BibTeX records: Alessandro Sorniotti

download as .bib file

@article{DBLP:journals/cacm/FeoPS23,
  author       = {Luca De Feo and
                  Bertram Poettering and
                  Alessandro Sorniotti},
  title        = {On the (In)Security of ElGamal in OpenPGP},
  journal      = {Commun. {ACM}},
  volume       = {66},
  number       = {6},
  pages        = {107--115},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592835},
  doi          = {10.1145/3592835},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/FeoPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BootleLNS23,
  author       = {Jonathan Bootle and
                  Vadim Lyubashevsky and
                  Ngoc Khanh Nguyen and
                  Alessandro Sorniotti},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {A Framework for Practical Anonymous Credentials from Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {384--417},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_13},
  doi          = {10.1007/978-3-031-38545-2\_13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BootleLNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SorniottiWK23,
  author       = {Alessandro Sorniotti and
                  Michael Weissbacher and
                  Anil Kurmus},
  title        = {Go or No Go: Differential Fuzzing of Native and {C} Libraries},
  booktitle    = {2023 {IEEE} Security and Privacy Workshops (SPW), San Francisco, CA,
                  USA, May 25, 2023},
  pages        = {349--363},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SPW59333.2023.00036},
  doi          = {10.1109/SPW59333.2023.00036},
  timestamp    = {Thu, 21 Sep 2023 16:11:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SorniottiWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HesseSS23,
  author       = {Julia Hesse and
                  Nitin Singh and
                  Alessandro Sorniotti},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {How to Bind Anonymous Credentials to Humans},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3047--3064},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/hesse},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HesseSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleLNS23,
  author       = {Jonathan Bootle and
                  Vadim Lyubashevsky and
                  Ngoc Khanh Nguyen and
                  Alessandro Sorniotti},
  title        = {A Framework for Practical Anonymous Credentials from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/560},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleLNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HesseSS23,
  author       = {Julia Hesse and
                  Nitin Singh and
                  Alessandro Sorniotti},
  title        = {How to Bind Anonymous Credentials to Humans},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/853},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HesseSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/KuhringISV21,
  author       = {Lucas Kuhring and
                  Zsolt Istv{\'{a}}n and
                  Alessandro Sorniotti and
                  Marko Vukolic},
  editor       = {Yang Xiang and
                  Ziyuan Wang and
                  Honggang Wang and
                  Valtteri Niemi},
  title        = {StreamChain: Building a Low-Latency Permissioned Blockchain For Enterprise
                  Use-Cases},
  booktitle    = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021,
                  Melbourne, Australia, December 6-8, 2021},
  pages        = {130--139},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/Blockchain53845.2021.00027},
  doi          = {10.1109/BLOCKCHAIN53845.2021.00027},
  timestamp    = {Mon, 31 Jan 2022 14:35:12 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/KuhringISV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeoPS21,
  author       = {Luca De Feo and
                  Bertram Poettering and
                  Alessandro Sorniotti},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {On the (In)Security of ElGamal in OpenPGP},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2066--2080},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485257},
  doi          = {10.1145/3460120.3485257},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FeoPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MambrettiSSRKK21,
  author       = {Andrea Mambretti and
                  Alexandra Sandulescu and
                  Alessandro Sorniotti and
                  William Robertson and
                  Engin Kirda and
                  Anil Kurmus},
  title        = {Bypassing memory safety mechanisms through speculative control flow
                  hijacks},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {633--649},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00048},
  doi          = {10.1109/EUROSP51992.2021.00048},
  timestamp    = {Thu, 11 Nov 2021 09:11:58 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/MambrettiSSRKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/MambrettiCSSKK21,
  author       = {Andrea Mambretti and
                  Pasquale Convertini and
                  Alessandro Sorniotti and
                  Alexandra Sandulescu and
                  Engin Kirda and
                  Anil Kurmus},
  title        = {GhostBuster: understanding and overcoming the pitfalls of transient
                  execution vulnerability checkers},
  booktitle    = {28th {IEEE} International Conference on Software Analysis, Evolution
                  and Reengineering, {SANER} 2021, Honolulu, HI, USA, March 9-12, 2021},
  pages        = {307--317},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SANER50967.2021.00036},
  doi          = {10.1109/SANER50967.2021.00036},
  timestamp    = {Tue, 18 May 2021 12:01:33 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/MambrettiCSSKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndroulakiCVPSS21,
  author       = {Elli Androulaki and
                  Ilie Circiumaru and
                  Jesus Diaz Vico and
                  Miguel Prada and
                  Alessandro Sorniotti and
                  Marc Ph. Stoecklin and
                  Marko Vukolic and
                  Marie Wallace},
  title        = {{IBM} Digital Health Pass Whitepaper: {A} Privacy-Respectful Platform
                  for Proving Health Status},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/704},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndroulakiCVPSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeoPS21,
  author       = {Luca De Feo and
                  Bertram Poettering and
                  Alessandro Sorniotti},
  title        = {On the (in)security of ElGamal in OpenPGP},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {923},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/923},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeoPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-05503,
  author       = {Andrea Mambretti and
                  Alexandra Sandulescu and
                  Alessandro Sorniotti and
                  William K. Robertson and
                  Engin Kirda and
                  Anil Kurmus},
  title        = {Bypassing memory safety mechanisms through speculative control flow
                  hijacks},
  journal      = {CoRR},
  volume       = {abs/2003.05503},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.05503},
  eprinttype    = {arXiv},
  eprint       = {2003.05503},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-05503.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-08274,
  author       = {Elli Androulaki and
                  Angelo De Caro and
                  Kaoutar Elkhiyaoui and
                  Christian Gorenflo and
                  Alessandro Sorniotti and
                  Marko Vukolic},
  title        = {Multi-Shard Private Transactions for Permissioned Blockchains},
  journal      = {CoRR},
  volume       = {abs/2010.08274},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.08274},
  eprinttype    = {arXiv},
  eprint       = {2010.08274},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-08274.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MambrettiNSKRK19,
  author       = {Andrea Mambretti and
                  Matthias Neugschwandtner and
                  Alessandro Sorniotti and
                  Engin Kirda and
                  William K. Robertson and
                  Anil Kurmus},
  editor       = {David Balenson},
  title        = {Speculator: a tool to analyze speculative execution attacks and mitigations},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {747--761},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359837},
  doi          = {10.1145/3359789.3359837},
  timestamp    = {Tue, 26 Nov 2019 09:46:34 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MambrettiNSKRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/AndroulakiCNS19,
  author       = {Elli Androulaki and
                  Angelo De Caro and
                  Matthias Neugschwandtner and
                  Alessandro Sorniotti},
  title        = {Endorsement in Hyperledger Fabric},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {510--519},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00077},
  doi          = {10.1109/BLOCKCHAIN.2019.00077},
  timestamp    = {Wed, 08 Jan 2020 16:20:56 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/AndroulakiCNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhattacharyyaSN19,
  author       = {Atri Bhattacharyya and
                  Alexandra Sandulescu and
                  Matthias Neugschwandtner and
                  Alessandro Sorniotti and
                  Babak Falsafi and
                  Mathias Payer and
                  Anil Kurmus},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {SMoTherSpectre: Exploiting Speculative Execution through Port Contention},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {785--800},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363194},
  doi          = {10.1145/3319535.3363194},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BhattacharyyaSN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Neugschwandtner19,
  author       = {Matthias Neugschwandtner and
                  Alessandro Sorniotti and
                  Anil Kurmus},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {Memory Categorization: Separating Attacker-Controlled Data},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {263--287},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_13},
  doi          = {10.1007/978-3-030-22038-9\_13},
  timestamp    = {Tue, 29 Dec 2020 18:36:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/Neugschwandtner19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CamenischCGS19,
  author       = {Jan Camenisch and
                  Angelo De Caro and
                  Esha Ghosh and
                  Alessandro Sorniotti},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Oblivious {PRF} on Committed Vector Inputs and Application to Deduplication
                  of Encrypted Data},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {337--356},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_21},
  doi          = {10.1007/978-3-030-32101-7\_21},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CamenischCGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/DittmannSV19,
  author       = {Gero Dittmann and
                  Alessandro Sorniotti and
                  Hagen V{\"{o}}lzer},
  editor       = {Sami Yangui and
                  Athman Bouguettaya and
                  Xiao Xue and
                  Noura Faci and
