Skip to main content
Till KTH:s startsida Till KTH:s startsida

Publications by Panagiotis Papadimitratos

Refereegranskade

Artiklar

[1]
M. Khodaei, H. Noroozi and P. Papadimitratos, "SECMACE+ : Upscaling Pseudonymous Authentication for Large Mobile Systems," IEEE Transactions on Cloud Computing, vol. 11, no. 3, pp. 3009-3026, 2023.
[2]
R. M. Tsoupidi, E. Troubitsyna and P. Papadimitratos, "Thwarting code-reuse and side-channel attacks in embedded systems," Computers & security (Print), vol. 133, 2023.
[3]
L. Islami, S. Fischer-Huebner and P. Papadimitratos, "Capturing drivers' privacy preferences for intelligent transportation systems : An intercultural perspective," Computers & security (Print), vol. 123, pp. 102913, 2022.
[4]
T. Barbette et al., "Cheetah : A High-Speed Programmable Load-Balancer Framework with Guaranteed Per-Connection-Consistency," IEEE/ACM Transactions on Networking, vol. 30, no. 1, pp. 354-367, 2022.
[5]
I. Symeonidis et al., "HERMES : Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System," IEEE Internet of Things Journal, vol. 9, no. 1, pp. 129-151, 2022.
[6]
K. Zhang, E. G. Larsson and P. Papadimitratos, "Protecting GNSS Open Service Navigation Message Authentication Against Distance-Decreasing Attacks," IEEE Transactions on Aerospace and Electronic Systems, vol. 58, no. 2, pp. 1224-1240, 2022.
[7]
M. Khodaei and P. Papadimitratos, "Cooperative Location Privacy in Vehicular Networks : Why Simple Mix-zones are not Enough," IEEE Internet of Things Journal, pp. 1-1, 2021.
[8]
Z. Gulgun, E. G. Larsson and P. Papadimitratos, "Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests," IEEE Access, vol. 9, pp. 166382-166394, 2021.
[9]
M. Khodaei and P. Papadimitratos, "Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems," IEEE Transactions on Mobile Computing, vol. 20, no. 7, pp. 2473-2489, 2021.
[10]
H. Jin and P. Papadimitratos, "DoS-resilient cooperative beacon verification for vehicular communication systems," Ad hoc networks, vol. 90, 2019.
[11]
H. Jin and P. Papadimitratos, "Resilient Privacy Protection for Location-Based Services through Decentralization," ACM Transactions on Privacy and Security (TOPS), vol. 22, no. 4, pp. 1-36, 2019.
[12]
M. Wiese et al., "Secure Estimation and Zero-Error Secrecy Capacity," IEEE Transactions on Automatic Control, vol. 64, no. 3, pp. 1047-1062, 2019.
[13]
M. Khodaei, H. Jin and P. Papadimitratos, "SECMACE : Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems," IEEE transactions on intelligent transportation systems (Print), vol. 19, no. 5, pp. 1430-1444, 2018.
[14]
M. Mirmohseni and P. P. Papadimitratos, "Secrecy Capacity Scaling in Large Cooperative Wireless Networks," IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1923-1939, 2017.
[15]
S. Raza et al., "SecureSense : End-to-end secure communication architecture for the cloud-connected Internet of Things," Future generations computer systems, vol. 77, pp. 40-51, 2017.
[16]
M. Hollick et al., "Toward a Taxonomy and Attacker Model for Secure Routing Protocols," Computer communication review, vol. 47, no. 1, pp. 43-48, 2017.
[17]
M. Ehdaie et al., "2D Hash Chain robust Random Key Distribution scheme," Information Processing Letters, vol. 116, no. 5, pp. 367-372, 2016.
[18]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 839-853, 2016.
[19]
M. Ehdaie et al., "Key splitting : making random key distribution schemes resistant against node capture," Security and Communication Networks, vol. 8, no. 3, pp. 431-445, 2015.
[20]
S. Gisdakis et al., "Secure and Privacy-Preserving Smartphone based Traffic Information Systems," IEEE transactions on intelligent transportation systems (Print), vol. 16, no. 3, 2015.
[21]
M. Khodaei and P. Papadimitratos, "The Key to Intelligent Transportation : Identity and Credential Management in Vehicular Communication Systems," IEEE Vehicular Technology Magazine, vol. 10, no. 4, pp. 63-69, 2015.
