Mauro Conti
Mauro Conti
IEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW Seattle
Geverifieerd e-mailadres voor math.unipd.it - Homepage
Geciteerd door
Geciteerd door
A survey on homomorphic encryption schemes: Theory and implementation
A Acar, H Aksu, AS Uluagac, M Conti
ACM Computing Surveys (Csur) 51 (4), 1-35, 2018
A survey on security and privacy issues of bitcoin
M Conti, ES Kumar, C Lal, S Ruj
IEEE communications surveys & tutorials 20 (4), 3416-3452, 2018
A Survey of Man In The Middle Attacks
M Conti, N Dragoni, V Lesyk
IEEE Communications Surveys & Tutorials, 2016
Smart health: A context-aware health paradigm within smart cities
A Solanas, C Patsakis, M Conti, IS Vlachos, V Ramos, F Falcone, ...
IEEE Communications Magazine 52 (8), 74-81, 2014
Android Security: A Survey of Issues, Malware Penetration and Defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, M Gaur, M Conti, ...
IEEE Communications Surveys & Tutorials 17 (2), 2015
Internet of Things security and forensics: Challenges and opportunities
M Conti, A Dehghantanha, K Franke, S Watson
Future Generation Computer Systems 78, 544-546, 2018
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
Crepe: Context-related policy enforcement for android
M Conti, VTN Nguyen, B Crispo
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
{FlowFence}: Practical data protection for emerging {IoT} application frameworks
E Fernandes, J Paupore, A Rahmati, D Simionato, M Conti, A Prakash
25th USENIX security symposium (USENIX Security 16), 531-548, 2016
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Computer communications 107, 30-48, 2017
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
Peek-a-boo: I see your smart home activities, even encrypted!
A Acar, H Fereidooni, T Abera, AK Sikder, M Miettinen, H Aksu, M Conti, ...
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
Provably secure authenticated key agreement scheme for smart grid
V Odelu, AK Das, M Wazid, M Conti
IEEE Transactions on Smart Grid 9 (3), 1900-1910, 2016
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KKR Choo
Journal of Ambient Intelligence and Humanized Computing 9, 1141-1152, 2018
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments
PGV Naranjo, Z Pooranian, M Shojafar, M Conti, R Buyya
Journal of parallel and distributed computing 132, 274-283, 2019
All you need is" love" evading hate speech detection
T Gröndahl, L Pajola, M Juuti, M Conti, N Asokan
Proceedings of the 11th ACM workshop on artificial intelligence and security …, 2018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20