skip to content
  • it
UNIVERSITÀ DEGLI STUDI
DEL SANNIO   Benevento

Pubblicazioni di ateneo

Found 37 results
Author Titolo Tipo [ Anno(Asc)]
Filters: Author is Pecori, Riccardo  [Clear All Filters]
2016
Sani, L., M. Amoretti, E. Vicari, M. Mordonini, R. Pecori, A. Roli, M. Villani, S. Cagnoni, and R. Serra, "Efficient Search of Relevant Structures in Complex Systems", XVth International Conference of the Italian Association for Artificial Intelligence, Genova, Italy, November 29 – December 1, 2016, vol. 10037: Springer, Cham, pp. 35–48, 2016.
Pecori, R., "S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia", Computer Networks, vol. 94: Elsevier, pp. 205–218, 2016.
2015
Pecori, R., "A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems", 2015 7th International Conference on New Technologies, Mobility and Security (NTMS): IEEE, pp. 1–5, 2015.
Pecori, R., "Trust-based storage in a Kademlia network infected by Sybils", 2015 7th International Conference on New Technologies, Mobility and Security (NTMS): IEEE, pp. 1–5, 2015.
2014
Pecori, R., and L. Veltri, "A statistical blind technique for recognition of internet traffic with dependence enforcement", 2014 International Wireless Communications and Mobile Computing Conference (IWCMC): IEEE, pp. 328–333, 2014.
Pecori, R., and L. Veltri, "Trust-based routing for Kademlia in a sybil scenario", 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM): IEEE, pp. 279–283, 2014.
2012
Pecori, R., "A PKI-free key agreement protocol for P2P VoIP applications", 2012 IEEE International Conference on Communications (ICC): IEEE, pp. 6748–6752, 2012.
2011
Cirani, S., R. Pecori, and L. Veltri, "A peer-to-peer secure VoIP architecture", Trustworthy Internet: Springer, Milano, pp. 105–115, 2011.
Pecori, R., Security in peer-to-peer multimedia communications, : Università di Parma. Dipartimento di Ingegneria dell'Informazione, 2011.
2009
Pecori, R., and L. Veltri, "A key agreement protocol for P2P VoIP applications", SoftCOM 2009-17th International Conference on Software, Telecommunications & Computer Networks: IEEE, pp. 276–280, 2009.

Pages