[22]
R. Shokri et al., "Hiding in the Mobile Crowd : Location Privacy through Collaboration," IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 3, pp. 266-279, 2014.
[23]
M. Fiore et al., "Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 12, no. 2, pp. 289-303, 2013.
[24]
M. Poturalski, P. Papadimitratos and J.-P. Hubaux, "Formal Analysis of Secure Neighbor Discovery in Wireless Networks," IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 6, pp. 355-367, 2013.
[25]
M. Poturalski et al., "On Secure and Precise IR-UWB Ranging," IEEE Transactions on Wireless Communications, vol. 11, no. 3, pp. 1087-1099, 2012.
[26]
V. Manolopoulos et al., "Smartphone-based Traffic Information System for Sustainable Cities," Mobile Computing and Communications Review, vol. 16, no. 4, pp. 30-31, 2012.
[27]
F. Kargl and P. Papadimitratos, "ACM WiSec 2011 poster and demo session," ACM Mobile Computing and Communications Review (ACM MC2R), vol. 15, no. 3, pp. 34-34, 2011.
[28]
M. Poturalski et al., "Distance Bounding with IEEE 802.15.4a : Attacks and Countermeasures," IEEE Transactions on Wireless Communications, vol. 10, pp. 1334-1344, 2011.
[29]
G. Calandriello et al., "On the Performance of Secure Vehicular Communication Systems," IEEE Transactions on Dependable and Secure Computing, 2011.
[30]
A. Festag, P. Papadimitratos and T. Tielert, "Design and Performance of Secure Geocast for Vehicular Communication," IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2456-2471, 2010.
[31]
P. Papadimitratos, J. Luo and J. -. Hubaux, "Randomized Countermeasure Against Parasitic Adversaries in Wireless Sensor Networks," IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, pp. 1036-1045, 2010.
[32]
P. Papadimitratos et al., "Vehicular Communication Systems : Enabling Technologies, Applications, and Future Outlook on Intelligent Transportation," IEEE Communications Magazine, vol. 47, no. 11, pp. 84-95, 2009.
[33]
P. Papadimitratos et al., "Secure Neighborhood Discovery : A Fundamental Element for Mobile Ad Hoc Networking," IEEE Communications Magazine, vol. 46, no. 2, pp. 132-139, 2008.
[34]
P. Papadimitratos et al., "Secure Vehicular Communication Systems : Design and Architecture," IEEE Communications Magazine, vol. 46, pp. 100-109, 2008.
[35]
F. Kargl et al., "Secure Vehicular Communication Systems : Implementation, Performance, and Research Challenges," IEEE Communications Magazine, vol. 46, pp. 110-118, 2008.
[36]
M. Piórkowski et al., "TraNS : Realistic Joint Traffic and Network Simulator for VANETs," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), vol. 12, no. 1, pp. 31-33, 2008.
[37]
M. Raya et al., "Eviction of Misbehaving and Faulty Nodes in Vehicular Networks," IEEE Journal on Selected Areas in Communications, vol. 25, no. 8, pp. 1557-1568, 2007.
[38]
P. Papadimitratos and Z. J. Haas, "Secure Data Communication in Mobile Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 343-356, 2006.
[39]
M. Raya, P. Papadimitratos and J. -. Hubaux, "Securing Vehicular Communications," IEEE wireless communications, vol. 13, no. 5, pp. 8-15, 2006.
[40]
P. Papadimitratos, S. Sankaranarayanan and A. Mishra, "A Bandwidth Sharing Approach to Improve Licensed Spectrum Utilization," IEEE Communications Magazine, vol. 43, no. 12, 2005.
[41]
P. Papadimitratos and Z. J. Haas, "Secure Routing for Mobile Ad Hoc Networks," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R) - Special Issue: Report on a Working Session on Security in Wireless Ad hoc Networks, vol. 7, no. 1, pp. 79-80, 2003.
[42]
P. Papadimitratos and Z. Haas, "Secure message transmission in mobile ad hoc networks," Ad hoc networks, vol. 1, no. 1, pp. 193-209, 2003.
[43]
P. Papadimitratos and Z. J. Haas, "Securing the Internet Routing Infrastructure," IEEE Communications Magazine, vol. 40, no. 10, pp. 60-68, 2002.

