Home
Objectives
Partners
Use Cases
Resources
Publications
Public Deliverables
Events and Presentations
1
st
Open Call Results
Newsletters
2
nd
Newsletter
1
st
Newsletter
Work Packages
Open Call
Contact Us         
                                                 
► Watch The Overview
Publications
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
.
Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti. In (ACM) Computing Surveys, in press, 2018.
Emergency Access Control Management Via Attribute Based Encrypted QR Codes
.
Sana Belguith, Sarada Prasad Gochhayat, Mauro Conti, Giovanni Russello. In Proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud (IEEE CNS 2018 workshop: SPC 2018), in press, Beijing, China, June 1, 2018.
RARE: Defeating Side Channels based on Data-Deduplication in Cloud Storage
.
Zahra Pooranian, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti. In Proceedings of the 7th International workshop on Cloud Computing Systems, Networks, and Applications (IEEE INFOCOM 2018 workshop: CCSNA 2018), in press, Honolulu, USA, April 16, 2018.
Privacy Aware Data Deduplication for Side Channel in Cloud Storage
.
Chia-Mu Yu, Sarada Prasad Gochhayat, Mauro Conti, Chun-Shien Lu. In (IEEE) Transactions on Cloud Computing, in press, 2018
TagItSmart - SmartTags for Unlocking Business Potential
.
Stylianos Georgoulas, Srdjan Krco and Rob van Kranenburg. In IEEE Internet of Things Newsletter - November 2017.
Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics
.
Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti, Luciano Gamberini, and Giuseppe Sartori. In Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, New York, NY, USA, Article 60, 6 pages.
EnergIoT: A Solution to Improve Network Lifetime of IoT Devices
.
QianQian Li, Sarada Prasad Gochhayat; MAuro Conti, FangAi Liu. In (Elsevier) Pervasive and Mobile Computing, 42: 124-133, 2017.
DELTA: Data Extraction and Logging Tool for Android
.
Riccardo Spolaor, Elia Dal Santo; MAuro Conti. In (IEEE) Transactions on Mobile Computing, 2017.
A Smart Tags Driven Service Platform for Enabling Ecosystems of Connected Objects
.
Vehmas, K. Georgoulas, S., Krco, S., Hakola, L., Larizgoitia Abad, I., Gligoric, N. & Polenz, I. In Vermesan, O. & Bacquet, J. (Ed.), Cognitive Hyperconnected Digital Transformation - Internet of Things Intelligence Evolution, River Publishers Series in Communication, pp. 283-308. Available at: http://www.riverpublishers.com/book_details.php?book_id=456. Doi: 10.13052/rp-9788793609105..
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis
.
Vincent F. Taylor, Riccardo Spolaor, Mauro Conti and Ivan Martinovic. In IEEE Transactions on Information Forensics & Security, 2017.
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android
.
Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor. In Proceedings of the European Symposium on Research in Computer Security (ESORICS 2017), in press, Oslo, Norway. September 11-13, 2017. (In press)
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices
.
Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran. In Proceedings of the 15th International Conference on Applied Cryptography and Network Security (ACNS 2017), Kanazawa, Japan, June 10-12, 2017. (In press)
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
.
Gaurav Somani and Manoj Singh Gaur and Dheeraj Sanghi and Mauro Conti and Rajkumar Buyya. In Computer Communications, vol. 107, pp. 30 - 38, 2017.
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices
.
M. Ambrosin and A. Anzanpour and M. Conti and T. Dargahi and S. R. Moosavi and A. M. Rahmani and P. Liljeberg. in IEEE Micro, vol. 36, no. 6, pp. 25-35, Nov.-Dec. 2016.
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices
.
Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran. In Proceedings of the 15th International Conference on Applied Cryptography and Network Security (ACNS 2017), in press, Kanazawa, Japan, June 10-12, 2017.
SANA: Secure and Scalable Aggregate Network Attestation
.
Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter. In Proceedings of the 23nd ACM Conference on Computer and Communications Security (ACM CCS 2016), pages 731-742, Vienna, Austria, October 24 - 28, 2016
ANASTASIA: ANdroid mAlware detection using STAtic analySIs of Applications
.
Hossein Fereidooni, Mauro Conti, Danfeng Yao, Alessandro Sperduti. In Proceedings of the 8th Annual IEEE/IFIP International Conference on New Technologies, Mobility and Security (IEEE/IFIP NTMS 2016), Larnaca, Cyprus, November 21 - 23, 2016. .
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
.
Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 2016), pages 531-548, Austin, TX, USA, August 10-12, 2016.
Ontologies and context modeling for the Web of Things
.
De, S, Zhou, Y and Moessner, K. In: Managing the Web of Things: Linking the Real World to the Web. Morgan Kaufmann, Burlington, Massachusetts, pp. 3-36.
Functional inks bring additional information and entertainment to products
.
Liisa Hakola and VTT Team. Press release (in Finnish), VTT, 2016.
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks
.
Valeriu-Daniel Stanciu, Riccardo Spolaor; Mauro Conti, Cristiano Giuffrida. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (ACM SIGSAC CODASPY 2016), pages 105-112, New Orleans, LA, USA; March 9-11, 2016.