Hoppa till huvudinnehållet
Till KTH:s startsida

Publikationer av Panagiotis Papadimitratos

Refereegranskade

Artiklar

[1]
M. Khodaei, H. Noroozi och P. Papadimitratos, "SECMACE+ : Upscaling Pseudonymous Authentication for Large Mobile Systems," IEEE Transactions on Cloud Computing, vol. 11, no. 3, s. 3009-3026, 2023.
[2]
R. M. Tsoupidi, E. Troubitsyna och P. Papadimitratos, "Thwarting code-reuse and side-channel attacks in embedded systems," Computers & security (Print), vol. 133, 2023.
[3]
L. Islami, S. Fischer-Huebner och P. Papadimitratos, "Capturing drivers' privacy preferences for intelligent transportation systems : An intercultural perspective," Computers & security (Print), vol. 123, s. 102913, 2022.
[4]
T. Barbette et al., "Cheetah : A High-Speed Programmable Load-Balancer Framework with Guaranteed Per-Connection-Consistency," IEEE/ACM Transactions on Networking, vol. 30, no. 1, s. 354-367, 2022.
[5]
I. Symeonidis et al., "HERMES : Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System," IEEE Internet of Things Journal, vol. 9, no. 1, s. 129-151, 2022.
[6]
K. Zhang, E. G. Larsson och P. Papadimitratos, "Protecting GNSS Open Service Navigation Message Authentication Against Distance-Decreasing Attacks," IEEE Transactions on Aerospace and Electronic Systems, vol. 58, no. 2, s. 1224-1240, 2022.
[7]
M. Khodaei och P. Papadimitratos, "Cooperative Location Privacy in Vehicular Networks : Why Simple Mix-zones are not Enough," IEEE Internet of Things Journal, s. 1-1, 2021.
[8]
Z. Gulgun, E. G. Larsson och P. Papadimitratos, "Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests," IEEE Access, vol. 9, s. 166382-166394, 2021.
[9]
M. Khodaei och P. Papadimitratos, "Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems," IEEE Transactions on Mobile Computing, vol. 20, no. 7, s. 2473-2489, 2021.
[10]
H. Jin och P. Papadimitratos, "DoS-resilient cooperative beacon verification for vehicular communication systems," Ad hoc networks, vol. 90, 2019.
[11]
H. Jin och P. Papadimitratos, "Resilient Privacy Protection for Location-Based Services through Decentralization," ACM Transactions on Privacy and Security (TOPS), vol. 22, no. 4, s. 1-36, 2019.
[12]
M. Wiese et al., "Secure Estimation and Zero-Error Secrecy Capacity," IEEE Transactions on Automatic Control, vol. 64, no. 3, s. 1047-1062, 2019.
[13]
M. Khodaei, H. Jin och P. Papadimitratos, "SECMACE : Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems," IEEE transactions on intelligent transportation systems (Print), vol. 19, no. 5, s. 1430-1444, 2018.
[14]
M. Mirmohseni och P. P. Papadimitratos, "Secrecy Capacity Scaling in Large Cooperative Wireless Networks," IEEE Transactions on Information Theory, vol. 63, no. 3, s. 1923-1939, 2017.
[15]
S. Raza et al., "SecureSense : End-to-end secure communication architecture for the cloud-connected Internet of Things," Future Generation Computer Systems, vol. 77, s. 40-51, 2017.
[16]
M. Hollick et al., "Toward a Taxonomy and Attacker Model for Secure Routing Protocols," Computer communication review, vol. 47, no. 1, s. 43-48, 2017.
[17]
M. Ehdaie et al., "2D Hash Chain robust Random Key Distribution scheme," Information Processing Letters, vol. 116, no. 5, s. 367-372, 2016.
[18]
S. Gisdakis, T. Giannetsos och P. Papadimitratos, "Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems," IEEE Internet of Things Journal, vol. 3, no. 5, s. 839-853, 2016.
[19]
M. Ehdaie et al., "Key splitting : making random key distribution schemes resistant against node capture," Security and Communication Networks, vol. 8, no. 3, s. 431-445, 2015.
[20]
S. Gisdakis et al., "Secure and Privacy-Preserving Smartphone based Traffic Information Systems," IEEE transactions on intelligent transportation systems (Print), vol. 16, no. 3, 2015.
[21]
M. Khodaei och P. Papadimitratos, "The Key to Intelligent Transportation : Identity and Credential Management in Vehicular Communication Systems," IEEE Vehicular Technology Magazine, vol. 10, no. 4, s. 63-69, 2015.
[22]
R. Shokri et al., "Hiding in the Mobile Crowd : Location Privacy through Collaboration," IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 3, s. 266-279, 2014.
[23]
M. Fiore et al., "Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 12, no. 2, s. 289-303, 2013.
[24]
M. Poturalski, P. Papadimitratos och J.-P. Hubaux, "Formal Analysis of Secure Neighbor Discovery in Wireless Networks," IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 6, s. 355-367, 2013.
[25]
M. Poturalski et al., "On Secure and Precise IR-UWB Ranging," IEEE Transactions on Wireless Communications, vol. 11, no. 3, s. 1087-1099, 2012.
[26]
V. Manolopoulos et al., "Smartphone-based Traffic Information System for Sustainable Cities," Mobile Computing and Communications Review, vol. 16, no. 4, s. 30-31, 2012.
[27]
F. Kargl och P. Papadimitratos, "ACM WiSec 2011 poster and demo session," ACM Mobile Computing and Communications Review (ACM MC2R), vol. 15, no. 3, s. 34-34, 2011.
[28]
M. Poturalski et al., "Distance Bounding with IEEE 802.15.4a : Attacks and Countermeasures," IEEE Transactions on Wireless Communications, vol. 10, s. 1334-1344, 2011.
[29]
G. Calandriello et al., "On the Performance of Secure Vehicular Communication Systems," IEEE Transactions on Dependable and Secure Computing, 2011.
[30]
A. Festag, P. Papadimitratos och T. Tielert, "Design and Performance of Secure Geocast for Vehicular Communication," IEEE Transactions on Vehicular Technology, vol. 59, no. 5, s. 2456-2471, 2010.
[31]
P. Papadimitratos, J. Luo och J. -. Hubaux, "Randomized Countermeasure Against Parasitic Adversaries in Wireless Sensor Networks," IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, s. 1036-1045, 2010.
[32]
P. Papadimitratos et al., "Vehicular Communication Systems : Enabling Technologies, Applications, and Future Outlook on Intelligent Transportation," IEEE Communications Magazine, vol. 47, no. 11, s. 84-95, 2009.
[33]
P. Papadimitratos et al., "Secure Neighborhood Discovery : A Fundamental Element for Mobile Ad Hoc Networking," IEEE Communications Magazine, vol. 46, no. 2, s. 132-139, 2008.
[34]
P. Papadimitratos et al., "Secure Vehicular Communication Systems : Design and Architecture," IEEE Communications Magazine, vol. 46, s. 100-109, 2008.
[35]
F. Kargl et al., "Secure Vehicular Communication Systems : Implementation, Performance, and Research Challenges," IEEE Communications Magazine, vol. 46, s. 110-118, 2008.
[36]
M. Piórkowski et al., "TraNS : Realistic Joint Traffic and Network Simulator for VANETs," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), vol. 12, no. 1, s. 31-33, 2008.
[37]
M. Raya et al., "Eviction of Misbehaving and Faulty Nodes in Vehicular Networks," IEEE Journal on Selected Areas in Communications, vol. 25, no. 8, s. 1557-1568, 2007.
[38]
P. Papadimitratos och Z. J. Haas, "Secure Data Communication in Mobile Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, s. 343-356, 2006.
[39]
M. Raya, P. Papadimitratos och J. -. Hubaux, "Securing Vehicular Communications," IEEE wireless communications, vol. 13, no. 5, s. 8-15, 2006.
[40]
P. Papadimitratos, S. Sankaranarayanan och A. Mishra, "A Bandwidth Sharing Approach to Improve Licensed Spectrum Utilization," IEEE Communications Magazine, vol. 43, no. 12, 2005.
[41]
P. Papadimitratos och Z. J. Haas, "Secure Routing for Mobile Ad Hoc Networks," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R) - Special Issue: Report on a Working Session on Security in Wireless Ad hoc Networks, vol. 7, no. 1, s. 79-80, 2003.
[42]
P. Papadimitratos och Z. Haas, "Secure message transmission in mobile ad hoc networks," Ad hoc networks, vol. 1, no. 1, s. 193-209, 2003.
[43]
P. Papadimitratos och Z. J. Haas, "Securing the Internet Routing Infrastructure," IEEE Communications Magazine, vol. 40, no. 10, s. 60-68, 2002.

