Follow
Claudio Soriente
Claudio Soriente
NEC Labs
Verified email at neclab.eu
Title
Cited by
Cited by
Year
Streamcloud: An elastic and scalable data streaming system
V Gulisano, R Jimenez-Peris, M Patino-Martinez, C Soriente, P Valduriez
IEEE Transactions on Parallel and Distributed Systems 23 (12), 2351-2365, 2012
4012012
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
International workshop on public key cryptography, 481-500, 2009
3192009
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2602009
{Sound-Proof}: Usable {Two-Factor} Authentication Based on Ambient Sound
N Karapanos, C Marforio, C Soriente, S Capkun
24th USENIX security symposium (USENIX security 15), 483-498, 2015
2292015
Hummingbird: Privacy at the time of twitter
E De Cristofaro, C Soriente, G Tsudik, A Williams
2012 IEEE Symposium on Security and Privacy, 285-299, 2012
1792012
HAPADEP: human-assisted pure audio device pairing
C Soriente, G Tsudik, E Uzun
International Conference on Information Security, 385-400, 2008
1772008
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1552008
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
E De Cristofaro, C Soriente
Proceedings of the fourth ACM conference on Wireless network security, 23-28, 2011
1152011
BEDA: Button-enabled device pairing
C Soriente, G Tsudik, E Uzun
Cryptology ePrint Archive, 2007
1142007
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
A Castiglione, A De Santis, C Soriente
Journal of Systems and Software 80 (5), 750-764, 2007
1052007
Participatory privacy: Enabling privacy in participatory sensing
E De Cristofaro, C Soriente
IEEE network 27 (1), 32-36, 2013
1022013
Smartphones as Practical and Secure Location Verification Tokens for Payments.
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
NDSS 14, 23-26, 2014
932014
Data security in unattended wireless sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
IEEE Transactions on Computers 58 (11), 1500-1511, 2009
932009
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
2008 Symposium on Reliable Distributed Systems, 185-194, 2008
882008
Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI)
E De Cristofaro, C Soriente
IEEE Transactions on Information Forensics and Security 8 (12), 2021-2033, 2013
682013
Towards secure and decentralized sharing of IoT data
HTT Truong, M Almeida, G Karame, C Soriente
2019 IEEE International Conference on Blockchain (Blockchain), 176-183, 2019
632019
New adversary and new threats: security in unattended sensor networks
D Ma, C Soriente, G Tsudik
IEEE network 23 (2), 43-48, 2009
622009
Collaborative authentication in unattended wsns
R Di Pietro, C Soriente, A Spognardi, G Tsudik
Proceedings of the second ACM conference on Wireless network security, 237-244, 2009
592009
Solving revocation with efficient update of anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
International Conference on Security and Cryptography for Networks, 454-471, 2010
542010
Security and privacy issues in the Portable Document Format
A Castiglione, A De Santis, C Soriente
Journal of Systems and Software 83 (10), 1813-1822, 2010
522010
The system can't perform the operation now. Try again later.
Articles 1–20