2019 - ACM Distinguished Member
Roberto Di Pietro mainly focuses on Computer network, Wireless sensor network, Key distribution in wireless sensor networks, Distributed computing and Computer security. The study of Computer network is intertwined with the study of Secrecy in a number of ways. Roberto Di Pietro works mostly in the field of Wireless sensor network, limiting it down to topics relating to Node and, in certain cases, Resilience, Encryption, Wireless and Set, as a part of the same area of interest.
His work on Mobile wireless sensor network as part of general Key distribution in wireless sensor networks research is frequently linked to Random graph and Constant, bridging the gap between disciplines. His study explores the link between Distributed computing and topics such as Cryptography that cross with problems in Visual sensor network, Sensor node and Wireless WAN. His research in Computer security intersects with topics in Virtual machine and Virtualization, Cloud computing, Cloud computing security.
His primary areas of study are Computer security, Computer network, Wireless sensor network, Distributed computing and Adversary. His research investigates the connection with Computer security and areas like Cloud computing security which intersect with concerns in Virtualization. In his research, Key is intimately related to Cryptography, which falls under the overarching field of Computer network.
Roberto Di Pietro has researched Wireless sensor network in several fields, including Context, Key distribution in wireless sensor networks, Probabilistic logic and Survivability. Roberto Di Pietro studies Key distribution in wireless sensor networks, namely Mobile wireless sensor network. His Encryption study combines topics from a wide range of disciplines, such as Wireless and Scalability.
The scientist’s investigation covers issues in Computer security, Real-time computing, Computer network, Authentication and Context. The Computer security study combines topics in areas such as Virtualization and Service. The study incorporates disciplines such as Overhead, Network packet and Haystack in addition to Real-time computing.
Roberto Di Pietro focuses mostly in the field of Authentication, narrowing it down to matters related to Satellite radio and, in some cases, Wireless. Roberto Di Pietro interconnects Field and Data science in the investigation of issues within Context. Roberto Di Pietro studied Protocol stack and Cryptography that intersect with Lightweight protocol, Scalability, Distributed computing and Hash function.
His main research concerns Computer security, Cryptography, Overhead, Real-time computing and Drone. His work on Computer security is being expanded to include thematically relevant topics such as Anomaly detection. The various areas that he examines in his Cryptography study include Trusted third party, Protocol stack, Key-agreement protocol and Data science.
In his study, Computer network is strongly linked to Privacy preserving, which falls under the umbrella field of Overhead. His Computer network study integrates concerns from other disciplines, such as Mobile device and Tracing. Roberto Di Pietro has researched Real-time computing in several fields, including Packet loss, Network packet, Evasion, Firmware and Haystack.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Scalable and efficient provable data possession
Giuseppe Ateniese;Roberto Di Pietro;Luigi V. Mancini;Gene Tsudik.
international workshop on security (2008)
Smart health: A context-aware health paradigm within smart cities
Agusti Solanas;Constantinos Patsakis;Mauro Conti;Ioannis S. Vlachos.
IEEE Communications Magazine (2014)
Secure virtualization for cloud computing
Flavio Lombardi;Roberto Di Pietro.
Journal of Network and Computer Applications (2011)
Random key-assignment for secure Wireless Sensor Networks
Roberto Di Pietro;Luigi V. Mancini;Alessandro Mei.
security of ad hoc and sensor networks (2003)
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
Mauro Conti;Roberto Di Pietro;Luigi Vincenzo Mancini;Alessandro Mei.
mobile ad hoc networking and computing (2007)
Boosting efficiency and security in proof of ownership for deduplication
Roberto Di Pietro;Alessandro Sorniotti.
computer and communications security (2012)
Fame for sale
Stefano Cresci;Roberto Di Pietro;Marinella Petrocchi;Angelo Spognardi.
decision support systems (2015)
Distributed Detection of Clone Attacks in Wireless Sensor Networks
Mauro Conti;Roberto Di Pietro;Luigi Vincenzo Mancini;Alessandro Mei.
IEEE Transactions on Dependable and Secure Computing (2011)
The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race
Stefano Cresci;Roberto Di Pietro;Marinella Petrocchi;Angelo Spognardi.
the web conference (2017)
To Docker or Not to Docker: A Security Perspective
Theo Combe;Antony Martin;Roberto Di Pietro.
IEEE Cloud Computing (2016)
University of Padua
Sapienza University of Rome
University of California, Irvine
University of Trento
George Mason University
EURECOM
University College London
Sapienza University of Rome
University of Bologna
Stevens Institute of Technology
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: