Follow
Claudio Soriente
Claudio Soriente
NEC Labs
Verified email at neclab.eu
Title
Cited by
Cited by
Year
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
N Karapanos, C Marforio, C Soriente, S Capkun
24th USENIX security symposium (USENIX security 15), 483-498, 2015
522*2015
Streamcloud: An elastic and scalable data streaming system
V Gulisano, R Jimenez-Peris, M Patino-Martinez, C Soriente, P Valduriez
IEEE Transactions on Parallel and Distributed Systems 23 (12), 2351-2365, 2012
4352012
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
3802009
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2982009
Hummingbird: Privacy at the time of twitter
E De Cristofaro, C Soriente, G Tsudik, A Williams
2012 IEEE Symposium on security and privacy, 285-299, 2012
1852012
HAPADEP: human-assisted pure audio device pairing
C Soriente, G Tsudik, E Uzun
Information Security: 11th International Conference, ISC 2008, Taipei …, 2008
1792008
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
1562008
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
E De Cristofaro, C Soriente
Proceedings of the fourth ACM conference on Wireless network security, 23-28, 2011
1172011
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
A Castiglione, A De Santis, C Soriente
Journal of Systems and Software 80 (5), 750-764, 2007
1172007
BEDA: Button-enabled device pairing
C Soriente, G Tsudik, E Uzun
Cryptology ePrint Archive, 2007
1162007
Participatory privacy: Enabling privacy in participatory sensing
E De Cristofaro, C Soriente
IEEE network 27 (1), 32-36, 2013
1062013
Towards secure and decentralized sharing of IoT data
HTT Truong, M Almeida, G Karame, C Soriente
2019 IEEE International Conference on Blockchain (Blockchain), 176-183, 2019
1052019
Smartphones as Practical and Secure Location Verification Tokens for Payments.
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
NDSS 14, 23-26, 2014
1042014
Data security in unattended wireless sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
IEEE Transactions on Computers 58 (11), 1500-1511, 2009
972009
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
2008 Symposium on Reliable Distributed Systems, 185-194, 2008
892008
Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI)
E De Cristofaro, C Soriente
IEEE Transactions on Information Forensics and Security 8 (12), 2021-2033, 2013
802013
New adversary and new threats: security in unattended sensor networks
D Ma, C Soriente, G Tsudik
IEEE network 23 (2), 43-48, 2009
652009
Solving revocation with efficient update of anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
International Conference on Security and Cryptography for Networks, 454-471, 2010
642010
Collaborative authentication in unattended wsns
R Di Pietro, C Soriente, A Spognardi, G Tsudik
Proceedings of the second ACM conference on Wireless network security, 237-244, 2009
592009
Security and privacy issues in the Portable Document Format
A Castiglione, A De Santis, C Soriente
Journal of Systems and Software 83 (10), 1813-1822, 2010
572010
The system can't perform the operation now. Try again later.
Articles 1–20