                  Walid Gaaloul and
                  Qi Yu and
                  Zhangbing Zhou and
                  Nathalie Hernandez and
                  Elisa Yumi Nakagawa},
  title        = {Model-Driven Engineering for Multi-party Interactions on a Blockchain
                  - An Example},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2019 Workshops - WESOACS, ASOCA,
                  ISYCC, TBCE, and STRAPS, Toulouse, France, October 28-31, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12019},
  pages        = {181--194},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-45989-5\_15},
  doi          = {10.1007/978-3-030-45989-5\_15},
  timestamp    = {Wed, 20 Dec 2023 15:14:26 +0100},
  biburl       = {https://dblp.org/rec/conf/icsoc/DittmannSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/BrandenburgerCK19,
  author       = {Marcus Brandenburger and
                  Christian Cachin and
                  R{\"{u}}diger Kapitza and
                  Alessandro Sorniotti},
  title        = {Trusted Computing Meets Blockchain: Rollback Attacks and a Solution
                  for Hyperledger Fabric},
  booktitle    = {38th Symposium on Reliable Distributed Systems, {SRDS} 2019, Lyon,
                  France, October 1-4, 2019},
  pages        = {324--333},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SRDS47363.2019.00045},
  doi          = {10.1109/SRDS47363.2019.00045},
  timestamp    = {Wed, 15 Apr 2020 15:03:23 +0200},
  biburl       = {https://dblp.org/rec/conf/srds/BrandenburgerCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/MambrettiSNSK19,
  author       = {Andrea Mambretti and
                  Alexandra Sandulescu and
                  Matthias Neugschwandtner and
                  Alessandro Sorniotti and
                  Anil Kurmus},
  editor       = {Alex Gantman and
                  Cl{\'{e}}mentine Maurice},
  title        = {Two methods for exploiting speculative control flow hijacks},
  booktitle    = {13th {USENIX} Workshop on Offensive Technologies, {WOOT} 2019, Santa
                  Clara, CA, USA, August 12-13, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/woot19/presentation/mambretti},
  timestamp    = {Mon, 01 Feb 2021 08:41:53 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/MambrettiSNSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-01843,
  author       = {Atri Bhattacharyya and
                  Alexandra Sandulescu and
                  Matthias Neugschwandtner and
                  Alessandro Sorniotti and
                  Babak Falsafi and
                  Mathias Payer and
                  Anil Kurmus},
  title        = {SMoTherSpectre: exploiting speculative execution through port contention},
  journal      = {CoRR},
  volume       = {abs/1903.01843},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.01843},
  eprinttype    = {arXiv},
  eprint       = {1903.01843},
  timestamp    = {Sat, 30 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-01843.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCGS19,
  author       = {Jan Camenisch and
                  Angelo De Caro and
                  Esha Ghosh and
                  Alessandro Sorniotti},
  title        = {Oblivious {PRF} on Committed Vector Inputs and Application to Deduplication
                  of Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischCGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/AndroulakiBBCCC18,
  author       = {Elli Androulaki and
                  Artem Barger and
                  Vita Bortnikov and
                  Christian Cachin and
                  Konstantinos Christidis and
                  Angelo De Caro and
                  David Enyeart and
                  Christopher Ferris and
                  Gennady Laventman and
                  Yacov Manevich and
                  Srinivasan Muralidharan and
                  Chet Murthy and
                  Binh Nguyen and
                  Manish Sethi and
                  Gari Singh and
                  Keith Smith and
                  Alessandro Sorniotti and
                  Chrysoula Stathakopoulou and
                  Marko Vukolic and
                  Sharon Weed Cocco and
                  Jason Yellick},
  editor       = {Rui Oliveira and
                  Pascal Felber and
                  Y. Charlie Hu},
  title        = {Hyperledger fabric: a distributed operating system for permissioned
                  blockchains},
  booktitle    = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto,
                  Portugal, April 23-26, 2018},
  pages        = {30:1--30:15},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3190508.3190538},
  doi          = {10.1145/3190508.3190538},
  timestamp    = {Thu, 23 Jun 2022 19:57:07 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/AndroulakiBBCCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/BjorkqvistCES18,
  author       = {Mathias Bj{\"{o}}rkqvist and
                  Christian Cachin and
                  Felix Engelmann and
                  Alessandro Sorniotti},
  editor       = {Abhishek Chandra and
                  Jie Li and
                  Ying Cai and
                  Tian Guo},
  title        = {Scalable Key Management for Distributed Cloud Storage},
  booktitle    = {2018 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2018, Orlando, FL, USA, April 17-20, 2018},
  pages        = {250--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/IC2E.2018.00051},
  doi          = {10.1109/IC2E.2018.00051},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/BjorkqvistCES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/IstvanSV18,
  author       = {Zsolt Istv{\'{a}}n and
                  Alessandro Sorniotti and
                  Marko Vukolic},
  title        = {StreamChain: Do Blockchains Need Blocks?},
