Italian Distributed Ledger Technology Working Group

Also CINI working group on Blockchain

List of Publications

BibBase http://normandy.dmi.unipg.it/~DLTgdl/temp_files/global.bib
generated by bibbase.org
  2020 (205)
Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work. Mauri, L.; Damiani, E.; and Cimato, S. In 13th IEEE International Conference on Cloud Computing, CLOUD 2020, Virtual Event, 18-24 October 2020, pages 53–62, 2020. IEEE
Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work [link]Paper   doi   bibtex  
Vision: What If They All Die? Crypto Requirements For Key People. Ngo, C. N.; Friolo, D.; Massacci, F.; Venturi, D.; and Battaiola, E. In IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2020, Genoa, Italy, September 7-11, 2020, pages 178–183, 2020. IEEE
Vision: What If They All Die? Crypto Requirements For Key People [link]Paper   doi   bibtex  
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol. Mauri, L.; Cimato, S.; and Damiani, E. In Furnell, S.; Mori, P.; Weippl, E. R.; and Camp, O., editor(s), Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020, pages 52–63, 2020. SCITEPRESS
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol [link]Paper   doi   bibtex  
Binding of Endpoints to Identifiers by On-Chain Proofs. Pennino, D.; Pizzonia, M.; Vitaletti, A.; and Zecchini, M. In IEEE Symposium on Computers and Communications, ISCC 2020, Rennes, France, July 7-10, 2020, pages 1–6, 2020. IEEE
Binding of Endpoints to Identifiers by On-Chain Proofs [link]Paper   doi   bibtex  
Bitcoin Covenants Unchained. Bartoletti, M.; Lande, S.; and Zunino, R. In Margaria, T.; and Steffen, B., editor(s), Leveraging Applications of Formal Methods, Verification and Validation: Applications - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Rhodes, Greece, October 20-30, 2020, Proceedings, Part III, volume 12478, of Lecture Notes in Computer Science, pages 25–42, 2020. Springer
Bitcoin Covenants Unchained [link]Paper   doi   bibtex  
Decentralized robinson list. Cirillo, A.; Mauro, A.; Pennino, D.; Pizzonia, M.; Vitaletti, A.; and Zecchini, M. In CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London, UK, September 25, 2020, pages 1–6, 2020. ACM
Decentralized robinson list [link]Paper   bibtex  
Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Bracciali, A.; Clark, J.; Pintore, F.; R\onne, P. B.; and Sala, M., editors. Volume 11599, of Lecture Notes in Computer Science.Springer. 2020.
Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers [link]Paper   doi   bibtex  
Binding of Endpoints to Identifiers by On-Chain Proofs. Pennino, D.; Pizzonia, M.; Vitaletti, A.; and Zecchini, M. CoRR, abs/2005.00794. 2020.
Binding of Endpoints to Identifiers by On-Chain Proofs [link]Paper   bibtex  
Bitcoin covenants unchained. Bartoletti, M.; Lande, S.; and Zunino, R. CoRR, abs/2006.03918. 2020.
Bitcoin covenants unchained [link]Paper   bibtex  
A formal model of Algorand smart contracts. Bartoletti, M.; Bracciali, A.; Lepore, C.; Scalas, A.; and Zunino, R. CoRR, abs/2009.12140. 2020.
A formal model of Algorand smart contracts [link]Paper   bibtex  
Computationally sound Bitcoin tokens. Bartoletti, M.; Lande, S.; and Zunino, R. CoRR, abs/2010.01347. 2020.
Computationally sound Bitcoin tokens [link]Paper   bibtex  
Verification of recursive Bitcoin contracts. Bartoletti, M.; Lande, S.; Murgia, M.; and Zunino, R. CoRR, abs/2011.14165. 2020.
Verification of recursive Bitcoin contracts [link]Paper   bibtex  
A Framework Based on Distributed Ledger Technologies for Data Management and Services in Intelligent Transportation Systems. Zichichi, M.; Ferretti, S.; and D'Angelo, G. IEEE Access, 8: 100384–100402. 2020.
