cached image

Luigi Vincenzo Mancini

Affiliations: 
1996- Dipartimento di Informatica University of Rome La Sapienza, Roma, Lazio, Italy 
Area:
cybersecurity, data privacy, network and information security
Website:
http://www.uniroma1.it/mancini
Google:
"Luigi Vincenzo Mancini"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Dushku E, Rabbani M, Conti M, et al. (2020) SARA: Secure Asynchronous Remote Attestation for IoT Systems Ieee Transactions On Information Forensics and Security. 15: 3123-3136
Conti M, Gaspari FD, Mancini LV. (2020) A Novel Stealthy Attack to Gather SDN Configuration-Information Ieee Transactions On Emerging Topics in Computing. 8: 328-340
Conti M, Dushku E, Mancini LV. (2019) RADIS: Remote Attestation of Distributed IoT Services Arxiv: Cryptography and Security. 25-32
Conti M, Mancini LV, Spolaor R, et al. (2016) Analyzing Android Encrypted Network Traffic to Identify User Actions Ieee Transactions On Information Forensics and Security. 11: 114-125
Riboni D, Villani A, Vitali D, et al. (2015) Obfuscation of sensitive data for incremental release of network flows Ieee Acm Transactions On Networking. 23: 672-686
Zhang L, Zhang H, Conti M, et al. (2013) Preserving privacy against external and internal threats in WSN data aggregation Telecommunication Systems. 52: 2163-2176
Conti M, Pietro RD, Mancini LV, et al. (2011) Distributed Detection of Clone Attacks in Wireless Sensor Networks Ieee Transactions On Dependable and Secure Computing. 8: 685-698
Pietro RD, Mancini LV, Mei A. (2010) Hierarchies of keys in secure multicast communications Journal of Computer Security. 18: 839-860
Conti M, Pietro RD, Mancini LV, et al. (2010) eRIPP-FS: Enforcing privacy and security in RFID Security and Communication Networks. 3: 58-70
Di Pietro R, Mancini LV, Soriente C, et al. (2009) Data security in unattended wireless sensor networks Ieee Transactions On Computers. 58: 1500-1511
See more...