  booktitle    = {Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures
                  for Distributed Ledgers, SERIAL@Middleware 2018, Rennes, France, December
                  10, 2018},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3284764.3284765},
  doi          = {10.1145/3284764.3284765},
  timestamp    = {Fri, 21 Dec 2018 14:24:13 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/IstvanSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-10228,
  author       = {Elli Androulaki and
                  Artem Barger and
                  Vita Bortnikov and
                  Christian Cachin and
                  Konstantinos Christidis and
                  Angelo De Caro and
                  David Enyeart and
                  Christopher Ferris and
                  Gennady Laventman and
                  Yacov Manevich and
                  Srinivasan Muralidharan and
                  Chet Murthy and
                  Binh Nguyen and
                  Manish Sethi and
                  Gari Singh and
                  Keith Smith and
                  Alessandro Sorniotti and
                  Chrysoula Stathakopoulou and
                  Marko Vukolic and
                  Sharon Weed Cocco and
                  Jason Yellick},
  title        = {Hyperledger Fabric: {A} Distributed Operating System for Permissioned
                  Blockchains},
  journal      = {CoRR},
  volume       = {abs/1801.10228},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.10228},
  eprinttype    = {arXiv},
  eprint       = {1801.10228},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-10228.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-08541,
  author       = {Marcus Brandenburger and
                  Christian Cachin and
                  R{\"{u}}diger Kapitza and
                  Alessandro Sorniotti},
  title        = {Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution
                  for Hyperledger Fabric},
  journal      = {CoRR},
  volume       = {abs/1805.08541},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.08541},
  eprinttype    = {arXiv},
  eprint       = {1805.08541},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-08541.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-08406,
  author       = {Zsolt Istv{\'{a}}n and
                  Alessandro Sorniotti and
                  Marko Vukolic},
  title        = {StreamChain: Do Blockchains Need Blocks?},
  journal      = {CoRR},
  volume       = {abs/1808.08406},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.08406},
  eprinttype    = {arXiv},
  eprint       = {1808.08406},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-08406.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/AndroulakiCCSV17,
  author       = {Elli Androulaki and
                  Christian Cachin and
                  Angelo De Caro and
                  Alessandro Sorniotti and
                  Marko Vukolic},
  title        = {Permissioned Blockchains and Hyperledger Fabric},
  journal      = {{ERCIM} News},
  volume       = {2017},
  number       = {110},
  year         = {2017},
  url          = {https://ercim-news.ercim.eu/en110/special/permissioned-blockchains-and-hyperledger-fabric},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/AndroulakiCCSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PietroS16,
  author       = {Roberto Di Pietro and
                  Alessandro Sorniotti},
  title        = {Proof of ownership for deduplication systems: {A} secure, scalable,
                  and efficient solution},
  journal      = {Comput. Commun.},
  volume       = {82},
  pages        = {71--82},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comcom.2016.01.011},
  doi          = {10.1016/J.COMCOM.2016.01.011},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/PietroS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/BringerGKKLORSV15,
  author       = {Julien Bringer and
                  Beatriz Gallego{-}Nicasio and
                  Ghassan Karame and
                  Mathias Kohler and
                  Panos Louridas and
                  Melek {\"{O}}nen and
                  Hubert Ritzdorf and
                  Alessandro Sorniotti and
                  David Vallejo},
  editor       = {Sokratis K. Katsikas and
                  Alexander B. Sideridis},
  title        = {{TREDISEC:} Trust-Aware REliable and Distributed Information SEcurity
                  in the Cloud},
  booktitle    = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
                  - 6th International Conference, E-Democracy 2015, Athens, Greece,
                  December 10-11, 2015, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {570},
  pages        = {193--197},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27164-4\_14},
  doi          = {10.1007/978-3-319-27164-4\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edemocracy/BringerGKKLORSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaracaldoAGS14,
  author       = {Nathalie Baracaldo and
                  Elli Androulaki and
                  Joseph S. Glider and
                  Alessandro Sorniotti},
  editor       = {Gail{-}Joon Ahn and
                  Alina Oprea and
                  Reihaneh Safavi{-}Naini},
  title        = {Reconciling End-to-End Confidentiality and Data Reduction In Cloud
                  Storage},
  booktitle    = {Proceedings of the 6th edition of the {ACM} Workshop on Cloud Computing
                  Security, {CCSW} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664168.2664176},
  doi          = {10.1145/2664168.2664176},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BaracaldoAGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlisPOS14,
  author       = {Jorge Blasco Al{\'{\i}}s and
                  Roberto Di Pietro and
                  Agust{\'{\i}}n Orfila and
