skip to content
  • it
UNIVERSITÀ DEGLI STUDI
DEL SANNIO   Benevento

Pubblicazioni di ateneo

Found 16 results
[ Author(Desc)] Titolo Tipo Anno
Filters: Author is Pecori, Riccardo  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Pecori, R., and L. Veltri, "A key agreement protocol for P2P VoIP applications", SoftCOM 2009-17th International Conference on Software, Telecommunications & Computer Networks: IEEE, pp. 276–280, 2009.
Pecori, R., Security in peer-to-peer multimedia communications, : Università di Parma. Dipartimento di Ingegneria dell'Informazione, 2011.
Pecori, R., "A PKI-free key agreement protocol for P2P VoIP applications", 2012 IEEE International Conference on Communications (ICC): IEEE, pp. 6748–6752, 2012.
Pecori, R., Sviluppo di una tecnica di riconoscimento statistico di applicazioni su rete IP, : Università degli Studi di Parma, 2006.
Pecori, R., Autenticazione di terminali mobili basata su protocollo DHCP, , 2003.
Pecori, R., and L. Veltri, "A statistical blind technique for recognition of internet traffic with dependence enforcement", 2014 International Wireless Communications and Mobile Computing Conference (IWCMC): IEEE, pp. 328–333, 2014.
Pecori, R., and L. Veltri, "Trust-based routing for Kademlia in a sybil scenario", 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM): IEEE, pp. 279–283, 2014.
Pecori, R., "Trust-based storage in a Kademlia network infected by Sybils", 2015 7th International Conference on New Technologies, Mobility and Security (NTMS): IEEE, pp. 1–5, 2015.
Pecori, R., "A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems", 2015 7th International Conference on New Technologies, Mobility and Security (NTMS): IEEE, pp. 1–5, 2015.
Pecori, R., "S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia", Computer Networks, vol. 94: Elsevier, pp. 205–218, 2016.
Pecori, R., and L. Veltri, "3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications", Computer Communications, vol. 85: Elsevier, pp. 28–40, 2016.
Pecori, R., and L. Veltri, "A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord", Security and Communication Networks, vol. 2018: Hindawi, 2018.
Pecori, R., and L. Veltri, "Fostering Authentication and Authorization in the Social IoT through MQTT-Auth", IEEE IoT eNewsletter, vol. 2019, 2019.
Pecori, R., V. Suraci, and P. Ducange, "Efficient computation of key performance indicators in a distance learning university", Information Discovery and Delivery: Emerald Publishing Limited, 2019.
Pecori, R., P. Ducange, and F. Marcelloni, "Incremental Learning of Fuzzy Decision Trees for Streaming Data Classification", 2019 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (EUSFLAT 2019): Atlantis Press, 2019.
Pecori, R., "Augmenting Quality of Experience in Distance Learning using Fog Computing", IEEE Internet Computing: IEEE, 2019.