A Framework Based on Distributed Ledger Technologies for Data Management and Services in Intelligent Transportation Systems [link]Paper   doi   bibtex  
Abstract argumentation and (optimal) stable marriage problems. Bistarelli, S.; and Santini, F. Argument Comput., 11(1-2): 15–40. 2020.
Abstract argumentation and (optimal) stable marriage problems [link]Paper   doi   bibtex  
Special Issue on Cryptocurrencies and Blockchains for Distributed Systems. Ferretti, S.; and D'Angelo, G. Comput. Commun., 155: 266. 2020.
Special Issue on Cryptocurrencies and Blockchains for Distributed Systems [link]Paper   doi   bibtex  
Foreword to the special issue on cryptocurrencies and blockchains for distributed systems. Ferretti, S.; and D'Angelo, G. Concurr. Comput. Pract. Exp., 32(12). 2020.
Foreword to the special issue on cryptocurrencies and blockchains for distributed systems [link]Paper   doi   bibtex  
On the Ethereum blockchain structure: A complex networks theory perspective. Ferretti, S.; and D'Angelo, G. Concurr. Comput. Pract. Exp., 32(12). 2020.
On the Ethereum blockchain structure: A complex networks theory perspective [link]Paper   doi   bibtex  
Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact. Bartoletti, M.; Carta, S.; Cimoli, T.; and Saia, R. Future Gener. Comput. Syst., 102: 259–277. 2020.
Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact [link]Paper   doi   bibtex  
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem. Cimato, S.; Gianini, G.; Sepehri, M.; Asal, R.; and Damiani, E. J. Inf. Secur. Appl., 51: 102462. 2020.
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem [link]Paper   doi   bibtex  
A First Overview of ICCMA'19. Bistarelli, S.; Kotthoff, L.; Santini, F.; and Taticchi, C. In Fazzinga, B.; Furfaro, F.; and Parisi, F., editor(s), Proceedings of the Workshop on Advances In Argumentation In Artificial Intelligence 2020 co-located with the 19th International Conference of the Italian Association for Artificial Intelligence (AIxIA 2020), Online, November 25-26, 2020, volume 2777, of CEUR Workshop Proceedings, pages 90–102, 2020. CEUR-WS.org
A First Overview of ICCMA'19 [pdf]Paper   bibtex  
Fast Session Resumption in DTLS for Mobile Communications. Caminati, G.; Kiade, S.; D'Angelo, G.; Ferretti, S.; and Ghini, V. In IEEE 17th Annual Consumer Communications & Networking Conference, CCNC 2020, Las Vegas, NV, USA, January 10-13, 2020, pages 1–6, 2020. IEEE
Fast Session Resumption in DTLS for Mobile Communications [link]Paper   doi   bibtex  
A Distributed Ledger Based Infrastructure for Smart Transportation System and Social Good. Zichichi, M.; Ferretti, S.; and D'Angelo, G. In IEEE 17th Annual Consumer Communications & Networking Conference, CCNC 2020, Las Vegas, NV, USA, January 10-13, 2020, pages 1–6, 2020. IEEE
A Distributed Ledger Based Infrastructure for Smart Transportation System and Social Good [link]Paper   doi   bibtex  
A True Concurrent Model of Smart Contracts Executions. Bartoletti, M.; Galletta, L.; and Murgia, M. In Bliudze, S.; and Bocchi, L., editor(s), Coordination Models and Languages - 22nd IFIP WG 6.1 International Conference, COORDINATION 2020, Held as Part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020, Valletta, Malta, June 15-19, 2020, Proceedings, volume 12134, of Lecture Notes in Computer Science, pages 243–260, 2020. Springer
A True Concurrent Model of Smart Contracts Executions [link]Paper   doi   bibtex  
Renegotiation and Recursion in Bitcoin Contracts. Bartoletti, M.; Murgia, M.; and Zunino, R. In Bliudze, S.; and Bocchi, L., editor(s), Coordination Models and Languages - 22nd IFIP WG 6.1 International Conference, COORDINATION 2020, Held as Part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020, Valletta, Malta, June 15-19, 2020, Proceedings, volume 12134, of Lecture Notes in Computer Science, pages 261–278, 2020. Springer
Renegotiation and Recursion in Bitcoin Contracts [link]Paper   doi   bibtex  