Konferensbidrag

[44]
C. Eryonucu and P. Papadimitratos, "Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy," in Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, 2023, Revised Selected Papers, 2024, pp. 474-493.
[45]
M. Spanghero et al., "Uncovering GNSS Interference with Aerial Mapping UAV," in Uncovering GNSS Interference with Aerial Mapping UAV, 2024.
[46]
M. Spanghero and P. Papadimitratos, "Detecting GNSS misbehavior leveraging secure heterogeneous time sources," in IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, California, April 24-27, 2023, 2023.
[47]
W. Liu and P. Papadimitratos, "Probabilistic Detection of GNSS Spoofing using Opportunistic Information," in Proceedings IEEE/ION Position, Location and Navigation Symposium, PLANS 2023, 2023.
[48]
R. M. Tsoupidi et al., "Securing Optimized Code Against Power Side Channels," in 36th IEEE Computer Security Foundations Symposium, 2023.
[49]
R. M. Tsoupidi et al., "Securing Optimized Code Against Power Side Channels," in 2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, pp. 340-355.
[50]
G. K. Olsson et al., "Using Mobile Phones for Participatory Detection and Localization of a GNSS Jammer," in 2023 IEEE/ION Position, Location and Navigation Symposium, PLANS 2023, 2023, pp. 536-541.
[51]
K. Kalogiannis, A. Henriksson and P. Papadimitratos, "Vulnerability Analysis of Vehicular Coordinated Maneuvers," in Proceedings : 8th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2023, 2023, pp. 11-20.
[52]
B. Knijnenburg and P. Papadimitratos, "WPES 2023 Chairs' Welcome," in WPES 2023 - Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023.
[53]
B. P. Knijnenburg and P. Papadimitratos, "WPES'23 : 22nd Workshop on Privacy in the Electronic Society," in CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023, pp. 3645-3647.
[54]
K. Kalogiannis et al., "Attack Impact and Misbehavior Detection in Vehicular Platoons," in Proceedings of the 15th ACMConference on Security and Privacy in Wireless and Mobile Networks (WiSec’22), 2022, pp. 45-59.
[55]
S. Varghese et al., "Digital Twin-based Intrusion Detection for Industrial Control Systems," in 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022, 2022, pp. 611-617.
[56]
M. Spanghero and P. Papadimitratos, "High-precision Hardware Oscillators Ensemble for GNSS Attack Detection," in IEEE Aerospace Conference Proceedings, 2022.
[57]
G. K. Olsson et al., "Participatory Sensing for Localization of a GNSS Jammer," in 2022 INTERNATIONAL CONFERENCE ON LOCALIZATION AND GNSS (ICL-GNSS), 2022.
[58]
C. Eryonucu and P. Papadimitratos, "Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life," in WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022, pp. 73-84.
[59]
M. Spanghero and P. Papadimitratos, "Detecting GNSS misbehaviour with high-precision clocks," in Proceedings WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, pp. 389-391.
[60]
R. Narayanan, A. Varshney and P. Papadimitratos, "HarvestPrint : Securing Battery-free Backscatter Tags through Fingerprinting," in HotNets 2021 - Proceedings of the 20th ACM Workshop on Hot Topics in Networks, 2021, pp. 178-184.
[61]
M. Soltani, M. Mirmohseni and P. Papadimitratos, "Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers," in 30th International Conference on Computer Communications and Networks (ICCCN), 2021.
[62]
H. Jin and P. Papadimitratos, "Off-the-shelf Wi-Fi Indoor Smartphone Localization," in 17Th Conference On Wireless On-Demand Network Systems And Services (WONS 2022), 2021.
[63]
M. Lenhart, M. Spanghero and P. Papadimitratos, "Relay/replay attacks on GNSS signals," in WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, pp. 380-382.
[64]
P. Molloy et al., "SecProtobuf : Implicit Message Integrity Provision in Heterogeneous Vehicular Systems," in 2021 IEEE Vehicular Networking Conference (VNC), 2021, pp. 190-193.
[65]
T. Barbette et al., "A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency," in Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, 2020, pp. 667-683.
[66]
M. Spanghero, K. Zhang and P. Papadimitratos, "Authenticated time for detecting GNSS attacks," in Proceedings of the 33rd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2020, 2020, pp. 3826-3834.
[67]
K. Zhang, M. Spanghero and P. Papadimitratos, "Protecting GNSS-based Services using Time Offset Validation," in 2020 IEEE/ION Position, Location and Navigation Symposium, PLANS 2020, 2020, pp. 575-583.
[68]
P. Babaheidarian, S. Salimi and P. Papadimitratos, "Scalable Security in Interference Channels with Arbitrary Number of Users," in Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020, 2020, pp. 402-406.
[69]
S. Ghasemi-Goojani and P. Papadimitratos, "On the Capacity of State-Dependent Gaussian Z-Interference Channel," in Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018, 2019, pp. 653-657.
[70]
