Personal tools
You are here: Home / Member Web Pages / Claudio Soriente / Claudio Soriente

Claudio Soriente

 

Information

        • E-mail: csoriente(at) fi.upm.es

Education

Research Experience

Publications

        • Journals and Magazines

          • D. Ma, C. Soriente and G.Tsudik,
            New Adversary and New Threats: Security in Unattended Sensor Networks,
            IEEE Network,
            Volume 23, Issue 2, 2009, pages 43-48.

          • R. Di Pietro, L.V. Mancinim, A. Spognardi, C. Soriente and G. Tsudik,
            Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks,
            Ad Hoc Networks,
            Volume 7, Issue 8, 2009, pages 1463-1475.
          • R. Di Pietro, L.V. Mancini, A. Spognardi, C. Soriente and G. Tsudik,
            Data Security in Unattended Wireless Sensor Networks,
            IEEE Transactions on Computers,
            Volume 58, Issue 11, 2009, pages 1500-1511.
          • C. Soriente, G. Tsudik and E. Uzun,
            Secure Pairing of Interface Constrained Devices,
            International Journal of Security and Networks
            Volume 4, Issue 1/2, 2009, pages 17-26.
          • M.T. Goodrich, M. Sirivianos, J. Solis, C. Soriente, G. Tsudik and E. Uzun,
            Using Audio in Secure Device Pairing,
            International Journal of Security and Networks
            Volume 4, Issue 1/2, 2009, pages 57-68.
          • A. Castiglione, A. De Santis and C. Soriente,
            Taking advantages of a disadvantage: digital forensics and steganography using document metadata,
            Journal of Systems and Software, Volume 80, Issue 5, 2007, pages 750-764.
          • A. De Santis and C. Soriente,
            A blocker-proof Conditional Access System,
            IEEE Transactions on Consumer Electronics,
            Volume 50, Issue 2, 2004, pages 591-596.
        • Conferences and Workshops

          • C. Castelluccia, A. Francillon, D. Perito, C. Soriente,
            On the difficulty of software-based attestation of embedded devices,
            ACM Conference on Computer and Communications Security (CCS'09),
            November 2009, Chicago, IL, USA, pages 400-409.
          • J. Camenisch, M. Kohlweiss, C. Soriente,
            An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials,
            IACR International Workshop on Practice and Theory in Public Key Cryptography (PKC'09),
            March 2009, Irvine, CA, USA, pages 481-500.
          • R. Di Pietro, A. Spognardi, C. Soriente and G. Tsudik,
            Collaborative Authentication In Unattended WSNs,
            ACM Conference on Wireless Network Security (WiSec'09),
            March 2009, Zürich, Switzerland, pages 237-244.
          • R. Di Pietro, D. Ma, C. Soriente and G. Tsudik,
            POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks,
            IEEE International Symposium on Reliable Distributed Systems (SRDS'08),
            October 2008, Naples, Italy, pages 185-194.
          • C. Soriente, G. Tsudik and E. Uzun,
            HAPADEP: Human-Assisted Pure Audio Device Pairing,
            International Information Security Conference (ISC'08),
            September 2008, Taipei, Taiwan, pages 385-400.
          • C. Castelluccia and C. Soriente,
            ABBA: A Balls and Bins Approach to Secure Aggregation in WSNs,
            International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'08),
            March 2008, Berlin, Germany, pages 185-191.
          • R. Di Pietro, L.V. Mancini, A. Spognardi, C. Soriente and G. Tsudik,
            Catch Me (If You Can): Data Survival in Unattended Sensor Networks,
            IEEE International Conference on Pervasive Computing and Communications (PerCom'08),
            March 2008, Hong Kong, China, pages 185-194.
          • A De Santis and C. Soriente,
            Modified Original Smart Cards and Smart Card Clone Countermeasures,
            International Conference on Computational Intelligence and Security (CIS'07),
            December 2007, Harbin, China, pages 878-882.
          • C. Soriente, G. Tsudik, and E. Uzun,
            BEDA: Button-Enabled Device Pairing,
            International Workshop on Security for Spontaneous Interaction (IWSSI'07), affiliated with UbiComp'07,
            September 2007, Innsbruck, Austria, pages 443-449.
          • K. El Defrawy and C. Soriente,
            PEUC-WiN: Privacy Enhancement by User Cooperation in Wireless Networks,
            IEEE Workshop on Secure Network Protocols (NPSEC'06), affiliated with ICNP'06,
            November 2006, Santa Barbara, California, USA, pages 38-43.
        • Other Publications

          • D. Ma, C. Soriente and G.Tsudik,
            Self-Defensive Security in Unattended Wireless Sensor Networks (poster),
            International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS'08),
            November 2008, Detroit, Michigan.

Document Actions