CommonsHood: a Blockchain-based Wallet App for Local Communities. Balbo, S.; Boella, G.; Busacchi, P.; Cordero, A.; Carne, L. D.; Guffanti, A.; Mioli, M.; Sanino, A.; Schifanella, C.; and Caro, D. D. In Xu, J.; Schulte, S.; Ruppel, P.; Küpper, A.; and Jadav, D., editor(s), 2nd IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2020, Oxford, UK, August 3-6, 2020, pages 139–144, 2020. IEEE
CommonsHood: a Blockchain-based Wallet App for Local Communities [link]Paper   doi   bibtex  
On the Efficiency of Decentralized File Storage for Personal Information Management Systems. Zichichi, M.; Ferretti, S.; and D'Angelo, G. In IEEE Symposium on Computers and Communications, ISCC 2020, Rennes, France, July 7-10, 2020, pages 1–6, 2020. IEEE
On the Efficiency of Decentralized File Storage for Personal Information Management Systems [link]Paper   doi   bibtex  
A Report on the Security of Home Connections with IoT and Docker Honeypots. Bistarelli, S.; Bosimini, E.; and Santini, F. In Loreti, M.; and Spalazzi, L., editor(s), Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020, volume 2597, of CEUR Workshop Proceedings, pages 60–70, 2020. CEUR-WS.org
A Report on the Security of Home Connections with IoT and Docker Honeypots [pdf]Paper   bibtex  
Scaling blockchains without giving up decentralization and security: a solution to the blockchain scalability trilemma. Monte, G. D.; Pennino, D.; and Pizzonia, M. In CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London, UK, September 25, 2020, pages 71–76, 2020. ACM
Scaling blockchains without giving up decentralization and security: a solution to the blockchain scalability trilemma [link]Paper   bibtex  
Implications of dissemination strategies on the security of distributed ledgers. Serena, L.; D'Angelo, G.; and Ferretti, S. In CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London, UK, September 25, 2020, pages 65–70, 2020. ACM
Implications of dissemination strategies on the security of distributed ledgers [link]Paper   bibtex  
DiLeNA: distributed ledger network analyzer. Serena, L.; Ferretti, S.; and D'Angelo, G. In CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London, UK, September 25, 2020, pages 41–46, 2020. ACM
DiLeNA: distributed ledger network analyzer [link]Paper   bibtex  
Are distributed ledger technologies ready for intelligent transportation systems?. Zichichi, M.; Ferretti, S.; and D'Angelo, G. In CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London, UK, September 25, 2020, pages 12–17, 2020. ACM
Are distributed ledger technologies ready for intelligent transportation systems? [link]Paper   bibtex  
Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges. Braghin, C.; Cimato, S.; Damiani, E.; Frati, F.; Riccobene, E.; and Astaneh, S. In Hatzivasilis, G.; and Ioannidis, S., editor(s), Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020, Revised Selected Papers, volume 12512, of Lecture Notes in Computer Science, pages 79–91, 2020. Springer
Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges [link]Paper   doi   bibtex  
Personal Data Access Control Through Distributed Authorization. Zichichi, M.; Ferretti, S.; D'Angelo, G.; and Rodríguez-Doncel, V. In 19th IEEE International Symposium on Network Computing and Applications, NCA 2020, Cambridge, MA, USA, November 24-27, 2020, pages 1–4, 2020. IEEE
Personal Data Access Control Through Distributed Authorization [link]Paper   doi   bibtex  
Computational Models of Argument - Proceedings of COMMA 2020, Perugia, Italy, September 4-11, 2020. Prakken, H.; Bistarelli, S.; Santini, F.; and Taticchi, C., editors. Volume 326, of Frontiers in Artificial Intelligence and Applications.IOS Press. 2020.
Computational Models of Argument - Proceedings of COMMA 2020, Perugia, Italy, September 4-11, 2020 [link]Paper   doi   bibtex  
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Bernhard, M.; Bracciali, A.; Camp, L. J.; Matsuo, S.; Maurushat, A.; R\onne, P. B.; and Sala, M., editors. Volume 12063, of Lecture Notes in Computer Science.Springer. 2020.