Konferensbidrag

[44]
H. Teixeira De Castro et al., "A Model-based Approach for Assessing the Security of Cyber-Physical Systems," i ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[45]
W. Liu och P. Papadimitratos, "Extending RAIM with a Gaussian Mixture of Opportunistic Information," i Proceedings of the 2024 International Technical Meeting of The Institute of Navigation, 2024, s. 454-466.
[46]
H. Jin, Z. Zhou och P. Papadimitratos, "Future-proofing Secure V2V Communication against Clogging DoS Attacks," i ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 2024.
[47]
H. Jin och P. Papadimitratos, "Over-the-Air Runtime Wi-Fi MAC Address Re-randomization," i WiSec 2024 - Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024, s. 8-13.
[48]
W. Liu och P. Papadimitratos, "Position-based Rogue Access Point Detection," i Proceedings - 9th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2024, 2024, s. 436-442.
[49]
S. Al-Hazbi et al., "Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities," i 20th International Wireless Communications and Mobile Computing Conference, IWCMC 2024, 2024, s. 824-829.
[50]
C. Eryonucu och P. Papadimitratos, "Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy," i Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, 2023, Revised Selected Papers, 2024, s. 474-493.
[51]
M. Spanghero et al., "Uncovering GNSS Interference with Aerial Mapping UAV," i Uncovering GNSS Interference with Aerial Mapping UAV, 2024.
[52]
M. Spanghero och P. Papadimitratos, "Detecting GNSS misbehavior leveraging secure heterogeneous time sources," i IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, California, April 24-27, 2023, 2023.
[53]
W. Liu och P. Papadimitratos, "Probabilistic Detection of GNSS Spoofing using Opportunistic Information," i Proceedings IEEE/ION Position, Location and Navigation Symposium, PLANS 2023, 2023.
[54]
R. M. Tsoupidi et al., "Securing Optimized Code Against Power Side Channels," i 36th IEEE Computer Security Foundations Symposium, 2023.
[55]
R. M. Tsoupidi et al., "Securing Optimized Code Against Power Side Channels," i 2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, s. 340-355.
[56]
G. K. Olsson et al., "Using Mobile Phones for Participatory Detection and Localization of a GNSS Jammer," i 2023 IEEE/ION Position, Location and Navigation Symposium, PLANS 2023, 2023, s. 536-541.
[57]
K. Kalogiannis, A. Henriksson och P. Papadimitratos, "Vulnerability Analysis of Vehicular Coordinated Maneuvers," i Proceedings : 8th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2023, 2023, s. 11-20.
[58]
B. Knijnenburg och P. Papadimitratos, "WPES 2023 Chairs' Welcome," i WPES 2023 - Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023.
[59]
B. P. Knijnenburg och P. Papadimitratos, "WPES'23 : 22nd Workshop on Privacy in the Electronic Society," i CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023, s. 3645-3647.
[60]
K. Kalogiannis et al., "Attack Impact and Misbehavior Detection in Vehicular Platoons," i Proceedings of the 15th ACMConference on Security and Privacy in Wireless and Mobile Networks (WiSec’22), 2022, s. 45-59.
[61]
S. Varghese et al., "Digital Twin-based Intrusion Detection for Industrial Control Systems," i 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022, 2022, s. 611-617.
[62]
M. Spanghero och P. Papadimitratos, "High-precision Hardware Oscillators Ensemble for GNSS Attack Detection," i IEEE Aerospace Conference Proceedings, 2022.
[63]
G. K. Olsson et al., "Participatory Sensing for Localization of a GNSS Jammer," i 2022 INTERNATIONAL CONFERENCE ON LOCALIZATION AND GNSS (ICL-GNSS), 2022.
[64]
C. Eryonucu och P. Papadimitratos, "Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life," i WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022, s. 73-84.
[65]
M. Spanghero och P. Papadimitratos, "Detecting GNSS misbehaviour with high-precision clocks," i Proceedings WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, s. 389-391.
[66]
R. Narayanan, A. Varshney och P. Papadimitratos, "HarvestPrint : Securing Battery-free Backscatter Tags through Fingerprinting," i HotNets 2021 - Proceedings of the 20th ACM Workshop on Hot Topics in Networks, 2021, s. 178-184.
[67]
M. Soltani, M. Mirmohseni och P. Papadimitratos, "Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers," i 30th International Conference on Computer Communications and Networks (ICCCN), 2021.
[68]
H. Jin och P. Papadimitratos, "Off-the-shelf Wi-Fi Indoor Smartphone Localization," i 17Th Conference On Wireless On-Demand Network Systems And Services (WONS 2022), 2021.
[69]
M. Lenhart, M. Spanghero och P. Papadimitratos, "Relay/replay attacks on GNSS signals," i WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, s. 380-382.
[70]
P. Molloy et al., "SecProtobuf : Implicit Message Integrity Provision in Heterogeneous Vehicular Systems," i 2021 IEEE Vehicular Networking Conference (VNC), 2021, s. 190-193.
[71]
T. Barbette et al., "A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency," i Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, 2020, s. 667-683.
