Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Alessandro Sorniotti
@article{DBLP:journals/cacm/FeoPS23, author = {Luca De Feo and Bertram Poettering and Alessandro Sorniotti}, title = {On the (In)Security of ElGamal in OpenPGP}, journal = {Commun. {ACM}}, volume = {66}, number = {6}, pages = {107--115}, year = {2023}, url = {https://doi.org/10.1145/3592835}, doi = {10.1145/3592835}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/FeoPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BootleLNS23, author = {Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Alessandro Sorniotti}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {A Framework for Practical Anonymous Credentials from Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {384--417}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_13}, doi = {10.1007/978-3-031-38545-2\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BootleLNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SorniottiWK23, author = {Alessandro Sorniotti and Michael Weissbacher and Anil Kurmus}, title = {Go or No Go: Differential Fuzzing of Native and {C} Libraries}, booktitle = {2023 {IEEE} Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023}, pages = {349--363}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SPW59333.2023.00036}, doi = {10.1109/SPW59333.2023.00036}, timestamp = {Thu, 21 Sep 2023 16:11:09 +0200}, biburl = {https://dblp.org/rec/conf/sp/SorniottiWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HesseSS23, author = {Julia Hesse and Nitin Singh and Alessandro Sorniotti}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {How to Bind Anonymous Credentials to Humans}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3047--3064}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/hesse}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HesseSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleLNS23, author = {Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Alessandro Sorniotti}, title = {A Framework for Practical Anonymous Credentials from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2023}, url = {https://eprint.iacr.org/2023/560}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootleLNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HesseSS23, author = {Julia Hesse and Nitin Singh and Alessandro Sorniotti}, title = {How to Bind Anonymous Credentials to Humans}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2023}, url = {https://eprint.iacr.org/2023/853}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HesseSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/KuhringISV21, author = {Lucas Kuhring and Zsolt Istv{\'{a}}n and Alessandro Sorniotti and Marko Vukolic}, editor = {Yang Xiang and Ziyuan Wang and Honggang Wang and Valtteri Niemi}, title = {StreamChain: Building a Low-Latency Permissioned Blockchain For Enterprise Use-Cases}, booktitle = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, December 6-8, 2021}, pages = {130--139}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/Blockchain53845.2021.00027}, doi = {10.1109/BLOCKCHAIN53845.2021.00027}, timestamp = {Mon, 31 Jan 2022 14:35:12 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/KuhringISV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeoPS21, author = {Luca De Feo and Bertram Poettering and Alessandro Sorniotti}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {On the (In)Security of ElGamal in OpenPGP}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2066--2080}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485257}, doi = {10.1145/3460120.3485257}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FeoPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MambrettiSSRKK21, author = {Andrea Mambretti and Alexandra Sandulescu and Alessandro Sorniotti and William Robertson and Engin Kirda and Anil Kurmus}, title = {Bypassing memory safety mechanisms through speculative control flow hijacks}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {633--649}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00048}, doi = {10.1109/EUROSP51992.2021.00048}, timestamp = {Thu, 11 Nov 2021 09:11:58 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/MambrettiSSRKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/MambrettiCSSKK21, author = {Andrea Mambretti and Pasquale Convertini and Alessandro Sorniotti and Alexandra Sandulescu and Engin Kirda and Anil Kurmus}, title = {GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers}, booktitle = {28th {IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2021, Honolulu, HI, USA, March 9-12, 2021}, pages = {307--317}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SANER50967.2021.00036}, doi = {10.1109/SANER50967.2021.00036}, timestamp = {Tue, 18 May 2021 12:01:33 +0200}, biburl = {https://dblp.org/rec/conf/wcre/MambrettiCSSKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndroulakiCVPSS21, author = {Elli Androulaki and Ilie Circiumaru and Jesus Diaz Vico and Miguel Prada and Alessandro Sorniotti and Marc Ph. Stoecklin and Marko Vukolic and Marie Wallace}, title = {{IBM} Digital Health Pass Whitepaper: {A} Privacy-Respectful Platform for Proving Health Status}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2021}, url = {https://eprint.iacr.org/2021/704}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndroulakiCVPSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeoPS21, author = {Luca De Feo and Bertram Poettering and Alessandro Sorniotti}, title = {On the (in)security of ElGamal in OpenPGP}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {923}, year = {2021}, url = {https://eprint.iacr.org/2021/923}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeoPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-05503, author = {Andrea Mambretti and Alexandra Sandulescu and Alessandro Sorniotti and William K. Robertson and Engin Kirda and Anil Kurmus}, title = {Bypassing memory safety mechanisms through speculative control flow hijacks}, journal = {CoRR}, volume = {abs/2003.05503}, year = {2020}, url = {https://arxiv.org/abs/2003.05503}, eprinttype = {arXiv}, eprint = {2003.05503}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-05503.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-08274, author = {Elli Androulaki and Angelo De Caro and Kaoutar Elkhiyaoui and Christian Gorenflo and Alessandro Sorniotti and Marko Vukolic}, title = {Multi-Shard Private Transactions for Permissioned Blockchains}, journal = {CoRR}, volume = {abs/2010.08274}, year = {2020}, url = {https://arxiv.org/abs/2010.08274}, eprinttype = {arXiv}, eprint = {2010.08274}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-08274.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MambrettiNSKRK19, author = {Andrea Mambretti and Matthias Neugschwandtner and Alessandro Sorniotti and Engin Kirda and William K. Robertson and Anil Kurmus}, editor = {David Balenson}, title = {Speculator: a tool to analyze speculative execution attacks and mitigations}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {747--761}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359837}, doi = {10.1145/3359789.3359837}, timestamp = {Tue, 26 Nov 2019 09:46:34 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MambrettiNSKRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/AndroulakiCNS19, author = {Elli Androulaki and Angelo De Caro and Matthias Neugschwandtner and Alessandro Sorniotti}, title = {Endorsement in Hyperledger Fabric}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {510--519}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00077}, doi = {10.1109/BLOCKCHAIN.2019.00077}, timestamp = {Wed, 08 Jan 2020 16:20:56 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/AndroulakiCNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhattacharyyaSN19, author = {Atri Bhattacharyya and Alexandra Sandulescu and Matthias Neugschwandtner and Alessandro Sorniotti and Babak Falsafi and Mathias Payer and Anil Kurmus}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {SMoTherSpectre: Exploiting Speculative Execution through Port Contention}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {785--800}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363194}, doi = {10.1145/3319535.3363194}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhattacharyyaSN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Neugschwandtner19, author = {Matthias Neugschwandtner and Alessandro Sorniotti and Anil Kurmus}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {Memory Categorization: Separating Attacker-Controlled Data}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {263--287}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_13}, doi = {10.1007/978-3-030-22038-9\_13}, timestamp = {Tue, 29 Dec 2020 18:36:17 +0100}, biburl = {https://dblp.org/rec/conf/dimva/Neugschwandtner19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CamenischCGS19, author = {Jan Camenisch and Angelo De Caro and Esha Ghosh and Alessandro Sorniotti}, editor = {Ian Goldberg and Tyler Moore}, title = {Oblivious {PRF} on Committed Vector Inputs and Application to Deduplication of Encrypted Data}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {337--356}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_21}, doi = {10.1007/978-3-030-32101-7\_21}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/CamenischCGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/DittmannSV19, author = {Gero Dittmann and Alessandro Sorniotti and Hagen V{\"{o}}lzer}, editor = {Sami Yangui and Athman Bouguettaya and Xiao Xue and Noura Faci and Walid Gaaloul and Qi Yu and Zhangbing Zhou and Nathalie Hernandez