Follow
Stefano Berlato
Title
Cited by
Cited by
Year
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps
S Berlato, M Ceccato
Journal of Information Security and Applications 52, 102463, 2020
292020
Exploring architectures for cryptographic access control enforcement in the cloud for fun and optimization
S Berlato, R Carbone, AJ Lee, S Ranise
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
82020
Blockchain based ran data sharing
A Heider-Aviet, DR Ollik, S Berlato, S Ranise, R Carbone, N El Ioini, ...
2021 IEEE International Conference on Smart Data Services (SMDS), 152-161, 2021
72021
Smart card-based identity management protocols for V2V and V2I communications in CCAM: a systematic literature review
S Berlato, M Centenaro, S Ranise
IEEE Transactions on Intelligent Transportation Systems 23 (8), 10086-10103, 2021
52021
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements
M Centenaro, S Berlato, R Carbone, G Burzio, GF Cordella, R Riggio, ...
IEEE Vehicular Technology Magazine 16 (4), 78-88, 2021
42021
Security considerations on 5G-enabled back-situation awareness for CCAM
M Centenaro, S Berlato, R Carbone, G Burzio, GF Cordella, S Ranise, ...
2020 IEEE 3rd 5G World Forum (5GWF), 245-250, 2020
42020
End-to-end protection of IoT communications through cryptographic enforcement of access control policies
S Berlato, U Morelli, R Carbone, S Ranise
IFIP Annual Conference on Data and Applications Security and Privacy, 236-255, 2022
32022
Formal modelling and automated trade-off analysis of enforcement architectures for cryptographic access control in the cloud
S Berlato, R Carbone, AJ Lee, S Ranise
ACM Transactions on Privacy and Security 25 (1), 1-37, 2021
32021
Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM
S Berlato, S Cretti, D Siracusa, S Ranise
2024 27th Conference on Innovation in Clouds, Internet and Networks (ICIN …, 2024
2024
Mitigating Debugger-based Attacks to Java Applications with Self-Debugging
D Pizzolotto, S Berlato, M Ceccato
ACM Transactions on Software Engineering and Methodology, 2024
2024
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment.
S Berlato, R Carbone, S Ranise
SECRYPT, 370-381, 2021
2021
Optimizing Security and Quality of Service for End-to-End Cryptographic Access Control in IoT Applications
S Berlato, U Morelli, R Carbone, S Ranise
Available at SSRN 4749822, 0
The system can't perform the operation now. Try again later.
Articles 1–12