[72]
M. Spanghero, K. Zhang och P. Papadimitratos, "Authenticated time for detecting GNSS attacks," i Proceedings of the 33rd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2020, 2020, s. 3826-3834.
[73]
K. Zhang, M. Spanghero och P. Papadimitratos, "Protecting GNSS-based Services using Time Offset Validation," i 2020 IEEE/ION Position, Location and Navigation Symposium, PLANS 2020, 2020, s. 575-583.
[74]
P. Babaheidarian, S. Salimi och P. Papadimitratos, "Scalable Security in Interference Channels with Arbitrary Number of Users," i Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020, 2020, s. 402-406.
[75]
S. Ghasemi-Goojani och P. Papadimitratos, "On the Capacity of State-Dependent Gaussian Z-Interference Channel," i Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018, 2019, s. 653-657.
[76]
K. Zhang och P. Papadimitratos, "On the Effects of Distance-decreasing Attacks on Cryptographically Protected GNSS Signals," i Proceedings of the 2019 International Technical Meeting of The Institute of Navigation, 2019, s. 363-372.
[77]
K. Zhang och P. Papadimitratos, "Safeguarding NMA Enhanced Galileo OS Signals from Distance-Decreasing Attacks," i Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019), 2019, s. 4041-4052.
[78]
M. Khodaei, H. Noroozi och P. Papadimitratos, "Scaling Pseudonymous Authentication for Large Mobile Systems," i WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks, 2019, s. 174-185.
[79]
K. Zhang och P. Papadimitratos, "Secure Multi-constellation GNSS Receivers with Clustering-based Solution Separation Algorithm," i Proceedings of the IEEE Aerospace Conference 2019, 2019.
[80]
Z. Gulgun, E. G. Larsson och P. Papadimitratos, "Statistical method for spoofing detection at mobile GNSS receivers," i Proceedings of 16th International Symposium on Wireless Communication Systems, ISWCS 2019, 2019, s. 677-681.
[81]
S. Ghasemi-Goojani och P. Papadimitratos, "The Symmetric Two-Hop Channel with an Untrusted Relay," i Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018, 2019, s. 673-677.
[82]
K. Zhang och P. Papadimitratos, "Analysis of the effect of the distance-decreasing attacks on GNSS authenticated signals," i WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, s. 285-286.
[83]
A. Hylamia et al., "Demo : Towards Battery-free Radio Tomographic Imaging," i WISEC'18 : PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, s. 293-295.
[84]
M. Khodaei och P. Papadimitratos, "Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs," i Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., 2018.
[85]
M. Khodaei och P. Papadimitratos, "Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs," i WISEC'18 : PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, s. 172-183.
[86]
P. Papadimitratos, K. Butler och C. Pöpper, "Foreword," i WiSec 2018 : Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, s. i-ii.
[87]
J. Borsub och P. Papadimitratos, "Hardened registration process for participatory sensing," i WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, s. 281-282.
[88]
C. Vaas, P. Papadimitratos och I. Martinovic, "Increasing mix-zone eicacy for pseudonym change in VANETs using cha messages," i WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, s. 287-288.
[89]
F. Forsby et al., "Lightweight X.509 Digital Certificates for the Internet of Things," i 3rd International Conference on Interoperability in IoT, InterIoT 2017 on conjunction with 4th International Conference on Safety and Security in Internet of Things, SaSeIoT 2017, 2018, s. 123-133.
[90]
C. Vaas et al., "Nowhere to hide? : Mix-Zones for Private Pseudonym Change using Chaff Vehicles," i 2018 IEEE Vehicular Networking Conference (VNC), 2018.
[91]
S. Ghasemi-Goojani och P. Papadimitratos, "On the Capacity of Gaussian "Dirty" Z-Interference Channel with Common State," i 2018 52ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2018.
[92]
H. Jin och P. Papadimitratos, "POSTER : Expedited Beacon Verification for VANET," i WISEC'18 : PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, s. 283-284.
[93]
C. Vaas et al., "Poster : Tracking Vehicles Through Encrypted Mix-Zones Using Physical Layer Properties," i 2018 IEEE Vehicular Networking Conference (VNC), 2018.
[94]
M. Khodaei och P. Papadimitratos, "Poster : Mix-Zones Everywhere: A Dynamic Cooperative Location Privacy Protection Scheme," i 2018 IEEE Vehicular Networking Conference, (VNC), 2018.
[95]
J. Camenisch och P. Papadimitratos, "Preface," i 17th International Conference on Cryptology and Network Security, CANS 2018, 2018.
[96]
M. Khodaei, H. Noroozi och P. Papadimitratos, "Privacy Preservation through Uniformity," i Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., 2018.
[97]
S. Hylamia et al., "Security on harvested power," i WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, s. 296-298.
[98]
H. Noroozi, M. Khodaei och P. Papadimitratos, "VPKIaaS: A highly-available and dynamically-scalable vehicular public-key infrastructure," i WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, s. 302-304.