and Elisa Yumi Nakagawa}, title = {Model-Driven Engineering for Multi-party Interactions on a Blockchain - An Example}, booktitle = {Service-Oriented Computing - {ICSOC} 2019 Workshops - WESOACS, ASOCA, ISYCC, TBCE, and STRAPS, Toulouse, France, October 28-31, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12019}, pages = {181--194}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-45989-5\_15}, doi = {10.1007/978-3-030-45989-5\_15}, timestamp = {Wed, 20 Dec 2023 15:14:26 +0100}, biburl = {https://dblp.org/rec/conf/icsoc/DittmannSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/BrandenburgerCK19, author = {Marcus Brandenburger and Christian Cachin and R{\"{u}}diger Kapitza and Alessandro Sorniotti}, title = {Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric}, booktitle = {38th Symposium on Reliable Distributed Systems, {SRDS} 2019, Lyon, France, October 1-4, 2019}, pages = {324--333}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SRDS47363.2019.00045}, doi = {10.1109/SRDS47363.2019.00045}, timestamp = {Wed, 15 Apr 2020 15:03:23 +0200}, biburl = {https://dblp.org/rec/conf/srds/BrandenburgerCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/MambrettiSNSK19, author = {Andrea Mambretti and Alexandra Sandulescu and Matthias Neugschwandtner and Alessandro Sorniotti and Anil Kurmus}, editor = {Alex Gantman and Cl{\'{e}}mentine Maurice}, title = {Two methods for exploiting speculative control flow hijacks}, booktitle = {13th {USENIX} Workshop on Offensive Technologies, {WOOT} 2019, Santa Clara, CA, USA, August 12-13, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/woot19/presentation/mambretti}, timestamp = {Mon, 01 Feb 2021 08:41:53 +0100}, biburl = {https://dblp.org/rec/conf/woot/MambrettiSNSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-01843, author = {Atri Bhattacharyya and Alexandra Sandulescu and Matthias Neugschwandtner and Alessandro Sorniotti and Babak Falsafi and Mathias Payer and Anil Kurmus}, title = {SMoTherSpectre: exploiting speculative execution through port contention}, journal = {CoRR}, volume = {abs/1903.01843}, year = {2019}, url = {http://arxiv.org/abs/1903.01843}, eprinttype = {arXiv}, eprint = {1903.01843}, timestamp = {Sat, 30 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-01843.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischCGS19, author = {Jan Camenisch and Angelo De Caro and Esha Ghosh and Alessandro Sorniotti}, title = {Oblivious {PRF} on Committed Vector Inputs and Application to Deduplication of Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2019}, url = {https://eprint.iacr.org/2019/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischCGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/AndroulakiBBCCC18, author = {Elli Androulaki and Artem Barger and Vita Bortnikov and Christian Cachin and Konstantinos Christidis and Angelo De Caro and David Enyeart and Christopher Ferris and Gennady Laventman and Yacov Manevich and Srinivasan Muralidharan and Chet Murthy and Binh Nguyen and Manish Sethi and Gari Singh and Keith Smith and Alessandro Sorniotti and Chrysoula Stathakopoulou and Marko Vukolic and Sharon Weed Cocco and Jason Yellick}, editor = {Rui Oliveira and Pascal Felber and Y. Charlie Hu}, title = {Hyperledger fabric: a distributed operating system for permissioned blockchains}, booktitle = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018}, pages = {30:1--30:15}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3190508.3190538}, doi = {10.1145/3190508.3190538}, timestamp = {Thu, 23 Jun 2022 19:57:07 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/AndroulakiBBCCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/BjorkqvistCES18, author = {Mathias Bj{\"{o}}rkqvist and Christian Cachin and Felix Engelmann and Alessandro Sorniotti}, editor = {Abhishek Chandra and Jie Li and Ying Cai and Tian Guo}, title = {Scalable Key Management for Distributed Cloud Storage}, booktitle = {2018 {IEEE} International Conference on Cloud Engineering, {IC2E} 2018, Orlando, FL, USA, April 17-20, 2018}, pages = {250--256}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/IC2E.2018.00051}, doi = {10.1109/IC2E.2018.00051}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/BjorkqvistCES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/IstvanSV18, author = {Zsolt Istv{\'{a}}n and Alessandro Sorniotti and Marko Vukolic}, title = {StreamChain: Do Blockchains Need Blocks?