K. Zhang and P. Papadimitratos, "On the Effects of Distance-decreasing Attacks on Cryptographically Protected GNSS Signals," in Proceedings of the 2019 International Technical Meeting of The Institute of Navigation, 2019, pp. 363-372.
[71]
K. Zhang and P. Papadimitratos, "Safeguarding NMA Enhanced Galileo OS Signals from Distance-Decreasing Attacks," in Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019), 2019, pp. 4041-4052.
[72]
M. Khodaei, H. Noroozi and P. Papadimitratos, "Scaling Pseudonymous Authentication for Large Mobile Systems," in WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks, 2019, pp. 174-185.
[73]
K. Zhang and P. Papadimitratos, "Secure Multi-constellation GNSS Receivers with Clustering-based Solution Separation Algorithm," in Proceedings of the IEEE Aerospace Conference 2019, 2019.
[74]
Z. Gulgun, E. G. Larsson and P. Papadimitratos, "Statistical method for spoofing detection at mobile GNSS receivers," in Proceedings of 16th International Symposium on Wireless Communication Systems, ISWCS 2019, 2019, pp. 677-681.
[75]
S. Ghasemi-Goojani and P. Papadimitratos, "The Symmetric Two-Hop Channel with an Untrusted Relay," in Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018, 2019, pp. 673-677.
[76]
K. Zhang and P. Papadimitratos, "Analysis of the effect of the distance-decreasing attacks on GNSS authenticated signals," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 285-286.
[77]
A. Hylamia et al., "Demo : Towards Battery-free Radio Tomographic Imaging," in WISEC'18 : PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, pp. 293-295.
[78]
M. Khodaei and P. Papadimitratos, "Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs," in Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., 2018.
[79]
M. Khodaei and P. Papadimitratos, "Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs," in WISEC'18 : PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, pp. 172-183.
[80]
P. Papadimitratos, K. Butler and C. Pöpper, "Foreword," in WiSec 2018 : Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. i-ii.
[81]
J. Borsub and P. Papadimitratos, "Hardened registration process for participatory sensing," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 281-282.
[82]
C. Vaas, P. Papadimitratos and I. Martinovic, "Increasing mix-zone eicacy for pseudonym change in VANETs using cha messages," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 287-288.
[83]
F. Forsby et al., "Lightweight X.509 Digital Certificates for the Internet of Things," in 3rd International Conference on Interoperability in IoT, InterIoT 2017 on conjunction with 4th International Conference on Safety and Security in Internet of Things, SaSeIoT 2017, 2018, pp. 123-133.
[84]
C. Vaas et al., "Nowhere to hide? : Mix-Zones for Private Pseudonym Change using Chaff Vehicles," in 2018 IEEE Vehicular Networking Conference (VNC), 2018.
[85]
S. Ghasemi-Goojani and P. Papadimitratos, "On the Capacity of Gaussian "Dirty" Z-Interference Channel with Common State," in 2018 52ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2018.
[86]
H. Jin and P. Papadimitratos, "POSTER : Expedited Beacon Verification for VANET," in WISEC'18 : PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, pp. 283-284.
[87]
C. Vaas et al., "Poster : Tracking Vehicles Through Encrypted Mix-Zones Using Physical Layer Properties," in 2018 IEEE Vehicular Networking Conference (VNC), 2018.
[88]
M. Khodaei and P. Papadimitratos, "Poster : Mix-Zones Everywhere: A Dynamic Cooperative Location Privacy Protection Scheme," in 2018 IEEE Vehicular Networking Conference, (VNC), 2018.
[89]
J. Camenisch and P. Papadimitratos, "Preface," in 17th International Conference on Cryptology and Network Security, CANS 2018, 2018.
[90]
M. Khodaei, H. Noroozi and P. Papadimitratos, "Privacy Preservation through Uniformity," in Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., 2018.
[91]
S. Hylamia et al., "Security on harvested power," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 296-298.
[92]
H. Noroozi, M. Khodaei and P. Papadimitratos, "VPKIaaS: A highly-available and dynamically-scalable vehicular public-key infrastructure," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 302-304.
[93]
M. Gerami et al., "Optimal secure partial-repair in distributed storage systems," in 2017 51st Annual Conference on Information Sciences and Systems, CISS 2017, 2017.
[94]
H. Jin and P. Papadimitratos, "Poster : Bloom Filter based certificate validation for VANET," in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, 2017, pp. 273-274.
[95]
P. Babaheidarian, S. Salimi and P. Papadimitratos, "Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward," in 2017 51st Annual Conference on Information Sciences and Systems, CISS 2017, 2017.
[96]
H. Jin and P. Papadimitratos, "Proactive certificate validation for VANETs," in IEEE Vehicular Networking Conference, VNC, 2017.
[97]