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers [link]Paper   doi   bibtex  
Are Distributed Ledger Technologies Ready for Smart Transportation Systems?. Zichichi, M.; Ferretti, S.; and D'Angelo, G. CoRR, abs/2001.09018. 2020.
Are Distributed Ledger Technologies Ready for Smart Transportation Systems? [link]Paper   bibtex  
Renegotiation and recursion in Bitcoin contracts. Bartoletti, M.; Murgia, M.; and Zunino, R. CoRR, abs/2003.00296. 2020.
Renegotiation and recursion in Bitcoin contracts [link]Paper   bibtex  
Scaling Blockchains Without Giving up Decentralization and Security. Monte, G. D.; Pennino, D.; and Pizzonia, M. CoRR, abs/2005.06665. 2020.
Scaling Blockchains Without Giving up Decentralization and Security [link]Paper   bibtex  
On the Efficiency of Decentralized File Storage for Personal Information Management Systems. Zichichi, M.; Ferretti, S.; and D'Angelo, G. CoRR, abs/2007.03505. 2020.
On the Efficiency of Decentralized File Storage for Personal Information Management Systems [link]Paper   bibtex  
DiLeNA: Distributed Ledger Network Analyzer. Serena, L.; Ferretti, S.; and D'Angelo, G. CoRR, abs/2007.14644. 2020.
DiLeNA: Distributed Ledger Network Analyzer [link]Paper   bibtex  
Implications of Dissemination Strategies on the Security of Distributed Ledgers. Serena, L.; D'Angelo, G.; and Ferretti, S. CoRR, abs/2007.15260. 2020.
Implications of Dissemination Strategies on the Security of Distributed Ledgers [link]Paper   bibtex  
Security checklists for Ethereum smart contract development: patterns and best practices. Marchesi, L.; Marchesi, M.; Pompianu, L.; and Tonelli, R. CoRR, abs/2008.04761. 2020.
Security checklists for Ethereum smart contract development: patterns and best practices [link]Paper   bibtex  
A theory of transaction parallelism in blockchains. Bartoletti, M.; Galletta, L.; and Murgia, M. CoRR, abs/2011.13837. 2020.
A theory of transaction parallelism in blockchains [link]Paper   bibtex  
Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures. Barkee, B.; Ceria, M.; Moriarty, T.; and Visconti, A. Appl. Algebra Eng. Commun. Comput., 31(3-4): 235–252. 2020.
Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures [link]Paper   doi   bibtex  
HELP: a sparse error locator polynomial for BCH codes. Ceria, M.; Mora, T.; and Sala, M. Appl. Algebra Eng. Commun. Comput., 31(3-4): 215–233. 2020.
HELP: a sparse error locator polynomial for BCH codes [link]Paper   doi   bibtex  
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Gajrani, J.; Laxmi, V.; Tripathi, M.; Gaur, M. S.; Zemmari, A.; Mosbah, M.; and Conti, M. Adv. Comput., 119: 73–120. 2020.
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements [link]Paper   doi   bibtex  
Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model. Aderibole, A.; Aljarwan, A.; Rehman, M. H. U.; Zeineldin, H. H.; Mezher, T.; Salah, K.; Damiani, E.; and Svetinovic, D. IEEE Access, 8: 43177–43190. 2020.
Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model [link]Paper   doi   bibtex  
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey. Bellini, E.; Iraqi, Y.; and Damiani, E. IEEE Access, 8: 21127–21151. 2020.
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey [link]Paper   doi   bibtex  
Managing Constraints in Role Based Access Control. Blundo, C.; Cimato, S.; and Siniscalchi, L. IEEE Access, 8: 140497–140511. 2020.
Managing Constraints in Role Based Access Control [link]Paper   doi   bibtex  
Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure. Hammadi, A. Y. A.; Lee, D.; Yeun, C. Y.; Damiani, E.; Kim, S.; Yoo, P. D.; and Choi, H. IEEE Access, 8: 206222–206234. 2020.
Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure [link]Paper   doi   bibtex  
IEEE Access Special Section Editorial: Urban Computing and Well-Being in Smart Cities: Services, Applications, Policymaking Considerations. Lytras, M. D.; Visvizi, A.; Torres-Ruiz, M. J.; Damiani, E.; and Jin, P. IEEE Access, 8: 72340–72346. 2020.
