceedings of the 24th IFIP International Conference on Information Security (SEC’09), pages 259–269, May
18–20, 2009, Pafos-Greece.
47. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino V.
Verde. A Probabilistic Bound on the Basic Role Mining Problem and its Applications. In Proceedings of the 24th IFIP International Conference on Information Security (SEC’09), pages 376–386, May 18–20, 2009, Pafos-Greece.
48. Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, and Gene Tsudik.
Collaborative Authentication in Unattended WSNs. In Proceedings of the 2nd
5
ACM Conference on Wireless Network Security (WiSec’09), pages 237-244,
March 16–18, 2009, Zurich, Switzerland.
49. Flavio Lombardi and Roberto Di Pietro. KvmSec: A Security Extension for
Linux Kernel Virtual Machines. In Proceedings of the 24th ACM Symposium
on Applied Computing (ACM SAC’09), pages 2029-2034, March 8-12, 2009,
Honolulu, Hawaii-USA.
50. Agusti Solanas and Roberto Di Pietro. A Linear-Time Multivariate Microaggregation for Privacy Protection in Uniform Very Large Data Sets. In
Proceedings of the 5th Modeling Decisions for Artificial Intelligence Modeling Decisions for Artificial Intelligence (MDAI’08), pages 203–214, Sabadell
(Barcelona), Spain, October 30-31, 2008
51. Roberto Di Pietro, Di Ma, Claudio Soriente, and Gene Tsudik. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks In
Proceedings of the 27th IEEE International Symposium on Reliable Distributed Systems (SRDS’08), pages 185–194, Napoli, Italy, October 6-8, 2008
52. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini and Gene Tsudik.
Scalable and Efficient Provable Data Possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks
(SecureComm’08), September 22-26, 2008 Istanbul, Turkey.
53. Roberto Di Pietro and Andrea Cirulli. PEAC: a Probabilistic, Efficient, and
resilient Authentication protocol for broadcast Communications. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm’08), September 22-26, 2008 Istanbul,
Turkey.
54. Michele Albano, Steano Chessa, and Roberto Di Pietro. Information Assurance in Critical Infrastructures via Wireless Sensor Networks. In Proceedings
of the 4th International Conference on Information Assurance and Security
(IAS’08), pages 305–310, September 8 - 10, 2008, Naples, Italy.
55. Alessandro Colantonio, Roberto Di Pietro, and Alberto Ocello. Leveraging
Lattices to Improve Role Mining. In Proceedings of the 23rd IFIP International Information Security Conference (SEC’08), pages 333–347, September
8 - 10, 2008, Milan, Italy.
56. Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini. A Live Digital Forensic system for Windows network. In Proceedings of the 23rd IFIP International Information Security
Conference (SEC 2008), pages 653-667, September 8 - 10, 2008, Milan, Italy.
57. Roberto Di Pietro, and Pietro Michiardi. Brief announcement: Gossipbased aggregate computation, computing faster with non address-oblivious
schemes. In Proceedings of the 27th ACM SIGACT-SIGOPS Symposium on
Principles of Distributed Computing (PODC), page 442, August 18-21, 2008,
Toronto, Canada.
6
58. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei.
Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks. In Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec ’08), pages 214-219, March 31-April 2, 2008,
Alexandria, VA-USA.
59. Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, and Melanie R. Rieback. RFID security and privacy: long-term
research or short-term tinkering? In Proceedings of the 1st ACM Conference
on Wireless Network Security (WiSec ’08), page 160, March 31-April 2, 2008,
Alexandria, VA-USA.
60. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi,
and Gene Tsudik. Catch Me (If You Can): Data Survival in Unattended
Sensor Networks. In Proceedings of the 6th IEEE International Conference on
Pervasive Computing and Communications (PerCom 2008), pages 185-194,
Hong Kong, March 17 - 21, 2008.
61. Alessandro Colantonio, Roberto Di Pietro, and Alberto Ocello. A CostDriven Approach to Role Engineering. In Proceedings of the 23rd ACM Symposium on Applied Computing (SAC08), pages 2129–2136, Fortaleza, Ceará,
Brazil, March 16-20, 2008.
62. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Angelo Spognardi. FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and
Fast Resynchronization. In Proceedings of the 33rd Annual Conference of the
IEEE Industrial Electronics Society (IEEE IECON 07), pages 52–57, Taipei,
Taiwan, November 5, 2007.
63. Paolo Cencioni and Roberto Di Pietro. VIPER: A vehicle-to-infrastructure
communication privacy enforcement protocol. In Proceedings of the 1st IEEE
International Workshop on Mobile Vehicular Networks (MoVeNet 2007), pages
1–6, Pisa, Italy, October 12, 2007.
64. Yee Wei Law, Li-Hsing Yen, Roberto Di Pietro, and Marimuthu Palaniswami. Secure k-Connectivity Properties of Wireless Sensor Networks. In
Proceedings of the 3rd IEEE International Workshop on Wireless and Sensor
Networks Security (WSNS), pages 1–6, Pisa, Italy, October 8, 2007.
65. Roberto Di Pietro and Refik Molva. Information confinement, privacy, and
security in RFID systems. In Proceedings of the 12th European Symposium
Research Computer Security. (ESORICS’07), pages 187-202, September 2426, 2007, Dresden, Germany.
66. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. A
Randomized, Efficient, and Distributed Protocol for the Detection of Node
Replication Attacks in Wireless Sensor Networks. In Proceedings of the 8th
7
ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’07), pages 80-89, September 9-14, 2007, Montréal, Quebec,
Canada, Canada.
67. Stefano Chessa and Roberto Di Pietro and Erina Ferro and Gaetano Giunta and Gabriele Oligeri. Mobile Application Security for Video Streaming
Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. In Proceedings of the 2007 IEEE 65th Vehicular Technology Conference VTC 2007-Spring, pages 634 - 638, 22 - 25 April 2007,
Dublin, Ireland.
68. Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei. Towards threatadaptive dynamic fragment replication in large scale distributed systems. In
Proceedings of IEEE International Symposium on Parallel and Distributed
Processing (IPDPS’07), pages 1-8, March 26-30 2007, Long Beach, California
USA
69. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Angelo Spognardi. RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy. In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW
’07), pages 229-234, 19 March 2007, New York, USA.
70. Roberto Di Pietro, Alessandro Mei, Luigi V. Mancini, Alessandro Panconesi,
and Jaikumar Radhakrishnan. Sensor Networks that Are Provably Resilient.
In Proceedings of the 2nd IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2006),
pages 1-10, August 28 - September 1, 2006, Baltimore-MD, USA.
71. Roberto Di Pietro and Stefano Iannitti. Optimal key scheduling for secure
satellite broadcasting to mobile users. In Proceedings of 2nd International
Workshop on Satellite and Space Communications 2006 (IWSSC2006), pages
34-38, September 14 - 15, 2006, Madrid - Spain, IEEE press.
72. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei.
Requirements and Open Issues in Distributed Detection of Node Identity
Replicas in WSN. In Proceedings of IEEE SMC, Special Session on Wireless
Sensor Networks, pages 1468–1473, 29 april 2006, Taipei, Taiwan.
73. Angelo Spognardi and Roberto Di Pietro. A formal framework for the performance analysis of P2P networks protocols. In Proceedings of the 3rd IEEE International Workshop on Hot Topics in Peer-to Peer Systems (HOT-P2P’06).
29 april 2006, Rhodes Island, Greece.
74. Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, and Vishwas Patil.
Addressing the Shortcomings of One-Way Chains. In Proceedings of the 1st
ACM Symposium on Information, Computer, and Communication Security
(ASIACCS 2006), pages 289-296, March 21 - 24, 2006, Taipei - Taiwan, ACM
press.
8
75. Mauro Conti, Roberto Di Pietro, and Luigi V. Mancini. Secure Cooperative Channel Establishment in Wireless Sensor Networks. In Proceedings of
the 4th IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW), pages 327-331, March 13, 2006, Pisa,
Italy.