}, booktitle = {Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, SERIAL@Middleware 2018, Rennes, France, December 10, 2018}, pages = {1--6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3284764.3284765}, doi = {10.1145/3284764.3284765}, timestamp = {Fri, 21 Dec 2018 14:24:13 +0100}, biburl = {https://dblp.org/rec/conf/middleware/IstvanSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-10228, author = {Elli Androulaki and Artem Barger and Vita Bortnikov and Christian Cachin and Konstantinos Christidis and Angelo De Caro and David Enyeart and Christopher Ferris and Gennady Laventman and Yacov Manevich and Srinivasan Muralidharan and Chet Murthy and Binh Nguyen and Manish Sethi and Gari Singh and Keith Smith and Alessandro Sorniotti and Chrysoula Stathakopoulou and Marko Vukolic and Sharon Weed Cocco and Jason Yellick}, title = {Hyperledger Fabric: {A} Distributed Operating System for Permissioned Blockchains}, journal = {CoRR}, volume = {abs/1801.10228}, year = {2018}, url = {http://arxiv.org/abs/1801.10228}, eprinttype = {arXiv}, eprint = {1801.10228}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-10228.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-08541, author = {Marcus Brandenburger and Christian Cachin and R{\"{u}}diger Kapitza and Alessandro Sorniotti}, title = {Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric}, journal = {CoRR}, volume = {abs/1805.08541}, year = {2018}, url = {http://arxiv.org/abs/1805.08541}, eprinttype = {arXiv}, eprint = {1805.08541}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-08541.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-08406, author = {Zsolt Istv{\'{a}}n and Alessandro Sorniotti and Marko Vukolic}, title = {StreamChain: Do Blockchains Need Blocks?}, journal = {CoRR}, volume = {abs/1808.08406}, year = {2018}, url = {http://arxiv.org/abs/1808.08406}, eprinttype = {arXiv}, eprint = {1808.08406}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-08406.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/AndroulakiCCSV17, author = {Elli Androulaki and Christian Cachin and Angelo De Caro and Alessandro Sorniotti and Marko Vukolic}, title = {Permissioned Blockchains and Hyperledger Fabric}, journal = {{ERCIM} News}, volume = {2017}, number = {110}, year = {2017}, url = {https://ercim-news.ercim.eu/en110/special/permissioned-blockchains-and-hyperledger-fabric}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/AndroulakiCCSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PietroS16, author = {Roberto Di Pietro and Alessandro Sorniotti}, title = {Proof of ownership for deduplication systems: {A} secure, scalable, and efficient solution}, journal = {Comput. Commun.}, volume = {82}, pages = {71--82}, year = {2016}, url = {https://doi.org/10.1016/j.comcom.2016.01.011}, doi = {10.1016/J.COMCOM.2016.01.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/PietroS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/BringerGKKLORSV15, author = {Julien Bringer and Beatriz Gallego{-}Nicasio and Ghassan Karame and Mathias Kohler and Panos Louridas and Melek {\"{O}}nen and Hubert Ritzdorf and Alessandro Sorniotti and David Vallejo}, editor = {Sokratis K. Katsikas and Alexander B. Sideridis}, title = {{TREDISEC:} Trust-Aware REliable and Distributed Information SEcurity in the Cloud}, booktitle = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms - 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings}, series = {Communications in Computer and Information Science}, volume = {570}, pages = {193--197}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27164-4\_14}, doi = {10.1007/978-3-319-27164-4\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edemocracy/BringerGKKLORSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaracaldoAGS14, author = {Nathalie Baracaldo and Elli Androulaki and Joseph S. Glider and Alessandro Sorniotti}, editor = {Gail{-}Joon Ahn and Alina Oprea and Reihaneh Safavi{-}Naini}, title = {Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage}, booktitle = {Proceedings of the 6th edition of the {ACM} Workshop on Cloud Computing Security, {CCSW} '14, Scottsdale, Arizona, USA, November 7, 2014}, pages = {21--32}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664168.2664176}, doi = {10.1145/2664168.2664176}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaracaldoAGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlisPOS14, author = {Jorge Blasco Al{\'{\i}}s and Roberto Di Pietro and Agust{\'{\i}}n Orfila and Alessandro Sorniotti}, title = {A tunable proof of ownership scheme for deduplication using Bloom filters}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {481--489}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997518}, doi = {10.1109/CNS.2014.6997518}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlisPOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/StanekSAK14, author = {Jan Stanek and Alessandro Sorniotti and Elli Androulaki and Lukas Kencl}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {A Secure Data Deduplication Scheme for Cloud Storage}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {99--118}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_8}, doi = {10.1007/978-3-662-45472-5\_8}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/StanekSAK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArmandoCCCPS13, author = {Alessandro Armando and Roberto Carbone and Luca Compagna and Jorge Cu{\'{e}}llar and Giancarlo Pellegrino and Alessandro Sorniotti}, title = {An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations}, journal = {Comput. Secur.