IEEE Access Special Section Editorial: Urban Computing and Well-Being in Smart Cities: Services, Applications, Policymaking Considerations [link]Paper   doi   bibtex  
How do you Propose Your Code Changes? Empirical Analysis of Affect Metrics of Pull Requests on GitHub. Ortu, M.; Destefanis, G.; Graziotin, D.; Marchesi, M.; and Tonelli, R. IEEE Access, 8: 110897–110907. 2020.
How do you Propose Your Code Changes? Empirical Analysis of Affect Metrics of Pull Requests on GitHub [link]Paper   doi   bibtex  
Attestation-enabled secure and scalable routing protocol for IoT networks. Conti, M.; Kaliyar, P.; Rabbani, M. M.; and Ranise, S. Ad Hoc Networks, 98. 2020.
Attestation-enabled secure and scalable routing protocol for IoT networks [link]Paper   doi   bibtex  
In memoriam Douglas N. Walton: the influence of Doug Walton on AI and law. Atkinson, K.; Bench-Capon, T. J. M.; Bex, F.; Gordon, T. F.; Prakken, H.; Sartor, G.; and Verheij, B. Artif. Intell. Law, 28(3): 281–326. 2020.
In memoriam Douglas N. Walton: the influence of Doug Walton on AI and law [link]Paper   doi   bibtex  
Arguing about causes in law: a semi-formal framework for causal arguments. Liepina, R.; Sartor, G.; and Wyner, A. Artif. Intell. Law, 28(1): 69–89. 2020.
Arguing about causes in law: a semi-formal framework for causal arguments [link]Paper   doi   bibtex  
The race for an artificial general intelligence: implications for public policy. Naudé, W.; and Dimitri, N. AI Soc., 35(2): 367–379. 2020.
The race for an artificial general intelligence: implications for public policy [link]Paper   doi   bibtex  
Energy allocation and payment: a game-theoretic approach. Giuliodori, P.; Bistarelli, S.; and Mugnai, D. Ann. Math. Artif. Intell., 88(7): 793–816. 2020.
Energy allocation and payment: a game-theoretic approach [link]Paper   doi   bibtex  
Adversarial behaviours in mixing coins under incomplete information. Wang, Y.; Bracciali, A.; Yang, G.; Li, T.; and Yu, X. Appl. Soft Comput., 96: 106605. 2020.
Adversarial behaviours in mixing coins under incomplete information [link]Paper   doi   bibtex  
On the linear structures of balanced functions and quadratic APN functions. Musukwa, A.; and Sala, M. Cryptogr. Commun., 12(5): 859–880. 2020.
On the linear structures of balanced functions and quadratic APN functions [link]Paper   doi   bibtex  
Modelling communication capability and node reorientation in offshore communication network. Surendran, S.; Ramesh, M. V.; Montag, M. J.; and Montresor, A. Comput. Electr. Eng., 87: 106781. 2020.
Modelling communication capability and node reorientation in offshore communication network [link]Paper   doi   bibtex  
Technology-enhanced learning research in higher education: A transformative education primer. Lytras, M. D.; Sarirete, A.; and Damiani, E. Comput. Hum. Behav., 109: 106350. 2020.
Technology-enhanced learning research in higher education: A transformative education primer [link]Paper   doi   bibtex  
Can machine learning model with static features be fooled: an adversarial machine learning approach. Taheri, R.; Javidan, R.; Shojafar, M.; Vinod, P.; and Conti, M. Clust. Comput., 23(4): 3233–3253. 2020.
Can machine learning model with static features be fooled: an adversarial machine learning approach [link]Paper   doi   bibtex  
Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control. Martini, B.; Mori, P.; Marino, F.; Saracino, A.; Lunardelli, A.; Marra, A. L.; Martinelli, F.; and Castoldi, P. IEEE Commun. Mag., 58(7): 65–71. 2020.
Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control [link]Paper   doi   bibtex  
TAMBUS: A novel authentication method through covert channels for securing industrial networks. Bernieri, G.; Cecconello, S.; Conti, M.; and Lain, G. Comput. Networks, 183: 107583. 2020.