                  Alessandro Sorniotti},
  title        = {A tunable proof of ownership scheme for deduplication using Bloom
                  filters},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {481--489},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997518},
  doi          = {10.1109/CNS.2014.6997518},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlisPOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/StanekSAK14,
  author       = {Jan Stanek and
                  Alessandro Sorniotti and
                  Elli Androulaki and
                  Lukas Kencl},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {A Secure Data Deduplication Scheme for Cloud Storage},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {99--118},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_8},
  doi          = {10.1007/978-3-662-45472-5\_8},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/StanekSAK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArmandoCCCPS13,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Giancarlo Pellegrino and
                  Alessandro Sorniotti},
  title        = {An authentication flaw in browser-based Single Sign-On protocols:
                  Impact and remediations},
  journal      = {Comput. Secur.},
  volume       = {33},
  pages        = {41--58},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2012.08.007},
  doi          = {10.1016/J.COSE.2012.08.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArmandoCCCPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CachinHHS13,
  author       = {Christian Cachin and
                  Kristiyan Haralambiev and
                  Hsu{-}Chun Hsiao and
                  Alessandro Sorniotti},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Policy-based secure deletion},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {259--270},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516690},
  doi          = {10.1145/2508859.2516690},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CachinHHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mss/FactorHHHKKSS13,
  author       = {Michael Factor and
                  David Hadas and
                  Aner Hamama and
                  Nadav Har'El and
                  Elliot K. Kolodner and
                  Anil Kurmus and
                  Alexandra Shulman{-}Peleg and
                  Alessandro Sorniotti},
  title        = {Secure Logical Isolation for Multi-tenancy in cloud storage},
  booktitle    = {{IEEE} 29th Symposium on Mass Storage Systems and Technologies, {MSST}
                  2013, May 6-10, 2013, Long Beach, CA, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSST.2013.6558424},
  doi          = {10.1109/MSST.2013.6558424},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mss/FactorHHHKKSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinHHS13,
  author       = {Christian Cachin and
                  Kristiyan Haralambiev and
                  Hsu{-}Chun Hsiao and
                  Alessandro Sorniotti},
  title        = {Policy-based Secure Deletion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinHHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PietroS12,
  author       = {Roberto Di Pietro and
                  Alessandro Sorniotti},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Boosting efficiency and security in proof of ownership for deduplication},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {81--82},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414504},
  doi          = {10.1145/2414456.2414504},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PietroS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BasescuCEHSVZ12,
  author       = {Cristina Basescu and
                  Christian Cachin and
                  Ittay Eyal and
                  Robert Haas and
                  Alessandro Sorniotti and
                  Marko Vukolic and
                  Ido Zachevsky},
  editor       = {Robert S. Swarz and
                  Philip Koopman and
                  Michel Cukier},
  title        = {Robust data sharing with key-value stores},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks,
                  {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSN.2012.6263920},
  doi          = {10.1109/DSN.2012.6263920},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/BasescuCEHSVZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/CachinJS12,
  author       = {Christian Cachin and
                  Birgit Junker and
                  Alessandro Sorniotti},
  title        = {On limitations of using cloud storage for data replication},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks
                  Workshops, {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSNW.2012.6264683},
  doi          = {10.1109/DSNW.2012.6264683},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/CachinJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/KurmusSK11,
  author       = {Anil Kurmus and
                  Alessandro Sorniotti and
                  R{\"{u}}diger Kapitza},
  editor       = {Engin Kirda and
                  Steven Hand},
  title        = {Attack surface reduction for commodity {OS} kernels: trimmed garden
                  plants may attract less bugs},
  booktitle    = {Proceedings of the Fourth European Workshop on System Security, EUROSEC'11,
                  April 10, 2011, Salzburg, Austria},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1972551.1972557},
  doi          = {10.1145/1972551.1972557},
  timestamp    = {Tue, 20 Dec 2022 17:33:10 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/KurmusSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ArmandoCCCPS11,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Giancarlo Pellegrino and