}, volume = {33}, pages = {41--58}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2012.08.007}, doi = {10.1016/J.COSE.2012.08.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArmandoCCCPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CachinHHS13, author = {Christian Cachin and Kristiyan Haralambiev and Hsu{-}Chun Hsiao and Alessandro Sorniotti}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Policy-based secure deletion}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {259--270}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516690}, doi = {10.1145/2508859.2516690}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CachinHHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mss/FactorHHHKKSS13, author = {Michael Factor and David Hadas and Aner Hamama and Nadav Har'El and Elliot K. Kolodner and Anil Kurmus and Alexandra Shulman{-}Peleg and Alessandro Sorniotti}, title = {Secure Logical Isolation for Multi-tenancy in cloud storage}, booktitle = {{IEEE} 29th Symposium on Mass Storage Systems and Technologies, {MSST} 2013, May 6-10, 2013, Long Beach, CA, {USA}}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MSST.2013.6558424}, doi = {10.1109/MSST.2013.6558424}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mss/FactorHHHKKSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CachinHHS13, author = {Christian Cachin and Kristiyan Haralambiev and Hsu{-}Chun Hsiao and Alessandro Sorniotti}, title = {Policy-based Secure Deletion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2013}, url = {http://eprint.iacr.org/2013/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CachinHHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PietroS12, author = {Roberto Di Pietro and Alessandro Sorniotti}, editor = {Heung Youl Youm and Yoojae Won}, title = {Boosting efficiency and security in proof of ownership for deduplication}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {81--82}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414504}, doi = {10.1145/2414456.2414504}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PietroS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/BasescuCEHSVZ12, author = {Cristina Basescu and Christian Cachin and Ittay Eyal and Robert Haas and Alessandro Sorniotti and Marko Vukolic and Ido Zachevsky}, editor = {Robert S. Swarz and Philip Koopman and Michel Cukier}, title = {Robust data sharing with key-value stores}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2012, Boston, MA, USA, June 25-28, 2012}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSN.2012.6263920}, doi = {10.1109/DSN.2012.6263920}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/BasescuCEHSVZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/CachinJS12, author = {Christian Cachin and Birgit Junker and Alessandro Sorniotti}, title = {On limitations of using cloud storage for data replication}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} 2012, Boston, MA, USA, June 25-28, 2012}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSNW.2012.6264683}, doi = {10.1109/DSNW.2012.6264683}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/CachinJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/KurmusSK11, author = {Anil Kurmus and Alessandro Sorniotti and R{\"{u}}diger Kapitza}, editor = {Engin Kirda and Steven Hand}, title = {Attack surface reduction for commodity {OS} kernels: trimmed garden plants may attract less bugs}, booktitle = {Proceedings of the Fourth European Workshop on System Security, EUROSEC'11, April 10, 2011, Salzburg, Austria}, pages = {6}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1972551.1972557}, doi = {10.1145/1972551.1972557}, timestamp = {Tue, 20 Dec 2022 17:33:10 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/KurmusSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ArmandoCCCPS11, author = {Alessandro Armando and Roberto Carbone and Luca Compagna and Jorge Cu{\'{e}}llar and Giancarlo Pellegrino and Alessandro Sorniotti}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {68--79}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_6}, doi = {10.1007/978-3-642-21424-0\_6}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/ArmandoCCCPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Sorniotti10, author = {Alessandro Sorniotti}, title = {Protocoles pour Poign{\'{e}}es de Main Secr{\`{e}}tes. (Secret Handshake Protocols)}, school = {T{\'{e}}l{\'{e}}com ParisTech, France}, year = {2010}, url = {https://tel.archives-ouvertes.fr/pastel-00006276}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Sorniotti10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SorniottiM10, author = {Alessandro Sorniotti and Refik Molva}, title = {A provably secure secret handshake with dynamic controlled matching}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {619--627}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.11.004}, doi = {10.1016/J.COSE.2009.11.