Mauro Conti
Mauro Conti
Full Professor at University of Padua - Prof. (Affiliate) at U. Washington - Marie Curie Fellow
Geverifieerd e-mailadres voor math.unipd.it - Homepage
TitelGeciteerd doorJaar
Mobile ad hoc networking
S Basagni, M Conti, S Giordano, I Stojmenovic
John Wiley & Sons, 2004
10252004
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
3182013
Smart health: a context-aware health paradigm within smart cities
A Solanas, C Patsakis, M Conti, IS Vlachos, V Ramos, F Falcone, ...
IEEE Communications Magazine 52 (8), 74-81, 2014
3152014
Crepe: Context-related policy enforcement for android
M Conti, VTN Nguyen, B Crispo
International Conference on Information Security, 331-345, 2010
2892010
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
2602007
Android Security: A Survey of Issues, Malware Penetration and Defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, M Gaur, M Conti, ...
IEEE Communications Surveys & Tutorials 17 (2), 2015
2492015
Distributed detection of clone attacks in wireless sensor networks
M Conti, R Di Pietro, L Mancini, A Mei
IEEE transactions on dependable and secure computing 8 (5), 685-698, 2011
1772011
Mobile ad hoc networking: Cutting edge directions
S Basagni, M Conti, S Giordano, I Stojmenovic
John Wiley & Sons, 2013
144*2013
Secure data aggregation in wireless sensor networks
S Roy, M Conti, S Setia, S Jajodia
IEEE Transactions on Information Forensics and Security 7 (3), 1040-1052, 2012
1342012
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call
M Conti, I Zachia-Zlatea, B Crispo
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1202011
Routing approaches in mobile ad hoc networks
EM Belding-Royer, S Basagni, M Conti, S Giordano, I Stojmenovic
Mobile ad hoc networking 1 (1), 275-300, 2004
1172004
Providing source location privacy in wireless sensor networks: A survey
M Conti, J Willemsen, B Crispo
IEEE Communications Surveys & Tutorials 15 (3), 1238-1280, 2013
1152013
A Survey of Man In The Middle Attacks
M Conti, N Dragoni, V Lesyk
IEEE Communications Surveys & Tutorials, 2016
1142016
A survey on security and privacy issues of bitcoin
M Conti, ES Kumar, C Lal, S Ruj
IEEE Communications Surveys & Tutorials 20 (4), 3416-3452, 2018
1112018
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the first ACM conference on Wireless network security, 214-219, 2008
992008
Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact
S Roy, M Conti, S Setia, S Jajodia
IEEE Transactions on Information Forensics and Security 9 (4), 681-694, 2014
972014
A lightweight mechanism for detection of cache pollution attacks in named data networking
M Conti, P Gasti, M Teoli
Computer Networks 57 (16), 3178-3191, 2013
932013
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
912015
Crêpe: A system for enforcing fine-grained context-related policies on android
M Conti, B Crispo, E Fernandes, Y Zhauniarovich
IEEE Transactions on Information Forensics and Security 7 (5), 1426-1438, 2012
912012
MOSES: supporting operation modes on smartphones
G Russello, M Conti, B Crispo, E Fernandes
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
902012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20