[99]
M. Gerami et al., "Optimal secure partial-repair in distributed storage systems," i 2017 51st Annual Conference on Information Sciences and Systems, CISS 2017, 2017.
[100]
H. Jin och P. Papadimitratos, "Poster : Bloom Filter based certificate validation for VANET," i Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, 2017, s. 273-274.
[101]
P. Babaheidarian, S. Salimi och P. Papadimitratos, "Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward," i 2017 51st Annual Conference on Information Sciences and Systems, CISS 2017, 2017.
[102]
H. Jin och P. Papadimitratos, "Proactive certificate validation for VANETs," i IEEE Vehicular Networking Conference, VNC, 2017.
[103]
M. Khodaei, A. Messing och P. Papadimitratos, "RHyTHM: A Randomized Hybrid Scheme To Hide in the Mobile Crowd," i IEEE Vehicular Networking Conference (VNC) 2017, 2017, s. 155-158.
[104]
H. Jin och P. Papadimitratos, "Resilient privacy protection for location-based services through decentralization," i Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, 2017, s. 253-258.
[105]
G. Stylianos, T. Giannetsos och P. Papadimitratos, "Android privacy C(R)ache : Reading your external storage and sensors for fun and profit," i PAMCO 2016 - Proceedings of the 2nd MobiHoc International Workshop on Privacy-Aware Mobile Computing, 2016, s. 1-10.
[106]
M. Khodaei och P. Papadimitratos, "Evaluating On-demand Pseudonym Acquisition Policies in Vehicular Communication Systems," i Workshop on Internet of Vehicles and Vehicles of Internet (IoV-VoI 2016), 2016, s. 7-12.
[107]
M. Hollick, P. Papadimitratos och W. Enck, "Foreword," i WiSec 2016 : Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2016.
[108]
M. Wiese och P. Papadimitratos, "Frequency hopping does not increase anti-jamming resilience of wireless channels," i 2016 International Zurich Seminar on Communications, March 2 – 4, 2016, 2016.
[109]
M. Franz och P. Papadimitratos, "Preface," i 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, 2016.
[110]
M. Wiese et al., "Secure Estimation for Unstable Systems," i 2016 IEEE 55th Conference on Decision and Control, CDC 2016, 2016, s. 5059-5064.
[111]
P. Babaheidarian, S. Salimi och P. Papadimitratos, "Security in the Gaussian interference channel : Weak and moderately weak interference regimes," i 2016 IEEE International Symposium on Information Theory - Proceedings, 2016, s. 2434-2438.
[112]
P. Papadimitratos, "Security on Wheels : Security and Privacy for Vehicular Communication Systems," i CCS'16 : PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, s. 1855-1856.
[113]
M. Wiese et al., "Uncertain wiretap channels and secure estimation," i 2016 IEEE International Symposium on Information Theory, 2016, s. 2004-2008.
[114]
K. Zhang, R. A. Tuhin och P. Papadimitratos, "Detection and Exclusion RAIM Algorithm against Spoofing/Replaying Attacks," i International Symposium on GNSS, 2015.
[115]
P. Babaheidarian, S. Salimi och P. Papadimitratos, "Finite-SNR Regime Analysis of The Gaussian Wiretap Multiple-Access Channel," i 2015 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2015, 2015, s. 307-314.
[116]
K. Zhang och P. Papadimitratos, "GNSS receiver tracking performance analysis under distance-decreasing attacks," i Proceedings of 2015 International Conference on Localization and GNSS, 2015.
[117]
S. Salimi et al., "Key Agreement over an Interference Channel with Noiseless Feedback : Achievable Region & Distributed Allocation," i IEEE Conference on Communications and Network Security (CNS), 2015, s. 59-64.
[118]
L. Ye et al., "Path metric authentication for low-power and lossy networks," i 1st ACM International Workshop on Cyber-Physical Systems for Smart Water Networks, CySWater 2015, 2015.
[119]
H. Jin och P. Papadimitratos, "Resilient collaborative privacy for Location-Based services," i 20th Nordic Conference on Secure IT Systems, NordSec 2015, 2015, s. 47-63.
[120]
S. Gisdakis, T. Giannetsos och P. Papadimitratos, "SHIELD : a data verification framework for participatory sensing systems," i WiSec '15 Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015.
[121]
H. Jin och P. Papadimitratos, "Scaling VANET Security Through Cooperative Message Verification," i 2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, s. 275-278.
[122]
M. Mirmohseni och P. Papadimitratos, "Active adversaries from an information-theoretic perspective : Data modification attacks," i IEEE International Symposium on Information Theory - Proceedings, 2014, s. 791-795.
[123]
M. Mirmohseni och P. Papadimitratos, "Colluding eavesdroppers in large cooperative wireless networks," i IWCIT 2014 - Iran Workshop on Communication and Information Theory, 2014.
[124]
M. Mirmohseni och P. Papadimitratos, "Constrained colluding eavesdroppers : an information-theoretic model," i International Zurich Seminar on Communications, 2014, s. 63-66.
[125]
S. Gisdakis, T. Giannetsos och P. Papadimitratos, "SPPEAR : Security & privacy-preserving architecture for participatory-sensing applications," i WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2014, s. 39-50.