M. Khodaei, A. Messing and P. Papadimitratos, "RHyTHM: A Randomized Hybrid Scheme To Hide in the Mobile Crowd," in IEEE Vehicular Networking Conference (VNC) 2017, 2017, pp. 155-158.
[98]
H. Jin and P. Papadimitratos, "Resilient privacy protection for location-based services through decentralization," in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, 2017, pp. 253-258.
[99]
G. Stylianos, T. Giannetsos and P. Papadimitratos, "Android privacy C(R)ache : Reading your external storage and sensors for fun and profit," in PAMCO 2016 - Proceedings of the 2nd MobiHoc International Workshop on Privacy-Aware Mobile Computing, 2016, pp. 1-10.
[100]
M. Khodaei and P. Papadimitratos, "Evaluating On-demand Pseudonym Acquisition Policies in Vehicular Communication Systems," in Workshop on Internet of Vehicles and Vehicles of Internet (IoV-VoI 2016), 2016, pp. 7-12.
[101]
M. Hollick, P. Papadimitratos and W. Enck, "Foreword," in WiSec 2016 : Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2016.
[102]
M. Wiese and P. Papadimitratos, "Frequency hopping does not increase anti-jamming resilience of wireless channels," in 2016 International Zurich Seminar on Communications, March 2 – 4, 2016, 2016.
[103]
M. Franz and P. Papadimitratos, "Preface," in 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, 2016.
[104]
M. Wiese et al., "Secure Estimation for Unstable Systems," in 2016 IEEE 55th Conference on Decision and Control, CDC 2016, 2016, pp. 5059-5064.
[105]
P. Babaheidarian, S. Salimi and P. Papadimitratos, "Security in the Gaussian interference channel : Weak and moderately weak interference regimes," in 2016 IEEE International Symposium on Information Theory - Proceedings, 2016, pp. 2434-2438.
[106]
P. Papadimitratos, "Security on Wheels : Security and Privacy for Vehicular Communication Systems," in CCS'16 : PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, pp. 1855-1856.
[107]
M. Wiese et al., "Uncertain wiretap channels and secure estimation," in 2016 IEEE International Symposium on Information Theory, 2016, pp. 2004-2008.
[108]
K. Zhang, R. A. Tuhin and P. Papadimitratos, "Detection and Exclusion RAIM Algorithm against Spoofing/Replaying Attacks," in International Symposium on GNSS, 2015.
[109]
P. Babaheidarian, S. Salimi and P. Papadimitratos, "Finite-SNR Regime Analysis of The Gaussian Wiretap Multiple-Access Channel," in 2015 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2015, 2015, pp. 307-314.
[110]
K. Zhang and P. Papadimitratos, "GNSS receiver tracking performance analysis under distance-decreasing attacks," in Proceedings of 2015 International Conference on Localization and GNSS, 2015.
[111]
S. Salimi et al., "Key Agreement over an Interference Channel with Noiseless Feedback : Achievable Region & Distributed Allocation," in IEEE Conference on Communications and Network Security (CNS), 2015, pp. 59-64.
[112]
L. Ye et al., "Path metric authentication for low-power and lossy networks," in 1st ACM International Workshop on Cyber-Physical Systems for Smart Water Networks, CySWater 2015, 2015.
[113]
H. Jin and P. Papadimitratos, "Resilient collaborative privacy for Location-Based services," in 20th Nordic Conference on Secure IT Systems, NordSec 2015, 2015, pp. 47-63.
[114]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "SHIELD : a data verification framework for participatory sensing systems," in WiSec '15 Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015.
[115]
H. Jin and P. Papadimitratos, "Scaling VANET Security Through Cooperative Message Verification," in 2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, pp. 275-278.
[116]
M. Mirmohseni and P. Papadimitratos, "Active adversaries from an information-theoretic perspective : Data modification attacks," in IEEE International Symposium on Information Theory - Proceedings, 2014, pp. 791-795.
[117]
M. Mirmohseni and P. Papadimitratos, "Colluding eavesdroppers in large cooperative wireless networks," in IWCIT 2014 - Iran Workshop on Communication and Information Theory, 2014.
[118]
M. Mirmohseni and P. Papadimitratos, "Constrained colluding eavesdroppers : an information-theoretic model," in International Zurich Seminar on Communications, 2014, pp. 63-66.
[119]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "SPPEAR : Security & privacy-preserving architecture for participatory-sensing applications," in WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2014, pp. 39-50.
[120]
M. Mirmohseni and P. Papadimitratos, "Scaling laws for secrecy capacity in cooperative wireless networks," in INFOCOM, 2014 Proceedings IEEE, 2014, pp. 1527-1535.
[121]
M. Khodaei, H. Jin and P. Papadimitratos, "Towards deploying a scalable & robust vehicular identity and credential management infrastructure," in 2014 IEEE Vehicular Networking Conference (VNC), 2014, pp. 33-40.
[122]