76. Roberto Di Pietro, Stefano Chessa, and Piero Maestrini. Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast.
In Proceedings of the 1st IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005),
pages 13-22, September 5 - 9, 2005, Athens, Greece, IEEE Press.
77. Roberto Di Pietro and Antonio Durante and Luigi V. Mancini, Vishwas Patil.
Short paper: Practically Unbounded One-Way Chains for Authentication
with Backward Secrecy. In Proceedings of the 1st IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), pages 400-402, September 5 - 9, 2005, Athens,
Greece, IEEE Press.
78. Angelo Spognardi, Alessandro Lucarelli, and Roberto Di Pietro. A methodology for P2P file-sharing traffic detection. In Proceedings of the 2nd IEEE International Workshop on Hot Topics in Peer-to Peer Systems (HOT-P2P’05),
pages 52-61. San Diego, CA, USA, 21 July 2005, IEEE press.
79. Roberto Di Pietro, Gianluigi Me, and Maurizio A. Strangio. A Two-Factor
Mobile Authentication Scheme for Secure Financial Transactions. In Proceedings of the 4th IEEE International Conference on Mobile Business (ICMB’05), pages 28-34, Sidney, Australia, 11 July 2005.
80. Roberto Di Pietro, Mauro Mochi, Gianluigi Me, and Maurizio A. Strangio.
An Effective Methodology to Deal with Slack Space Analysis. In Proceedings of the International Conference on E-Crime and Computer Evidence
(ECCE’05). Monaco, Montecarlo, 29th March 2005.
81. Roberto Di Pietro, Alessandro Mei, Luigi V. Mancini, Alessandro Panconesi,
and Jaikumar Radhakrishnan. Connectivity Properties of Secure Wireless
Sensor Networks. In Proceedings of the 2nd ACM Workshop on Security of
Ad Hoc and Sensor Networks (SASN ’04), pages 53-68. Washington DC,
USA, 25 October 2004.
82. Angelo Spognardi, Roberto Di Pietro, and Luigi V. Mancini. BaRT, Balanced
Randomized Tree: A scalable and distributed protocol for look-up in peer-topeer networks. In In Proceedings of the 1st IEEE International Workshop on
Hot Topics in Peer-to Peer Systems (HOT-P2P’04), pages 22-29. Volendam,
The Netherlands, 8 October 2004.
83. Roberto Di Pietro and Gianluigi Me. Securing GPRS With Ipsec: Experimental Assessment. In Proceedings of the 5th World Wireless Congress, pages
469-474. 25-28 May 2004, San Francisco, California-USA.
9
84. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. Efficient and
Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment. In
Proceedings of the 18th IEEE International Parallel and Distributed Processing Symposium (IPDPS04), pages 217-224. 26-30 April 2004, Santa Fe, New
Mexico, USA.
85. Stefano Chessa, Roberto Di Pietro, and Piero Maestrini. Dependable and
Secure Data Storage in Wireless Ad Hoc Networks: an Assessment of DS2.
In Proceedings of the IFIP Wireless On-demand Network Systems (WONS
’04). 21-23 January 2004, Trento-Italy, LNCS 2928, pages 184-198, Springer
2004.
86. Roberto Di Pietro, Alessandro Mei, and Luigi V. Mancini. Random Key
Assignment for Secure Wireless Sensor Networks. In Proceedings of the ACM
Workshop on Security of Ad Hoc and Sensor Networks (SASN ’03), pages
62-71. Fairfax-VA, USA, 31 October 2003.
87. Roberto Di Pietro, Y.W. Law, Sandro Etalle, and Luigi V. Mancini. LKHW:
A directed diffusion-based secure multicast scheme for wireless sensor networks. In Proceedings of the IEEE 2003 International Conference on Parallel
Processing Workshops (ICPPW ’03), pages 397-406. IEEE press, Kaohsiung,
Taiwan-ROC, 6-9 October, 2003.
88. Roberto Di Pietro, Antonio Durante, and Luigi V. Mancini. A reliable key
authentication scheme for secure multicast communications. In Proceedings
of the IEEE 22nd Symposium on Reliable Distributed Systems (SRDS) 2003,
pages 231-240. IEEE press, 6-8 October 2003, Florence -Italy.
89. Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei. A time driven methodology for keys dimensioning in secure multicast communications.
In Proceedings of the 18th IFIP International Conference on Information
Security (SEC’03), pages 121-132. Kluwer, 26-28 May 2003, Athens-Greece.
90. Antonio Durante, Roberto Di Pietro, and Luigi V. Mancini. Formal specification for fast automatic ids training. In Ali Abdallah, Peter Ryan, and
Steve Schneider, editors, Proceedings from the BCS-FACS International Conference on Formal Aspects of Security 2002, volume 2629 of LNCS, pages
191-204, Springer 2003.
91. Roberto Di Pietro, Luigi V. Mancini, and Sushil Jajodia. Efficient and secure
keys management for wireless mobile communications. In Proceedings of the
2nd ACM SIGSAC international workshop on Principles of mobile computing,
pages 66-73. ACM Press, 30-31 October 2002, Toulouse-France.
92. Roberto Di Pietro and G. Me. Military secure communications over public
cellular network infrastructure. In IEEE Military Communications Conference -Milcom 2002-, volume 1, pages 400-405. IEEE press, 7-10 October
2002, Anaheim, California-USA.
10
93. Roberto Di Pietro and Luigi V. Mancini. A methodology for computer forensic analysis. In Proceedings of the 3rd Annual IEEE Information Assurance
Workshop, pages 41-48. 17-19 June 2002, West Point-NY-USA.
94. Roberto Di Pietro, Luigi V. Mancini, and Sushil Jajodia. Secure selective
exclusion in ad hoc wireless network. In Proceedings of the 17th IFIP International Information Security Conference (SEC’02), pages 423-434. Kluwer,
5-7 May 2002, Cairo-Egypt.
• Editor dei seguenti libri:
95. Intrusion Detection Systems. Series: Advances in Information Security, Vol.
38 Di Pietro, Roberto; Mancini, Luigi V. (Eds.) 2008, XIV, 249 p. 20 illus.
Springer-Verlag publisher. ISBN: 978-0-387-77265-3
• Contributi a libri:
96. Roberto Di Pietro, Nino V. Verde. OS and Network Security. In Handbook
of Electronic and Digital Forensics. World-Scientific publisher. ISBN: 978981-283-703-5.
97. Roberto Di Pietro, Nino V. Verde. Authentication. In Handbook of Electronic and Digital Forensics. World-Scientific publisher. ISBN: 978-981-283703-5.
98. Roberto Di Pietro, Nino V. Verde. Digital Forensics Techniques and tools.
In Handbook of Electronic and Digital Forensics. World-Scientific publisher.
ISBN: 978-981-283-703-5.
99. Roberto Di Pietro, Antonio Durante, and Luigi V. Mancini. Formal Specification for Fast Automatic Profiling of Program Behavior. In Intrusion
Detection Systems. Series: Advances in Information Security, Vol. 38.
Springer-Verlag publisher. ISBN: 978-0-387-77265-3, May 2008.
100. Roberto Di Pietro, Alessandro Mei, and Luigi V. Mancini. Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks. IEEE Press Book: Sensor Network Operations, ISBN: 0-471-71976-5,
May 2006
101. Roberto Di Pietro e Gianluigi Me. L’Information Warfare nel Terzo Millennio. Capitolo 5 del libro “Temi di Criminologia”, curato da G. Marotta,
edito da: LED - Edizioni Universitarie, pagine 137-159. ISBN: 8-879-16265-9,
2004.
102. Roberto Di Pietro e Gianluigi Me. Le Investigazioni Informatiche nel Processo Penale. Capitolo 10 del libro “Temi di Criminologia”, curato da G.
Marotta, edito da: LED - Edizioni Universitarie, pagine 239-263. ISBN:
8-879-16265-9, 2004.
• Deliverable di progetto:
11
103. Roberto Di Pietro, and Chiara Petrioli. EYES Project: Security Architecture. Deliverable 3.6 (final); August 2004.
12