[126]
M. Mirmohseni och P. Papadimitratos, "Scaling laws for secrecy capacity in cooperative wireless networks," i INFOCOM, 2014 Proceedings IEEE, 2014, s. 1527-1535.
[127]
M. Khodaei, H. Jin och P. Papadimitratos, "Towards deploying a scalable & robust vehicular identity and credential management infrastructure," i 2014 IEEE Vehicular Networking Conference (VNC), 2014, s. 33-40.
[128]
T. Giannetsos, S. Gisdakis och P. Papadimitratos, "Trustworthy People-Centric Sensing : Privacy, Security and User Incentives Road-Map," i 2014 13th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2014, 2014, s. 39-46.
[129]
S. Gisdakis et al., "SEROSA : SERvice oriented security architecture for Vehicular Communications," i 2013 IEEE Vehicular Networking Conference (VNC), 2013 IEEE, 2013, s. 111-118.
[130]
S. Gisdakis, D. Katselis och P. Papadimitratos, "Allocating adversarial resources in wireless networks," i 2013 Proceedings of the 21st European Signal Processing Conference (EUSIPCO), 2013, s. 6811603.
[131]
D. Katselis och P. Papadimitratos, "On secret key generation through multipath for wireless networks," i 2013 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2013, s. 148-153.
[132]
N. Alexiou et al., "Towards a secure and privacy-preserving multi-service vehicular architecture," i 2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2013, 2013, s. 6583472.
[133]
N. Alexiou et al., "VeSPA : Vehicular security and privacy-preserving architecture," i HotWiSec 2013 : Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy, 2013, s. 19-23.
[134]
M. Ehdaie et al., "Key Splitting for Random Key Distribution Schemes," i 7th Workshop on Secure Network Protocols (NPSec12), 2012.
[135]
M. Ehdaie et al., "Key splitting for random key distribution schemes," i Network Protocols (ICNP), 2012 20th IEEE International Conference on, 2012, s. 6459951.
[136]
G. Stylianos och P. Papadimitratos, "On the Optimal Allocation of Adversarial Resources," i Mobicom'12 The 18th Annual International Conference on Mobile Computing and Networking : Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking, 2012, s. 33-38.
[137]
V. Manolopoulos et al., "Smartphone-based Traffic Information System for Sustainable Cities," i HotMobile, 13th International Workshop on Mobile Computing Systems and Applications; San Diego, CA, USA, 28-29 February, 2012, 2012.
[138]
P. Papadimitratos och J. Deng, "Stealthy pre-attacks against random key pre-distribution security," i Communications (ICC), 2012 IEEE International Conference on, 2012, s. 955-959.
[139]
C. Neuberg et al., "A Mobile World of Security - The Model," i IEEE Information Theory Society Conference on Information Sciences and Systems (CISS), 2011, s. 1-6.
[140]
R. Shokri et al., "Collaborative Location Privacy," i 8th IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), 2011, s. 500-509.
[141]
J. M. Bohli et al., "Resilient Data Aggregation for Unattended WSNs," i Proceedings - Conference on Local Computer Networks, LCN, 2011, 2011, s. 994-1002.
[142]
M. Fiore et al., "Secure Neighbor Position Discovery in Vehicular Networks," i Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2011, s. 71-78.
[143]
V. Manolopoulos et al., "Securing smartphone based ITS," i ITST 2011 : Proceedings of the 11th International Conference on ITS Telecommunications, 2011, 2011, s. 201-206.
[144]
W. Galuba et al., "Castor : Scalable Secure Routing for Ad Hoc Networks," i 2010 PROCEEDINGS IEEE INFOCOM, 2010, s. 1-9.
[145]
M. Flury et al., "Effectiveness of distance-decreasing attacks against impulse radio ranging," i Proceedings of the Third ACM Conference on Wireless Network Security (WiSec), 2010, s. 117-128.
[146]
M. Poturalski et al., "The Cicada Attack : Degradation and Denial of Service in IR Ranging," i IEEE International Conference on Ultra-Wideband (ICUWB), 2010.
[147]
R. Shokri et al., "A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks," i Second ACM Conference on Wireless Network Security (WiSec’09), 2009.
[148]
N. Ristanovic et al., "Adaptive Message Authentication for Vehicular Networks," i Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, VANET 2009., 2009, s. 121-122.
[149]
G. Mezzour et al., "Privacy-Preserving Relationship Path Discovery in Social Networks," i Proceedings of the 8th International Conference on Cryptology and Network Security, 2009, s. 189-208.
[150]
P. Papadimitratos, G. Mezzour och J. -. Hubaux, "Certificate Revocation List Distribution in Vehicular Communication Systems," i Proceedings of the Fifth ACM International Workshop on Vehicular Inter-NETworking (VANET'08), 2008, s. 86-87.
[151]
T. Moore et al., "Fast Exclusion of Errant Devices from Vehicular Networks," i Proceedings of the Fifth IEEE-CS Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008, s. 135-143.
[152]
P. Papadimitratos och A. Jovanovic, "GNSS-based Positioning : Attacks and Countermeasures," i Proceedings of the IEEE Military Communications Conference (MILCOM), 2008, s. 1-7.
[153]