T. Giannetsos, S. Gisdakis and P. Papadimitratos, "Trustworthy People-Centric Sensing : Privacy, Security and User Incentives Road-Map," in 2014 13th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2014, 2014, pp. 39-46.
[123]
S. Gisdakis et al., "SEROSA : SERvice oriented security architecture for Vehicular Communications," in 2013 IEEE Vehicular Networking Conference (VNC), 2013 IEEE, 2013, pp. 111-118.
[124]
S. Gisdakis, D. Katselis and P. Papadimitratos, "Allocating adversarial resources in wireless networks," in 2013 Proceedings of the 21st European Signal Processing Conference (EUSIPCO), 2013, p. 6811603.
[125]
D. Katselis and P. Papadimitratos, "On secret key generation through multipath for wireless networks," in 2013 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2013, pp. 148-153.
[126]
N. Alexiou et al., "Towards a secure and privacy-preserving multi-service vehicular architecture," in 2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2013, 2013, p. 6583472.
[127]
N. Alexiou et al., "VeSPA : Vehicular security and privacy-preserving architecture," in HotWiSec 2013 : Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy, 2013, pp. 19-23.
[128]
M. Ehdaie et al., "Key Splitting for Random Key Distribution Schemes," in 7th Workshop on Secure Network Protocols (NPSec12), 2012.
[129]
M. Ehdaie et al., "Key splitting for random key distribution schemes," in Network Protocols (ICNP), 2012 20th IEEE International Conference on, 2012, p. 6459951.
[130]
G. Stylianos and P. Papadimitratos, "On the Optimal Allocation of Adversarial Resources," in Mobicom'12 The 18th Annual International Conference on Mobile Computing and Networking : Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking, 2012, pp. 33-38.
[131]
V. Manolopoulos et al., "Smartphone-based Traffic Information System for Sustainable Cities," in HotMobile, 13th International Workshop on Mobile Computing Systems and Applications; San Diego, CA, USA, 28-29 February, 2012, 2012.
[132]
P. Papadimitratos and J. Deng, "Stealthy pre-attacks against random key pre-distribution security," in Communications (ICC), 2012 IEEE International Conference on, 2012, pp. 955-959.
[133]
C. Neuberg et al., "A Mobile World of Security - The Model," in IEEE Information Theory Society Conference on Information Sciences and Systems (CISS), 2011, pp. 1-6.
[134]
R. Shokri et al., "Collaborative Location Privacy," in 8th IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), 2011, pp. 500-509.
[135]
J. M. Bohli et al., "Resilient Data Aggregation for Unattended WSNs," in Proceedings - Conference on Local Computer Networks, LCN, 2011, 2011, pp. 994-1002.
[136]
M. Fiore et al., "Secure Neighbor Position Discovery in Vehicular Networks," in Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2011, pp. 71-78.
[137]
V. Manolopoulos et al., "Securing smartphone based ITS," in ITST 2011 : Proceedings of the 11th International Conference on ITS Telecommunications, 2011, 2011, pp. 201-206.
[138]
W. Galuba et al., "Castor : Scalable Secure Routing for Ad Hoc Networks," in 2010 PROCEEDINGS IEEE INFOCOM, 2010, pp. 1-9.
[139]
M. Flury et al., "Effectiveness of distance-decreasing attacks against impulse radio ranging," in Proceedings of the Third ACM Conference on Wireless Network Security (WiSec), 2010, pp. 117-128.
[140]
M. Poturalski et al., "The Cicada Attack : Degradation and Denial of Service in IR Ranging," in IEEE International Conference on Ultra-Wideband (ICUWB), 2010.
[141]
R. Shokri et al., "A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks," in Second ACM Conference on Wireless Network Security (WiSec’09), 2009.
[142]
N. Ristanovic et al., "Adaptive Message Authentication for Vehicular Networks," in Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, VANET 2009., 2009, pp. 121-122.
[143]
G. Mezzour et al., "Privacy-Preserving Relationship Path Discovery in Social Networks," in Proceedings of the 8th International Conference on Cryptology and Network Security, 2009, pp. 189-208.
[144]
P. Papadimitratos, G. Mezzour and J. -. Hubaux, "Certificate Revocation List Distribution in Vehicular Communication Systems," in Proceedings of the Fifth ACM International Workshop on Vehicular Inter-NETworking (VANET'08), 2008, pp. 86-87.
[145]
T. Moore et al., "Fast Exclusion of Errant Devices from Vehicular Networks," in Proceedings of the Fifth IEEE-CS Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008, pp. 135-143.
[146]
P. Papadimitratos and A. Jovanovic, "GNSS-based Positioning : Attacks and Countermeasures," in Proceedings of the IEEE Military Communications Conference (MILCOM), 2008, pp. 1-7.
[147]
J. Luo, P. Papadimitratos and J.-P. Hubaux, "GossiCrypt : Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries," in Proceedings of the Fifth IEEE-CS Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008, pp. 441-450.
[148]
