Publications


Papers in Journals


  • Stefano Berlato, Silvio Ranise, Marco Centenaro. Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review In IEEE Transactions on Intelligent Transportation Systems (T-ITS), Issue number XX (2021), DOI , PDF .

  • Stefano Berlato, Roberto Carbone, Silvio Ranise, Adam J. Lee. Formal Modelling and Automated Trade-Off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud In ACM Transactions on Privacy and Security (TOPS), Issue number XX (2021), DOI , PDF .

  • Marco Centenaro, Stefano Berlato, Roberto Carbone, Gianfranco Burzio, Giuseppe Faranda Cordella, Silvio Ranise, Roberto Riggio. Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements In IEEE Vehicular Technology Magazine (VTM), Issue number XX (2021), DOI , PDF .

  • Stefano Berlato, Mariano Ceccato. A Large-Scale Study on the Adoption of Anti-Debugging and Anti-Tampering Protections in Android Apps In Journal of Information Security and Applications (JISA), Issue number 52 (2020), DOI , PDF .

Papers in Conferences


  • Andreas Heider-Aviet, Danny Roswin Ollik, Stefano Berlato, Silvio Ranise, Roberto Carbone, Van Thanh Le, Nabil El Ioini, Claus Pahl, Hamid R. Barzegar. Blockchain Based RAN Data Sharing In IEEE International Conference on Smart Data Services 2021 (SMDS 2021), DOI , PDF .

  • Stefano Berlato, Roberto Carbone, Silvio Ranise. Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment In 18th International Conference on Security and Cryptography (SECRYPT 2021), DOI , PDF .

  • Marco Centenaro, Stefano Berlato, Roberto Carbone, Gianfranco Burzio, Giuseppe Faranda Cordella, Silvio Ranise, Roberto Riggio. Security Considerations on 5G-Enabled Back-Situation Awareness for CCAM In IEEE 3rd 5G World Forum (5GWF’20), DOI , PDF .

  • Stefano Berlato, Roberto Carbone, Silvio Ranise, Adam J. Lee. Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization In 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS20), DOI , PDF .

ORCID

Last modified: 21 October 2021