J. Luo, P. Papadimitratos och J.-P. Hubaux, "GossiCrypt : Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries," i Proceedings of the Fifth IEEE-CS Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008, s. 441-450.
[154]
P. Papadimitratos et al., "Impact of Vehicular Communication Security on Transportation Safety," i Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM) Workshop on Mobile Networking for Vehicular Environments (MOVE), 2008, s. 1-6.
[155]
M. Raya et al., "On Data-Centric Trust Establishment in Ephemeral Ad hoc Networks," i Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM), 2008, s. 1238-1246.
[156]
M. Poturalski, P. Papadimitratos och J. -. Hubaux, "Secure Neighbor Discovery in Wireless Networks : Formal Investigation of Possibility," i ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008, s. 189-200.
[157]
P. Papadimitratos och P. Ardelean, "Secure and Privacy-Enhancing Vehicular Communication : Demonstration of Implementation and Operation," i Proceedings of the IEEE Vehicular Technology Conference (VTC-Fall), 2008, s. 1-2.
[158]
M. Poturalski, P. Papadimitratos och J. -. Hubaux, "Towards Provable Secure Neighbor Discovery in Wireless Networks," i FMSE '08 Proceedings of the 6th ACM workshop on Formal methods in security engineering, 2008, s. 31-41.
[159]
M. Kafsi et al., "VANET Connectivity Analysis," i Proceedings of the IEEE Workshop on Automotive Networking and Applications (Autonet), 2008.
[160]
J. Panchard et al., "Wireless Sensor Networking for Rain-fed Farming Decision Support," i Proceedings of the ACM SIGCOMM Worskhop on Networked Systems for Developing Regions, 2008, s. 31-36.
[161]
P. Papadimitratos et al., "Architecture for Secure and Private Vehicular Communications," i IEEE International Conference on ITS Telecommunications (IEEE ITST), 2007, s. 1-6.
[162]
R. Shokri et al., "Efficient and Adjustable Recipient Anonymity in Mobile Ad Hoc Networks," i 2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, s. 1-3.
[163]
G. Calandriello et al., "Efficient and Robust Pseudonymous Authentication in VANET," i VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, 2007, s. 19-27.
[164]
P. Haghani et al., "Efficient and Robust Secure Aggregation for Sensor Networks," i Proceedings of the Third IEEE ICNP Workshop on Secure Network Protocols (NPSec), 2007, s. 1-6.
[165]
J. Freudiger et al., "Mix-zones for Location Privacy in Vehicular Networks," i Proceedings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (Win-ITS), 2007.
[166]
C. Harsch, A. Festag och P. Papadimitratos, "Secure Position-Based Routing for VANETs," i Proceedings of the IEEE 66th Vehicular Technology Conference (VTC-Fall), 2007, s. 26-30.
[167]
E. Schoch et al., "Impact of Pseudonym Changes on Geographic Routing in VANETs," i LECTURE NOTES IN COMPUTER SCIENCE, 2006, s. 43-57.
[168]
P. Papadimitratos et al., "Privacy and Identity Management for Vehicular Communication Systems : A Position Paper," i Workshop on Standards for Privacy in User-Centric Identity Management, 2006.
[169]
T. Leinmüller et al., "SEVECOM - Secure Vehicle Communication," i Proceedings of IST Mobile Summit, 2006.
[170]
P. Papadimitratos, V. Gligor och J. -. Hubaux, "Securing Vehicular Communications - Assumptions, Requirements, and Principles," i Proceedings of the Fourth Workshop on Embedded Security in Cars (ESCAR), 2006, s. 5-14.
[171]
S. Sankaranarayanan, P. Papadimitratos och A. Mishra, "A Bandwidth Sharing Approach to Improve Licenced Spectrum Utilization," i IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), 2005, s. 279-288.
[172]
P. Papadimitratos, A. Mishra och D. Rosenburgh, "A Cross-Layer Design Approach to Enhance 802.15.4," i Proceedings of the IEEE Military Communications Conference MILCOM, 2005, s. 1719-1726.
[173]
S. Sankaranarayanan, P. Papadimitratos och A. Mishra, "Enhancing Wireless Spectrum Utilization with a Cellular-Ad hoc Overlay Architecture," i Proceedings of the IEEE Military Communications Conference (MILCOM), 2005, s. 405-415.
[174]
P. Papadimitratos och Z. J. Haas, "Secure On-Demand Distance Vector Routing in Ad hoc Networks," i Proceedings of the IEEE Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005, s. 168-171.
[175]
P. Papadimitratos och Z. J. Haas, "Secure Route Discovery for QoS-Aware Routing in Ad Hoc Networks," i Proceedings of the IEEE Sarnoff Symposium on Advances in Wired and Wireless Communications, 2005, s. 176-179.
[176]
P. Papadimitratos och Z. J. Haas, "Secure Data Transmission in Mobile Ad Hoc Networks," i Proceedings of the ACM MobiCom Workshop on Wireless Security (WiSe), 2003, s. 41-50.
[177]
P. Papadimitratos och Z. J. Haas, "Secure Link State Routing for Mobile Ad Hoc Networks," i Proceedings of the IEEE Symposium on Applications and the Internet Workshop on Security and Assurance in Ad hoc Networks, 2003, s. 379-383.
[178]
P. Papadimitratos, E. G. Sirer och Z. J. Haas, "Path Set Selection in Mobile Ad Hoc Networks," i Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2002, s. 1-11.
[179]
P. Papadimitratos och Z. J. Haas, "Secure Routing for Mobile Ad Hoc Networks," i Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002, s. 193-204.