P. Papadimitratos et al., "Impact of Vehicular Communication Security on Transportation Safety," in Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM) Workshop on Mobile Networking for Vehicular Environments (MOVE), 2008, pp. 1-6.
[149]
M. Raya et al., "On Data-Centric Trust Establishment in Ephemeral Ad hoc Networks," in Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM), 2008, pp. 1238-1246.
[150]
M. Poturalski, P. Papadimitratos and J. -. Hubaux, "Secure Neighbor Discovery in Wireless Networks : Formal Investigation of Possibility," in ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008, pp. 189-200.
[151]
P. Papadimitratos and P. Ardelean, "Secure and Privacy-Enhancing Vehicular Communication : Demonstration of Implementation and Operation," in Proceedings of the IEEE Vehicular Technology Conference (VTC-Fall), 2008, pp. 1-2.
[152]
M. Poturalski, P. Papadimitratos and J. -. Hubaux, "Towards Provable Secure Neighbor Discovery in Wireless Networks," in FMSE '08 Proceedings of the 6th ACM workshop on Formal methods in security engineering, 2008, pp. 31-41.
[153]
M. Kafsi et al., "VANET Connectivity Analysis," in Proceedings of the IEEE Workshop on Automotive Networking and Applications (Autonet), 2008.
[154]
J. Panchard et al., "Wireless Sensor Networking for Rain-fed Farming Decision Support," in Proceedings of the ACM SIGCOMM Worskhop on Networked Systems for Developing Regions, 2008, pp. 31-36.
[155]
P. Papadimitratos et al., "Architecture for Secure and Private Vehicular Communications," in IEEE International Conference on ITS Telecommunications (IEEE ITST), 2007, pp. 1-6.
[156]
R. Shokri et al., "Efficient and Adjustable Recipient Anonymity in Mobile Ad Hoc Networks," in 2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, pp. 1-3.
[157]
G. Calandriello et al., "Efficient and Robust Pseudonymous Authentication in VANET," in VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, 2007, pp. 19-27.
[158]
P. Haghani et al., "Efficient and Robust Secure Aggregation for Sensor Networks," in Proceedings of the Third IEEE ICNP Workshop on Secure Network Protocols (NPSec), 2007, pp. 1-6.
[159]
J. Freudiger et al., "Mix-zones for Location Privacy in Vehicular Networks," in Proceedings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (Win-ITS), 2007.
[160]
C. Harsch, A. Festag and P. Papadimitratos, "Secure Position-Based Routing for VANETs," in Proceedings of the IEEE 66th Vehicular Technology Conference (VTC-Fall), 2007, pp. 26-30.
[161]
E. Schoch et al., "Impact of Pseudonym Changes on Geographic Routing in VANETs," in LECTURE NOTES IN COMPUTER SCIENCE, 2006, pp. 43-57.
[162]
P. Papadimitratos et al., "Privacy and Identity Management for Vehicular Communication Systems : A Position Paper," in Workshop on Standards for Privacy in User-Centric Identity Management, 2006.
[163]
T. Leinmüller et al., "SEVECOM - Secure Vehicle Communication," in Proceedings of IST Mobile Summit, 2006.
[164]
P. Papadimitratos, V. Gligor and J. -. Hubaux, "Securing Vehicular Communications - Assumptions, Requirements, and Principles," in Proceedings of the Fourth Workshop on Embedded Security in Cars (ESCAR), 2006, pp. 5-14.
[165]
S. Sankaranarayanan, P. Papadimitratos and A. Mishra, "A Bandwidth Sharing Approach to Improve Licenced Spectrum Utilization," in IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), 2005, pp. 279-288.
[166]
P. Papadimitratos, A. Mishra and D. Rosenburgh, "A Cross-Layer Design Approach to Enhance 802.15.4," in Proceedings of the IEEE Military Communications Conference MILCOM, 2005, pp. 1719-1726.
[167]
S. Sankaranarayanan, P. Papadimitratos and A. Mishra, "Enhancing Wireless Spectrum Utilization with a Cellular-Ad hoc Overlay Architecture," in Proceedings of the IEEE Military Communications Conference (MILCOM), 2005, pp. 405-415.
[168]
P. Papadimitratos and Z. J. Haas, "Secure On-Demand Distance Vector Routing in Ad hoc Networks," in Proceedings of the IEEE Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005, pp. 168-171.
[169]
P. Papadimitratos and Z. J. Haas, "Secure Route Discovery for QoS-Aware Routing in Ad Hoc Networks," in Proceedings of the IEEE Sarnoff Symposium on Advances in Wired and Wireless Communications, 2005, pp. 176-179.
[170]
P. Papadimitratos and Z. J. Haas, "Secure Data Transmission in Mobile Ad Hoc Networks," in Proceedings of the ACM MobiCom Workshop on Wireless Security (WiSe), 2003, pp. 41-50.
[171]
P. Papadimitratos and Z. J. Haas, "Secure Link State Routing for Mobile Ad Hoc Networks," in Proceedings of the IEEE Symposium on Applications and the Internet Workshop on Security and Assurance in Ad hoc Networks, 2003, pp. 379-383.
[172]
P. Papadimitratos, E. G. Sirer and Z. J. Haas, "Path Set Selection in Mobile Ad Hoc Networks," in Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2002, pp. 1-11.
[173]
P. Papadimitratos and Z. J. Haas, "Secure Routing for Mobile Ad Hoc Networks," in Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002, pp. 193-204.