                  Alessandro Sorniotti},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {From Multiple Credentials to Browser-Based Single Sign-On: Are We
                  More Secure?},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_6},
  doi          = {10.1007/978-3-642-21424-0\_6},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/ArmandoCCCPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Sorniotti10,
  author       = {Alessandro Sorniotti},
  title        = {Protocoles pour Poign{\'{e}}es de Main Secr{\`{e}}tes. (Secret
                  Handshake Protocols)},
  school       = {T{\'{e}}l{\'{e}}com ParisTech, France},
  year         = {2010},
  url          = {https://tel.archives-ouvertes.fr/pastel-00006276},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Sorniotti10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SorniottiM10,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  title        = {A provably secure secret handshake with dynamic controlled matching},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {619--627},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.11.004},
  doi          = {10.1016/J.COSE.2009.11.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SorniottiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KerschbaumS10,
  author       = {Florian Kerschbaum and
                  Alessandro Sorniotti},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {Searchable Encryption for Outsourced Data Analytics},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_5},
  doi          = {10.1007/978-3-642-22633-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/KerschbaumS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SorniottiM10,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Federated Secret Handshakes with Support for Revocation},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {218--234},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_16},
  doi          = {10.1007/978-3-642-17650-0\_16},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SorniottiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/TrabelsiWSSB10,
  author       = {Slim Trabelsi and
                  Eric Weil and
                  Alessandro Sorniotti and
                  Stuart Short and
                  Michele Bezzi},
  title        = {Privacy-aware policy matching},
  booktitle    = {Proceedings of the 15th {IEEE} Symposium on Computers and Communications,
                  {ISCC} 2010, Riccione, Italy, June 22-25, 2010},
  pages        = {302--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISCC.2010.5546733},
  doi          = {10.1109/ISCC.2010.5546733},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/TrabelsiWSSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SorniottiM10,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Secret interest groups (SIGs) in social networks with an implementation
                  on Facebook},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {621--628},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774219},
  doi          = {10.1145/1774088.1774219},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SorniottiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/SorniottiMG09,
  author       = {Alessandro Sorniotti and
                  Refik Molva and
                  Laurent Gomez},
  title        = {Efficient Access Control forWireless Sensor Data},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {7},
  number       = {3-4},
  pages        = {325--336},
  year         = {2009},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-7-number-3-4-2009/ahswn-7-3-4-p-325-336/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/SorniottiMG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwin/SorniottiMGTLS09,
  author       = {Alessandro Sorniotti and
                  Refik Molva and
                  Laurent Gomez and
                  Christophe Trefois and
                  Annett Laube and
                  Piervito Scaglioso},
  title        = {Efficient Access Control for Wireless Sensor Data},
  journal      = {Int. J. Wirel. Inf. Networks},
  volume       = {16},
  number       = {3},
  pages        = {165--174},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10776-009-0102-4},
  doi          = {10.1007/S10776-009-0102-4},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwin/SorniottiMGTLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/GomezLS09,
  author       = {Laurent Gomez and
                  Annett Laube and
                  Alessandro Sorniotti},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Takahiro Hara and
                  Arjan Durresi},
  title        = {Trustworthiness Assessment of Wireless Sensor Data for Business Applications},
  booktitle    = {The {IEEE} 23rd International Conference on Advanced Information Networking
                  and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29,
                  2009},
  pages        = {355--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/AINA.2009.92},
  doi          = {10.1109/AINA.2009.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/GomezLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SorniottiM09,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Secret Handshakes with Revocation Support},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {274--299},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_19},
  doi          = {10.1007/978-3-642-14423-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SorniottiM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SorniottiM09,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {A Provably Secure Secret Handshake with Dynamic Controlled Matching},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {330--341},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_29},
  doi          = {10.1007/978-3-642-01244-0\_29},
