Follow
Gianpiero Costantino
Gianpiero Costantino
IIT-CNR
Verified email at iit.cnr.it - Homepage
Title
Cited by
Cited by
Year
A cloud-edge based data security architecture for sharing and analysing cyber threat information
DW Chadwick, W Fan, G Costantino, R De Lemos, F Di Cerbo, I Herwono, ...
Future generation computer systems 102, 710-722, 2020
1112020
Practical privacy-preserving medical diagnosis using homomorphic encryption
S Carpov, TH Nguyen, R Sirdey, G Constantino, F Martinelli
2016 ieee 9th international conference on cloud computing (cloud), 593-599, 2016
582016
Toucan: A protocol to secure controller area network
G Bella, P Biondi, G Costantino, I Matteucci
Proceedings of the ACM Workshop on Automotive Cybersecurity, 3-8, 2019
512019
CANDY: A social engineering attack to leak information from infotainment system
G Costantino, A La Marra, F Martinelli, I Matteucci
2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018
422018
Privacy-preserving interest-casting in opportunistic networks
G Costantino, F Martinelli, P Santi
2012 IEEE Wireless Communications and Networking Conference (WCNC), 2829-2834, 2012
352012
Trade-off analysis of safety and security in CAN bus communication
L Dariz, M Selvatici, M Ruggeri, G Costantino, F Martinelli
2017 5th IEEE International Conference on Models and Technologies for …, 2017
312017
Managing reputation over manets
G Bella, G Costantino, S Riccobene
2008 The Fourth International Conference on Information Assurance and …, 2008
282008
Towards enforcing on-the-fly policies in BYOD environments
G Costantino, F Martinelli, A Saracino, D Sgandurra
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
272013
Investigating the privacy versus forwarding accuracy tradeoff in opportunisticinterest-casting
G Costantino, F Martinelli, P Santi
IEEE Transactions on Mobile Computing 13 (4), 824-837, 2013
252013
An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast
G Costantino, F Martinelli, P Santi, D Amoruso
Proceedings of the 18th annual international conference on Mobile computing …, 2012
252012
Privacy-preserving text mining as a service
G Costantino, A La Marra, F Martinelli, A Saracino, M Sheikhalishahi
2017 IEEE Symposium on Computers and Communications (ISCC), 890-897, 2017
242017
CINNAMON: A module for AUTOSAR secure onboard communication
G Bella, P Biondi, G Costantino, I Matteucci
2020 16th European Dependable Computing Conference (EDCC), 103-110, 2020
202020
CANDY CREAM-hacking infotainment android systems to command instrument cluster via can data frame
G Costantino, I Matteucci
2019 IEEE International Conference on Computational Science and Engineering …, 2019
182019
Evaluating the device reputation through full observation in MANETs
G Bella, G Costantino, S Riccobene
J. Information Assurance and Security 4 (5), 458-465, 2009
162009
In-depth exploration of ISO/SAE 21434 and its correlations with existing standards
G Costantino, M De Vincenzi, I Matteucci
IEEE Communications Standards Magazine 6 (1), 84-92, 2022
132022
Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions.
E Carniani, G Costantino, F Marino, F Martinelli, P Mori
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (4), 20-40, 2016
132016
Implementing CAN bus security by TOUCAN
P Biondi, G Bella, G Costantino, I Matteucci
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc …, 2019
102019
Enhancing DSR maintenance with power awareness
G Bella, G Costantino, J Crowcroft, S Riccobene
Computer Standards & Interfaces 35 (1), 107-113, 2013
102013
Priorities-based review computation
G Costantino, F Martinelli, M Petrocchi
2012 AAAI Spring Symposium Series, 2012
102012
Remote management of face-to-face written authenticated though anonymous exams.
G Bella, G Costantino, L Coles-Kemp, S Riccobene
CSEDU (2), 431-437, 2011
102011
The system can't perform the operation now. Try again later.
Articles 1–20