Kapitel i böcker

[174]
P. Papadimitratos, "Security and Privacy Mechanisms for Vehicular Networks," in Vehicular Networking : Automotive Applications and Beyond, Marc Emmelmann, Bernd Bochow, C. Christopher Kellum Ed., 1st ed. : John Wiley & Sons, 2010, pp. 105-127.

Icke refereegranskade

Artiklar

[175]
K. Zhang and P. Papadimitratos, "Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers," IEEE Open Journal of the Communications Society, vol. 2, pp. 217-234, 2021.
[176]
P. Papadimitratos and J. -. Hubaux, "Report on the “Secure Vehicular Communications : Results and Challenges Ahead” Workshop," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), vol. 12, pp. 53-64, 2008.

Konferensbidrag

[177]
K. Bauer et al., "Welcome message from the PADE chairs," in Welcome message from the PADE chairs  (Editorial), 2013, pp. lxi-lxii.
[178]
N. Ristanovic et al., "Adaptive Message Authentication for Multi-Hop Networks," in International Conference on Wireless On-Demand Network Systems and Services (IEEE/IFIP WONS), 2011, pp. 96-103.
[179]
B. Wiedersheim et al., "Privacy in Inter-Vehicular Networks : Why Simple Pseudonym Change Is Not Enough," in International Conference on Wireless On-Demand Network Systems and Services (IEEE/IFIP WONS), 2010, pp. 176-183.
[180]
P. Papadimitratos, "“On the road” : Reflections on the Security of Vehicular Communication Systems," in Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES), 2008, pp. 359-363.
[181]
P. Papadimitratos, Z. J. Haas and J. P. Hubaux, "How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET," in IEEE-CS Third International Conference on BroadBand Communcations, Networks, and Systems (IEEE BroadNets), 2006.
[182]
P. Papadimitratos, "Secure Ad hoc Networking," in Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC), 2006, pp. 10-14.

Kapitel i böcker

[183]
H. Jin, M. Khodaei and P. Papadimitratos, "Security and Privacy in Vehicular Social Networks," in Vehicular Social Networks, : Taylor & Francis Group, 2016, pp. 155-169.
[184]
P. Papadimitratos, "Digital Signatures," in Modern Cryptography : Theory and Applications, M. Burmester, S. Gritzalis, S. Katsikas, V. Chrissikopoulos Ed., Athens : Papasotiriou Books, 2011.
[185]
P. Papadimitratos and J. -. Hubaux, "Secure Vehicular Communication Systems," in Encyclopedia of Cryptography and Security, H.C.A. van Tilborg and S. Jajodia Ed., 2nd ed. Berlin : Springer, 2011, pp. 1140-1143.
[186]
P. Papadimitratos and Z. J. Haas, "Securing Mobile Ad Hoc Networks," in Mobile Computing Handbook, Mohammad Ilyas, Imad Mahgoub Ed., : Boca Raton, FL: Auerbach Publications, 2005.
[187]
Z. J. Haas et al., "Wireless ad hoc networks," in Encyclopedia of Telecommunications, John G. Proakis Ed., 1st ed. : John Wiley & Sons, 2003.

Avhandlingar

[188]
P. Papadimitratos, "Secure and Fault-Tolerant Communication in Mobile Ad Hoc Networks," Doctoral thesis : Cornell University, 2005.

Rapporter

[189]
M. Khodaei and P. Papadimitratos, "A Cooperative Location Privacy Protection Scheme for Vehicular Ad-hoc Networks," Stockholm, Sweden, 2019.
[190]
H. Noroozi, M. Khodaei and P. Papadimitratos, "VPKIaaS: Towards Scaling Pseudonymous Authentication for Large Mobile Systems," Stockholm, Sweden, 2019.
[191]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "Android Privacy C(R)ache : Reading your External Storageand Sensors for Fun and Profit," KTH Royal Institute of Technology, 2015.
[192]
S. Gisdakis, P. Papadimitratos and A. Giannetsos, "Data Verification andPrivacy-respecting User Remuneration in Mobile Crowd Sensing," , 2015.
[193]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "Security, Privacy & Incentive Provision for Mobile Crowd Sensing Systems," , 2015.
[194]
M. Poturalski, P. Papadimitratos and J. -. Hubaux, "Formal Analysis of Secure Neighbor Discovery in Wireless Networks," , 2013.
[195]
W. Galuba et al., "More on Castor : the Scalable Secure Routing Protocol for Ad-hoc Networks," EPFL, Tech. Rep. LSIR-REPORT-2009-002, LISIR-REPORT, 2009-002, 2009.
[198]
M. Poturalski, P. Papadimitratos and J. -. Hubaux, "Secure Neighbor Discovery in Wireless Networks : Is It Possible?," Ecole Polytechnique Fedrale de Lausanne, EPFL-LCA Report, 2007-004, 2007.
[199]
M. Raya et al., "Certificate Revocation in Vehicular Networks," , LCA Report, 2006-006, 2006.

Övriga

[203]
[204]
H. Jin and P. Papadimitratos, "Scalable and DoS-resilient Secure Vehicular Communication," (Manuscript).
[205]
R. M. Tsoupidi, E. Troubitsyna and P. Papadimitratos, "Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems," (Manuscript).

Patent

Patent

[206]
P. Papadimitratos and A. Jovanovic, "Method to secure GNSS based locations in a device having GNSS receiver," us 8159391-B2 (2012-04-17), 2009.
[207]
Z. J. Haas and P. Papadimitratos, "Secure end-to-end communication in mobile ad hoc networks," us 2004025018, 2003.
Senaste synkning med DiVA:
2024-05-19 04:36:35