  timestamp    = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SorniottiM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/CuevasKGLS09,
  author       = {{\'{A}}ngel Cuevas and
                  Paul El Khoury and
                  Laurent Gomez and
                  Annett Laube and
                  Alessandro Sorniotti},
  editor       = {Rainer Falk and
                  Wilson Goudalo and
                  Eric Y. Chen and
                  Reijo Savola and
                  Manuela Popescu},
  title        = {A Security Pattern for Untraceable Secret Handshakes},
  booktitle    = {The Third International Conference on Emerging Security Information,
                  Systems and Technologies, {SECURWARE} 2009, 18-23 June 2009, Athens/Glyfada,
                  Greece},
  pages        = {8--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SECURWARE.2009.9},
  doi          = {10.1109/SECURWARE.2009.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/CuevasKGLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KerschbaumS09,
  author       = {Florian Kerschbaum and
                  Alessandro Sorniotti},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {RFID-based supply chain partner authentication and key agreement},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514281},
  doi          = {10.1145/1514274.1514281},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KerschbaumS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/igi/09/GomezLS09,
  author       = {Laurent Gomez and
                  Annett Laube and
                  Alessandro Sorniotti},
  editor       = {Dragan Stojanovic},
  title        = {Access Control in Mobile and Ubiquitous Environments},
  booktitle    = {Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability
                  - Adaptive Technologies and Applications},
  pages        = {278--294},
  publisher    = {{IGI} Global},
  year         = {2009},
  url          = {https://doi.org/10.4018/978-1-60566-290-9.ch012},
  doi          = {10.4018/978-1-60566-290-9.CH012},
  timestamp    = {Mon, 16 Sep 2019 14:43:09 +0200},
  biburl       = {https://dblp.org/rec/books/igi/09/GomezLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Urvoy-KellerES08,
  author       = {Guillaume Urvoy{-}Keller and
                  Taoufik En{-}Najjary and
                  Alessandro Sorniotti},
  title        = {Operational comparison of available bandwidth estimation tools},
  journal      = {Comput. Commun. Rev.},
  volume       = {38},
  number       = {1},
  pages        = {39--42},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341431.1341438},
  doi          = {10.1145/1341431.1341438},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/Urvoy-KellerES08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobilware/GomezLS08,
  author       = {Laurent Gomez and
                  Annett Laube and
                  Alessandro Sorniotti},
  editor       = {Jiang (Linda) Xie and
                  Tuna Tugcu},
  title        = {Design guidelines for integration of wireless sensor networks with
                  enterprise systems},
  booktitle    = {Proceedings of the 1st International Conference on MOBILe Wireless
                  MiddleWARE, Operating Systems, and Applications, {MOBILWARE} 2008,
                  Innsbruck, Austria, February 13 - 15, 2008},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {278},
  pages        = {12},
  year         = {2008},
  url          = {https://doi.org/10.4108/ICST.MOBILWARE2008.2890},
  doi          = {10.4108/ICST.MOBILWARE2008.2890},
  timestamp    = {Wed, 28 Nov 2018 12:57:16 +0100},
  biburl       = {https://dblp.org/rec/conf/mobilware/GomezLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/GomezLRSTVW08,
  author       = {Laurent Gomez and
                  Annett Laube and
                  Vincent Ribi{\`{e}}re and
                  Alessandro Sorniotti and
                  Christophe Trefois and
                  Marco Valente and
                  Patrick Wetterwald},
  editor       = {Vinny Cahill},
  title        = {Encryption-based access control for building management},
  booktitle    = {5th Annual International Conference on Mobile and Ubiquitous Systems:
                  Computing, Networking, and Services, MobiQuitous 2008, July 21-25,
                  2008, Dublin, Ireland},
  publisher    = {{ICST} / {ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4019},
  doi          = {10.4108/ICST.MOBIQUITOUS2008.4019},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/GomezLRSTVW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/SorniottiMG08,
  author       = {Alessandro Sorniotti and
                  Refik Molva and
                  Laurent Gomez},
  title        = {Efficient access control for wireless sensor data},
  booktitle    = {Proceedings of the {IEEE} 19th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2008, 15-18 September
                  2008, Cannes, French Riviera, France},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/PIMRC.2008.4699487},
  doi          = {10.1109/PIMRC.2008.4699487},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pimrc/SorniottiMG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecumn/SorniottiCS07,
  author       = {Alessandro Sorniotti and
                  Gabriele Corliano and
                  Alan P. Smith},
  title        = {Design Guidelines for an Internet-Scaled QoS Framework},
  booktitle    = {Fourth European Conference on Universal Multiservice Networks {(ECUMN}
                  2007), 14-16 February 2007, Toulouse, France},
  pages        = {109--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ECUMN.2007.16},
  doi          = {10.1109/ECUMN.2007.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecumn/SorniottiCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics