Follow
Claudio Soriente
Claudio Soriente
NEC Labs
Verified email at neclab.eu
Title
Cited by
Cited by
Year
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
N Karapanos, C Marforio, C Soriente, S Capkun
24th USENIX security symposium (USENIX security 15), 483-498, 2015
504*2015
Streamcloud: An elastic and scalable data streaming system
V Gulisano, R Jimenez-Peris, M Patino-Martinez, C Soriente, P Valduriez
IEEE Transactions on Parallel and Distributed Systems 23 (12), 2351-2365, 2012
4242012
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
3642009
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2832009
Hummingbird: Privacy at the time of twitter
E De Cristofaro, C Soriente, G Tsudik, A Williams
2012 IEEE Symposium on security and privacy, 285-299, 2012
1812012
HAPADEP: human-assisted pure audio device pairing
C Soriente, G Tsudik, E Uzun
Information Security: 11th International Conference, ISC 2008, Taipei …, 2008
1802008
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1572008
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
E De Cristofaro, C Soriente
Proceedings of the fourth ACM conference on Wireless network security, 23-28, 2011
1162011
BEDA: Button-enabled device pairing
C Soriente, G Tsudik, E Uzun
Cryptology ePrint Archive, 2007
1162007
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
A Castiglione, A De Santis, C Soriente
Journal of Systems and Software 80 (5), 750-764, 2007
1132007
Participatory privacy: Enabling privacy in participatory sensing
E De Cristofaro, C Soriente
IEEE network 27 (1), 32-36, 2013
1062013
Smartphones as Practical and Secure Location Verification Tokens for Payments.
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
NDSS 14, 23-26, 2014
992014
Data security in unattended wireless sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
IEEE Transactions on Computers 58 (11), 1500-1511, 2009
982009
Towards secure and decentralized sharing of IoT data
HTT Truong, M Almeida, G Karame, C Soriente
2019 IEEE International Conference on Blockchain (Blockchain), 176-183, 2019
962019
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
2008 Symposium on Reliable Distributed Systems, 185-194, 2008
892008
Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI)
E De Cristofaro, C Soriente
IEEE Transactions on Information Forensics and Security 8 (12), 2021-2033, 2013
792013
New adversary and new threats: security in unattended sensor networks
D Ma, C Soriente, G Tsudik
IEEE network 23 (2), 43-48, 2009
652009
Solving revocation with efficient update of anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
International Conference on Security and Cryptography for Networks, 454-471, 2010
612010
Collaborative authentication in unattended wsns
R Di Pietro, C Soriente, A Spognardi, G Tsudik
Proceedings of the second ACM conference on Wireless network security, 237-244, 2009
602009
Security and privacy issues in the Portable Document Format
A Castiglione, A De Santis, C Soriente
Journal of Systems and Software 83 (10), 1813-1822, 2010
582010
The system can't perform the operation now. Try again later.
Articles 1–20