Kapitel i böcker

[180]
P. Papadimitratos, "Security and Privacy Mechanisms for Vehicular Networks," i Vehicular Networking : Automotive Applications and Beyond, Marc Emmelmann, Bernd Bochow, C. Christopher Kellum red., 1. uppl. : John Wiley & Sons, 2010, s. 105-127.

Icke refereegranskade

Artiklar

[181]
K. Zhang och P. Papadimitratos, "Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers," IEEE Open Journal of the Communications Society, vol. 2, s. 217-234, 2021.
[182]
P. Papadimitratos och J. -. Hubaux, "Report on the “Secure Vehicular Communications : Results and Challenges Ahead” Workshop," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), vol. 12, s. 53-64, 2008.

Konferensbidrag

[183]
K. Bauer et al., "Welcome message from the PADE chairs," i Welcome message from the PADE chairs  (Editorial), 2013, s. lxi-lxii.
[184]
N. Ristanovic et al., "Adaptive Message Authentication for Multi-Hop Networks," i International Conference on Wireless On-Demand Network Systems and Services (IEEE/IFIP WONS), 2011, s. 96-103.
[185]
B. Wiedersheim et al., "Privacy in Inter-Vehicular Networks : Why Simple Pseudonym Change Is Not Enough," i International Conference on Wireless On-Demand Network Systems and Services (IEEE/IFIP WONS), 2010, s. 176-183.
[186]
P. Papadimitratos, "“On the road” : Reflections on the Security of Vehicular Communication Systems," i Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES), 2008, s. 359-363.
[187]
P. Papadimitratos, Z. J. Haas och J. P. Hubaux, "How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET," i IEEE-CS Third International Conference on BroadBand Communcations, Networks, and Systems (IEEE BroadNets), 2006.
[188]
P. Papadimitratos, "Secure Ad hoc Networking," i Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC), 2006, s. 10-14.

Kapitel i böcker

[189]
H. Jin, M. Khodaei och P. Papadimitratos, "Security and Privacy in Vehicular Social Networks," i Vehicular Social Networks, : Taylor & Francis Group, 2016, s. 155-169.
[190]
P. Papadimitratos, "Digital Signatures," i Modern Cryptography : Theory and Applications, M. Burmester, S. Gritzalis, S. Katsikas, V. Chrissikopoulos red., Athens : Papasotiriou Books, 2011.
[191]
P. Papadimitratos och J. -. Hubaux, "Secure Vehicular Communication Systems," i Encyclopedia of Cryptography and Security, H.C.A. van Tilborg and S. Jajodia red., 2. uppl. Berlin : Springer, 2011, s. 1140-1143.
[192]
P. Papadimitratos och Z. J. Haas, "Securing Mobile Ad Hoc Networks," i Mobile Computing Handbook, Mohammad Ilyas, Imad Mahgoub red., : Boca Raton, FL: Auerbach Publications, 2005.
[193]
Z. J. Haas et al., "Wireless ad hoc networks," i Encyclopedia of Telecommunications, John G. Proakis red., 1. uppl. : John Wiley & Sons, 2003.

Avhandlingar

[194]
P. Papadimitratos, "Secure and Fault-Tolerant Communication in Mobile Ad Hoc Networks," Doktorsavhandling : Cornell University, 2005.

Rapporter

[195]
M. Khodaei och P. Papadimitratos, "A Cooperative Location Privacy Protection Scheme for Vehicular Ad-hoc Networks," Stockholm, Sweden, 2019.
[196]
H. Noroozi, M. Khodaei och P. Papadimitratos, "VPKIaaS: Towards Scaling Pseudonymous Authentication for Large Mobile Systems," Stockholm, Sweden, 2019.
[197]
S. Gisdakis, T. Giannetsos och P. Papadimitratos, "Android Privacy C(R)ache : Reading your External Storageand Sensors for Fun and Profit," KTH Royal Institute of Technology, 2015.
[198]
S. Gisdakis, P. Papadimitratos och A. Giannetsos, "Data Verification andPrivacy-respecting User Remuneration in Mobile Crowd Sensing," , 2015.
[199]
S. Gisdakis, T. Giannetsos och P. Papadimitratos, "Security, Privacy & Incentive Provision for Mobile Crowd Sensing Systems," , 2015.
[200]
M. Poturalski, P. Papadimitratos och J. -. Hubaux, "Formal Analysis of Secure Neighbor Discovery in Wireless Networks," , 2013.
[201]
W. Galuba et al., "More on Castor : the Scalable Secure Routing Protocol for Ad-hoc Networks," EPFL, Tech. Rep. LSIR-REPORT-2009-002, LISIR-REPORT, 2009-002, 2009.
[204]
M. Poturalski, P. Papadimitratos och J. -. Hubaux, "Secure Neighbor Discovery in Wireless Networks : Is It Possible?," Ecole Polytechnique Fedrale de Lausanne, EPFL-LCA Report, 2007-004, 2007.
[205]
M. Raya et al., "Certificate Revocation in Vehicular Networks," , LCA Report, 2006-006, 2006.

Övriga

[209]
[210]
H. Jin och P. Papadimitratos, "Scalable and DoS-resilient Secure Vehicular Communication," (Manuskript).
[211]
R. M. Tsoupidi, E. Troubitsyna och P. Papadimitratos, "Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems," (Manuskript).

Patent

Patent

[212]
P. Papadimitratos och A. Jovanovic, "Method to secure GNSS based locations in a device having GNSS receiver," us 8159391-B2 (2012-04-17), 2009.
[213]
Z. J. Haas och P. Papadimitratos, "Secure end-to-end communication in mobile ad hoc networks," us 2004025018, 2003.
Senaste synkning med DiVA:
2024-11-19 00:40:05