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SorniottiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KerschbaumS10, author = {Florian Kerschbaum and Alessandro Sorniotti}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {Searchable Encryption for Outsourced Data Analytics}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {61--76}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_5}, doi = {10.1007/978-3-642-22633-5\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/KerschbaumS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SorniottiM10, author = {Alessandro Sorniotti and Refik Molva}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Federated Secret Handshakes with Support for Revocation}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {218--234}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_16}, doi = {10.1007/978-3-642-17650-0\_16}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SorniottiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/TrabelsiWSSB10, author = {Slim Trabelsi and Eric Weil and Alessandro Sorniotti and Stuart Short and Michele Bezzi}, title = {Privacy-aware policy matching}, booktitle = {Proceedings of the 15th {IEEE} Symposium on Computers and Communications, {ISCC} 2010, Riccione, Italy, June 22-25, 2010}, pages = {302--307}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ISCC.2010.5546733}, doi = {10.1109/ISCC.2010.5546733}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/TrabelsiWSSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SorniottiM10, author = {Alessandro Sorniotti and Refik Molva}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Secret interest groups (SIGs) in social networks with an implementation on Facebook}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {621--628}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774219}, doi = {10.1145/1774088.1774219}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/SorniottiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/SorniottiMG09, author = {Alessandro Sorniotti and Refik Molva and Laurent Gomez}, title = {Efficient Access Control forWireless Sensor Data}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {7}, number = {3-4}, pages = {325--336}, year = {2009}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-7-number-3-4-2009/ahswn-7-3-4-p-325-336/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/SorniottiMG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwin/SorniottiMGTLS09, author = {Alessandro Sorniotti and Refik Molva and Laurent Gomez and Christophe Trefois and Annett Laube and Piervito Scaglioso}, title = {Efficient Access Control for Wireless Sensor Data}, journal = {Int. J. Wirel. Inf. Networks}, volume = {16}, number = {3}, pages = {165--174}, year = {2009}, url = {https://doi.org/10.1007/s10776-009-0102-4}, doi = {10.1007/S10776-009-0102-4}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwin/SorniottiMGTLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/GomezLS09, author = {Laurent Gomez and Annett Laube and Alessandro Sorniotti}, editor = {Irfan Awan and Muhammad Younas and Takahiro Hara and Arjan Durresi}, title = {Trustworthiness Assessment of Wireless Sensor Data for Business Applications}, booktitle = {The {IEEE} 23rd International Conference on Advanced Information Networking and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29, 2009}, pages = {355--362}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/AINA.2009.92}, doi = {10.1109/AINA.2009.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/GomezLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SorniottiM09, author = {Alessandro Sorniotti and Refik Molva}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Secret Handshakes with Revocation Support}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {274--299}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_19}, doi = {10.1007/978-3-642-14423-3\_19}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SorniottiM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SorniottiM09, author = {Alessandro Sorniotti and Refik Molva}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {A Provably Secure Secret Handshake with Dynamic Controlled Matching}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {330--341}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_29}, doi = {10.1007/978-3-642-01244-0\_29}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/sec/SorniottiM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/CuevasKGLS09, author = {{\'{A}}ngel Cuevas and Paul El Khoury and Laurent Gomez and Annett Laube and Alessandro Sorniotti}, editor = {Rainer Falk and Wilson Goudalo and Eric Y. Chen and Reijo Savola and Manuela Popescu}, title = {A Security Pattern for Untraceable Secret Handshakes}, booktitle = {The Third International Conference on Emerging Security Information, Systems and Technologies, {SECURWARE} 2009, 18-23 June 2009, Athens/Glyfada, Greece}, pages = {8--14}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SECURWARE.2009.9}, doi = {10.1109/SECURWARE.2009.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/CuevasKGLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KerschbaumS09, author = {Florian Kerschbaum and Alessandro Sorniotti}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {RFID-based supply chain partner authentication and key agreement}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {41--50}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514281}, doi = {10.1145/1514274.1514281}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KerschbaumS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/igi/09/GomezLS09, author = {Laurent Gomez and Annett Laube and Alessandro Sorniotti}, editor = {Dragan Stojanovic}, title = {Access Control in Mobile and Ubiquitous Environments}, booktitle = {Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability - Adaptive Technologies and Applications}, pages = {278--294}, publisher = {{IGI} Global}, year = {2009}, url = {https://doi.org/10.4018/978-1-60566-290-9.ch012}, doi = {10.4018/978-1-60566-290-9.CH012}, timestamp = {Mon, 16 Sep 2019 14:43:09 +0200}, biburl = {https://dblp.org/rec/books/igi/09/GomezLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Urvoy-KellerES08, author = {Guillaume Urvoy{-}Keller and Taoufik En{-}Najjary and Alessandro Sorniotti}, title = {Operational comparison of available bandwidth estimation tools}, journal = {Comput. Commun. Rev.}, volume = {38}, number = {1}, pages = {39--42}, year = {2008}, url = {https://doi.org/10.1145/1341431.1341438}, doi = {10.1145/1341431.1341438}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/Urvoy-KellerES08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobilware/GomezLS08, author = {Laurent Gomez and Annett Laube and Alessandro Sorniotti}, editor = {Jiang (Linda) Xie and Tuna Tugcu}, title = {Design guidelines for integration of wireless sensor networks with enterprise systems}, booktitle = {Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, {MOBILWARE} 2008, Innsbruck, Austria, February 13 - 15, 2008}, series = {{ACM} International Conference Proceeding Series}, volume = {278}, pages = {12}, year = {2008}, url = {https://doi.org/10.4108/ICST.MOBILWARE2008.2890}, doi = {10.4108/ICST.MOBILWARE2008.2890}, timestamp = {Wed, 28 Nov 2018 12:57:16 +0100}, biburl = {https://dblp.org/rec/conf/mobilware/GomezLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/GomezLRSTVW08, author = {Laurent Gomez and Annett Laube and Vincent Ribi{\`{e}}re and Alessandro Sorniotti and Christophe Trefois and Marco Valente and Patrick Wetterwald}, editor = {Vinny Cahill}, title = {Encryption-based access control for building management}, booktitle = {5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2008, July 21-25, 2008, Dublin, Ireland}, publisher = {{ICST} / {ACM}}, year = {2008}, url = {https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4019}, doi = {10.4108/ICST.MOBIQUITOUS2008.4019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobiquitous/GomezLRSTVW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/SorniottiMG08, author = {Alessandro Sorniotti and Refik Molva and Laurent Gomez}, title = {Efficient access control for wireless sensor data}, booktitle = {Proceedings of the {IEEE} 19th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2008, 15-18 September 2008, Cannes, French Riviera, France}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/PIMRC.2008.4699487}, doi = {10.1109/PIMRC.2008.4699487}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/SorniottiMG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecumn/SorniottiCS07, author = {Alessandro Sorniotti and Gabriele Corliano and Alan P. Smith}, title = {Design Guidelines for an Internet-Scaled QoS Framework}, booktitle = {Fourth European Conference on Universal Multiservice Networks {(ECUMN} 2007), 14-16 February 2007, Toulouse, France}, pages = {109--118}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ECUMN.2007.16}, doi = {10.1109/ECUMN.2007.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecumn/SorniottiCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.