TAMBUS: A novel authentication method through covert channels for securing industrial networks [link]Paper   doi   bibtex  
Security issues and challenges in V2X: A Survey. Ghosal, A.; and Conti, M. Comput. Networks, 169: 107093. 2020.
Security issues and challenges in V2X: A Survey [link]Paper   doi   bibtex  
Secure over-the-air software updates in connected vehicles: A survey. Halder, S.; Ghosal, A.; and Conti, M. Comput. Networks, 178: 107343. 2020.
Secure over-the-air software updates in connected vehicles: A survey [link]Paper   doi   bibtex  
NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN. Hassan, M.; Conti, M.; and Lal, C. Comput. Networks, 174: 107222. 2020.
NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN [link]Paper   doi   bibtex  
Security and design requirements for software-defined VANETs. Jaballah, W. B.; Conti, M.; and Lal, C. Comput. Networks, 169: 107099. 2020.
Security and design requirements for software-defined VANETs [link]Paper   doi   bibtex  
Detection of algorithmically-generated domains: An adversarial machine learning approach. Alaeiyan, M. H.; Parsa, S.; P, V.; and Conti, M. Comput. Commun., 160: 661–673. 2020.
Detection of algorithmically-generated domains: An adversarial machine learning approach [link]Paper   doi   bibtex  
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage. Dave, J.; Faruki, P.; Laxmi, V.; Zemmari, A.; Gaur, M. S.; and Conti, M. Comput. Commun., 154: 148–159. 2020.
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage [link]Paper   doi   bibtex  
Context-based Co-presence detection techniques: A survey. Conti, M.; and Lal, C. Comput. Secur., 88. 2020.
Context-based Co-presence detection techniques: A survey [link]Paper   doi   bibtex  
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Kaliyar, P.; Jaballah, W. B.; Conti, M.; and Lal, C. Comput. Secur., 94: 101849. 2020.
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks [link]Paper   doi   bibtex  
Preface: Springer computing journal. Ferguson, D. F.; Majchrzak, T. A.; and Damiani, E. Computing, 102(2): 341–342. 2020.
Preface: Springer computing journal [link]Paper   doi   bibtex  
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges. Ambrosin, M.; Conti, M.; Lazzeretti, R.; Rabbani, M. M.; and Ranise, S. IEEE Commun. Surv. Tutorials, 22(4): 2447–2461. 2020.
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges [link]Paper   doi   bibtex  
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions. Conti, M.; Gangwal, A.; Hassan, M.; Lal, C.; and Losiouk, E. IEEE Commun. Surv. Tutorials, 22(3): 2104–2129. 2020.
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions [link]Paper   doi   bibtex  
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions. Manral, B.; Somani, G.; Choo, K. R.; Conti, M.; and Gaur, M. S. ACM Comput. Surv., 52(6): 124:1–124:38. 2020.
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions [link]Paper   doi   bibtex  
Skills, Efficiency, and Timing in a Simple Attack and Defense Model. Dimitri, N. Decis. Anal., 17(3): 227–234. 2020.
Skills, Efficiency, and Timing in a Simple Attack and Defense Model [link]Paper   doi   bibtex  
Mutually orthogonal latin squares based on cellular automata. Mariot, L.; Gadouleau, M.; Formenti, E.; and Leporati, A. Des. Codes Cryptogr., 88(2): 391–411. 2020.
Mutually orthogonal latin squares based on cellular automata [link]Paper   doi   bibtex  
The Butterfly "Affect": impact of development practices on cryptocurrency prices. Bartolucci, S.; Destefanis, G.; Ortu, M.; Uras, N.; Marchesi, M.; and Tonelli, R. EPJ Data Sci., 9(1): 21. 2020.
The Butterfly "Affect": impact of development practices on cryptocurrency prices [link]Paper   doi   bibtex  
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals. Allodi, L.; Cremonini, M.; Massacci, F.; and Shim, W. Empir. Softw. Eng., 25(2): 1063–1094. 2020.
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals [link]Paper   doi   bibtex  
HIT4Mal: Hybrid image transformation for malware classification. Vu, D. L.; Nguyen, T.; Nguyen, T. V.; Nguyen, T. N.; Massacci, F.; and Phung, P. H. Trans. Emerg. Telecommun. Technol., 31(11). 2020.
HIT4Mal: Hybrid image transformation for malware classification [link]Paper   doi   bibtex  
Smart Contracts Contracts. Bartoletti, M. Frontiers Blockchain, 3: 27. 2020.
Smart Contracts Contracts [link]Paper   doi   bibtex  
Intelligent Smart Contracts for Innovative Supply Chain Management. Bottoni, P.; Gessa, N.; Massa, G.; Pareschi, R.; Selim, H.; and Arcuri, E. Frontiers Blockchain, 3: 535787. 2020.
Intelligent Smart Contracts for Innovative Supply Chain Management [link]Paper   doi   bibtex  
The Genesy Model for a Blockchain-Based Fair Ecosystem of Genomic Data. Carlini, F.; Carlini, R.; Palma, S. D.; Pareschi, R.; and Zappone, F. Frontiers Blockchain, 3: 483227. 2020.
The Genesy Model for a Blockchain-Based Fair Ecosystem of Genomic Data [link]Paper   doi   bibtex  
Design of a Sustainable Blockchain-Oriented Software for Building Workers Management. Pinna, A.; Baralla, G.; Lallai, G.; Marchesi, M.; and Tonelli, R. Frontiers Blockchain, 3: 38. 2020.
Design of a Sustainable Blockchain-Oriented Software for Building Workers Management [link]Paper   doi   bibtex  
Intersections between the norm-trace curve and some low degree curves. Bonini, M.; and Sala, M. Finite Fields Their Appl., 67: 101715. 2020.
Intersections between the norm-trace curve and some low degree curves [link]Paper   doi   bibtex  
Special issue on Trusted Cloud-Edges Computations. Ardagna, C. A.; Conti, M.; and Yu, C. Future Gener. Comput. Syst., 112: 1180–1183. 2020.
Special issue on Trusted Cloud-Edges Computations [link]Paper   doi   bibtex  
A cloud-edge based data security architecture for sharing and analysing cyber threat information. Chadwick, D. W.; Fan, W.; Costantino, G.; de Lemos, R.; Cerbo, F. D.; Herwono, I.; Manea, M.; Mori, P.; Sajjad, A.; and Wang, X. Future Gener. Comput. Syst., 102: 710–722. 2020.
A cloud-edge based data security architecture for sharing and analysing cyber threat information [link]Paper   doi   bibtex  
Managing a pool of rules for credit card fraud detection by a Game Theory based approach. Gianini, G.; Fossi, L. G.; Mio, C.; Caelen, O.; Brunie, L.; and Damiani, E. Future Gener. Comput. Syst., 102: 549–561. 2020.
Managing a pool of rules for credit card fraud detection by a Game Theory based approach [link]Paper   doi   bibtex  
Similarity-based Android malware detection using Hamming distance of static binary features. Taheri, R.; Ghahramani, M.; Javidan, R.; Shojafar, M.; Pooranian, Z.; and Conti, M. Future Gener. Comput. Syst., 105: 230–247. 2020.
Similarity-based Android malware detection using Hamming distance of static binary features [link]Paper   doi   bibtex  
An Organized Repository of Ethereum Smart Contracts' Source Codes and Metrics. Pierro, G. A.; Tonelli, R.; and Marchesi, M. Future Internet, 12(11): 197. 2020.
An Organized Repository of Ethereum Smart Contracts' Source Codes and Metrics [link]Paper   doi   bibtex  
The Many Roads to the Simulation of Reaction Systems. Ferretti, C.; Leporati, A.; Manzoni, L.; and Porreca, A. E. Fundam. Informaticae, 171(1-4): 175–188. 2020.
The Many Roads to the Simulation of Reaction Systems [link]Paper   doi   bibtex  
TMaR: a two-stage MapReduce scheduler for heterogeneous environments. Maleki, N.; Faragardi, H. R.; Rahmani, A. M.; Conti, M.; and Lofstead, J. F. Hum. centric Comput. Inf. Sci., 10: 42. 2020.
TMaR: a two-stage MapReduce scheduler for heterogeneous environments [link]Paper   doi   bibtex