Personal tools
You are here: Home / Member Web Pages / Claudio Soriente

Claudio Soriente

News:

Information

        • E-mail: csoriente (at) fi.upm.es

Education

Research Experience

Professional Activity

        • CANS 2011 The 10th International Conference on Cryptography and Network Security
        • ACM Wisec 2011 ACM Conference on Wireless Network Security
        • ACNS 2011 International Conference on Applied Cryptography and Network Security
        • ISC 2010  Information Security Conference

Publications

        • Journals and Magazines

          • R. Di Pietro, A. Spognardi, C. Soriente and G. Tsudik,
            Intrusion-resilient integrity in data-centric unattended WSNs,
            Pervasive and Mobile Computing,
            in press.

          • A. Castiglione, A. De Santis and C. Soriente,
            Security and Privacy Issues in the Portable Document Format,
            Journal of Systems and Software,
            Volume 83, Issue 10, 2010, pages 1813-1822.

          • D. Ma, C. Soriente and G.Tsudik,
            New Adversary and New Threats: Security in Unattended Sensor Networks,
            IEEE Network,
            Volume 23, Issue 2, 2009, pages 43-48.

          • R. Di Pietro, L.V. Mancinim, A. Spognardi, C. Soriente and G. Tsudik,
            Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks,
            Ad Hoc Networks,
            Volume 7, Issue 8, 2009, pages 1463-1475.
          • R. Di Pietro, L.V. Mancini, A. Spognardi, C. Soriente and G. Tsudik,
            Data Security in Unattended Wireless Sensor Networks,
            IEEE Transactions on Computers,
            Volume 58, Issue 11, 2009, pages 1500-1511.
          • C. Soriente, G. Tsudik and E. Uzun,
            Secure Pairing of Interface Constrained Devices,
            International Journal of Security and Networks,
            Volume 4, Issue 1/2, 2009, pages 17-26.
          • M.T. Goodrich, M. Sirivianos, J. Solis, C. Soriente, G. Tsudik and E. Uzun,
            Using Audio in Secure Device Pairing,
            International Journal of Security and Networks,
            Volume 4, Issue 1/2, 2009, pages 57-68.
          • A. Castiglione, A. De Santis and C. Soriente,
            Taking advantages of a disadvantage: digital forensics and steganography using document metadata,
            Journal of Systems and Software, Volume 80, Issue 5, 2007, pages 750-764.
          • A. De Santis and C. Soriente,
            A blocker-proof Conditional Access System,
            IEEE Transactions on Consumer Electronics,
            Volume 50, Issue 2, 2004, pages 591-596.
        • Conferences and Workshops

          • E. De Cristofaro and C. Soriente,
            PEPSI: Privacy-Enhancing Participatory Sensing Infrastructure,
            ACM Conference on Wireless Network Security (WiSec'11),
            June 2011, Hamburg, Germany, to appear.
          • R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik,
            Securing Mobile Unattended WSNs against a mobile adversary,
            IEEE Symposium on Reliable Distributed Systems (SRDS'10),
            November 2010, New Delhi, India, pages 11-20.
          • F. Lombardi, R. Di Pietro and C. Soriente,
            CReW: Cloud Resilience for Windows Guests through Monitored Virtualization,
            International Workshop on Resiliency Assessment of Complex Systems (RACOS'10),
            affiliated with IEEE Symposium on Reliable Distributed Systems (SRDS'10),
            November 2010, New Delhi, India, pages 338-342.
          • J. Camenisch and M. Kohlweiss and  C. Soriente,
            Solving Revocation with Efficient Update of Anonymous Credentials,
            Conference on Security and Cryptography for Networks (SCN'10),
            September 2010, Amalfi, Italy, pages 454-471.
          • R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik,
            Intrusion-Resilience in Mobile Unattended WSNs,
            IEEE Conference on Computer Communications (INFOCOM'10),
            March 2010, San Diego, CA, USA.
          • C. Castelluccia, A. Francillon, D. Perito, C. Soriente,
            On the difficulty of software-based attestation of embedded devices,
            ACM Conference on Computer and Communications Security (CCS'09),
            November 2009, Chicago, IL, USA, pages 400-409.
          • J. Camenisch, M. Kohlweiss, C. Soriente,
            An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials,
            IACR International Workshop on Practice and Theory in Public Key Cryptography (PKC'09),
            March 2009, Irvine, CA, USA, pages 481-500.
          • R. Di Pietro, A. Spognardi, C. Soriente and G. Tsudik,
            Collaborative Authentication In Unattended WSNs,
            ACM Conference on Wireless Network Security (WiSec'09),
            March 2009, Zürich, Switzerland, pages 237-244.
          • R. Di Pietro, D. Ma, C. Soriente and G. Tsudik,
            POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks,
            IEEE International Symposium on Reliable Distributed Systems (SRDS'08),
            October 2008, Naples, Italy, pages 185-194.
          • C. Soriente, G. Tsudik and E. Uzun,
            HAPADEP: Human-Assisted Pure Audio Device Pairing,
            International Information Security Conference (ISC'08),
            September 2008, Taipei, Taiwan, pages 385-400.
          • C. Castelluccia and C. Soriente,
            ABBA: A Balls and Bins Approach to Secure Aggregation in WSNs,
            International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'08),
            March 2008, Berlin, Germany, pages 185-191.
          • R. Di Pietro, L.V. Mancini, A. Spognardi, C. Soriente and G. Tsudik,
            Catch Me (If You Can): Data Survival in Unattended Sensor Networks,
            IEEE International Conference on Pervasive Computing and Communications (PerCom'08),
            March 2008, Hong Kong, China, pages 185-194.
          • A De Santis and C. Soriente,
            Modified Original Smart Cards and Smart Card Clone Countermeasures,
            International Conference on Computational Intelligence and Security (CIS'07),
            December 2007, Harbin, China, pages 878-882.
          • C. Soriente, G. Tsudik, and E. Uzun,
            BEDA: Button-Enabled Device Pairing,
            International Workshop on Security for Spontaneous Interaction (IWSSI'07), affiliated with UbiComp'07,
            September 2007, Innsbruck, Austria, pages 443-449.
          • K. El Defrawy and C. Soriente,
            PEUC-WiN: Privacy Enhancement by User Cooperation in Wireless Networks,
            IEEE Workshop on Secure Network Protocols (NPSEC'06), affiliated with ICNP'06,
            November 2006, Santa Barbara, California, USA, pages 38-43.
        • Other Publications

          • D. Ma, C. Soriente and G.Tsudik,
            Self-Defensive Security in Unattended Wireless Sensor Networks (poster),
            International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS'08),
            November 2008, Detroit, Michigan.

Document Actions