default search action
Marco Tiloca
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Rikard Höglund, Marco Tiloca, Göran Selander, John Preuß Mattsson, Malisa Vucinic, Thomas Watteyne:
Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols. IEEE Access 12: 49865-49877 (2024) - [j12]Marco Rasori, Andrea Saracino, Paolo Mori, Marco Tiloca:
Using the ACE framework to enforce access and usage control with notifications of revoked access rights. Int. J. Inf. Sec. 23(5): 3109-3133 (2024) - [i5]Göran Selander, John Preuß Mattsson, Marek Serafin, Marco Tiloca, Malisa Vucinic:
Traces of Ephemeral Diffie-Hellman Over COSE (EDHOC). RFC 9529: 1-62 (2024) - [i4]Francesca Palombini, Marco Tiloca:
Key Provisioning for Group Communication Using Authentication and Authorization for Constrained Environments (ACE). RFC 9594: 1-97 (2024) - 2023
- [c19]Rikard Höglund, Marco Tiloca, Simon Bouget, Shahid Raza:
Key Update for the IoT Security Standard OSCORE. CSR 2023: 78-85 - [c18]Ludwig Seitz, Marco Tiloca, Martin Gunnarsson, Rikard Höglund:
Secure Software Updates for IoT Based on Industry Requirements. ICISSP 2023: 698-705 - 2022
- [j11]Francesca Righetti, Carlo Vallati, Marco Tiloca, Giuseppe Anastasi:
Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation. Comput. Commun. 194: 411-432 (2022) - [j10]Martin Gunnarsson, Krzysztof Mateusz Malarski, Rikard Höglund, Marco Tiloca:
Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things. ACM Trans. Internet Things 3(3): 19:1-19:31 (2022) - 2021
- [j9]Martin Gunnarsson, Joakim Brorsson, Francesca Palombini, Ludwig Seitz, Marco Tiloca:
Evaluating the performance of the OSCORE security protocol in constrained IoT environments. Internet Things 13: 100333 (2021) - [c17]Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh, Martin Hell:
On-demand Key Distribution for Cloud Networks. ICIN 2021: 80-82 - [c16]Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh, Martin Hell:
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks. SecureComm (2) 2021: 207-228 - 2020
- [j8]Marco Tiloca, Gianluca Dini, Kiki Rizki, Shahid Raza:
Group rekeying based on member join history. Int. J. Inf. Sec. 19(4): 343-381 (2020) - [c15]Gioele Carignani, Francesca Righetti, Carlo Vallati, Marco Tiloca, Giuseppe Anastasi:
Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks. WoWMoM 2020: 68-77
2010 – 2019
- 2019
- [j7]Kiki Rizki, Argyro Lamproudi, Marco Tiloca, Shahid Raza:
Group-IKEv2 for multicast IPsec in the internet of things. Int. J. Secur. Networks 14(1): 10-22 (2019) - [j6]Marco Tiloca, Domenico De Guglielmo, Gianluca Dini, Giuseppe Anastasi, Sajal K. Das:
DISH: DIstributed SHuffling Against Selective Jamming Attack in IEEE 802.15.4e TSCH Networks. ACM Trans. Sens. Networks 15(1): 3:1-3:28 (2019) - 2018
- [c14]Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza:
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control. CNS 2018: 1-9 - [c13]Marco Tiloca, Rikard Hoglund, Syafiq:
SARDOS: Self-Adaptive Reaction Against Denial of Service in the Internet of Things. IoTSMS 2018: 54-61 - [i3]Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza:
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control. CoRR abs/1808.04581 (2018) - 2017
- [j5]Marco Tiloca, Christian Gehrmann, Ludwig Seitz:
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake. Int. J. Inf. Sec. 16(2): 173-193 (2017) - [j4]Marco Tiloca, Domenico De Guglielmo, Gianluca Dini, Giuseppe Anastasi, Sajal K. Das:
JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs. IEEE Trans. Dependable Secur. Comput. 14(4): 392-405 (2017) - [j3]Marco Tiloca, Kirill Nikitin, Shahid Raza:
Axiom: DTLS-Based Secure IoT Group Communication. ACM Trans. Embed. Comput. Syst. 16(3): 66:1-66:29 (2017) - 2016
- [c12]Marco Tiloca, Gianluca Dini:
GREP: A group rekeying protocol based on member join history. ISCC 2016: 326-333 - [i2]Marco Tiloca, Alexandra Stagkopoulou, Gianluca Dini:
Performance and Security Evaluation of SDN Networks in OMNeT++/INET. CoRR abs/1609.04554 (2016) - [i1]Marco Tiloca, Christian Gehrmann, Ludwig Seitz:
Robust and Scalable DTLS Session Establishment. ERCIM News 2016(106) (2016) - 2015
- [c11]Marco Tiloca, Francesco Racciatti, Gianluca Dini:
Simulative Evaluation of Security Attacks in Networked Critical Infrastructures. SAFECOMP Workshops 2015: 314-323 - [c10]Christian Gehrmann, Marco Tiloca, Rikard Hoglund:
SMACK: Short message authentication check against battery exhaustion in the Internet of Things. SECON 2015: 274-282 - 2014
- [j2]Roberta Daidone, Gianluca Dini, Marco Tiloca:
A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wirel. Networks 20(5): 1223-1235 (2014) - [c9]Gianluca Dini, Marco Tiloca:
A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems. MESAS 2014: 77-94 - [c8]Marco Tiloca:
Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication. SIN 2014: 466 - 2013
- [b2]Marco Tiloca:
Solutions and Tools for Secure Communication in Wireless Sensor Networks. University of Pisa, Italy, 2013 - [b1]Stefano Tennina, Anis Koubaa, Roberta Daidone, Mário Alves, Petr Jurcík, Ricardo Severino, Marco Tiloca, Jan-Hinrich Hauer, Nuno Pereira, Gianluca Dini, Mélanie Bouroche, Eduardo Tovar:
IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints. Springer Briefs in Electrical and Computer Engineering, Springer 2013, ISBN 978-3-642-37367-1, pp. i-x, 1-169 - [j1]Gianluca Dini, Marco Tiloca:
HISS: A HIghly Scalable Scheme for Group Rekeying. Comput. J. 56(4): 508-525 (2013) - [c7]Gianluca Dini, Marco Tiloca:
On simulative analysis of attack impact in Wireless Sensor Networks. ETFA 2013: 1-8 - [c6]Marco Tiloca, Domenico De Guglielmo, Gianluca Dini, Giuseppe Anastasi:
SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks. ETFA 2013: 1-8 - [c5]Roberta Daidone, Gianluca Dini, Marco Tiloca:
STaR: a Reconfigurable and Transparent middleware for WSNs security. CONET/UBICITEC 2013: 73-88 - [c4]Roberta Daidone, Gianluca Dini, Marco Tiloca:
STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming. SENSORNETS 2013: 35-40 - 2012
- [c3]Gianluca Dini, Marco Tiloca:
ASF: An attack simulation framework for wireless sensor networks. WiMob 2012: 203-210 - 2011
- [c2]Roberta Daidone, Gianluca Dini, Marco Tiloca:
On experimentally evaluating the impact of security on IEEE 802.15.4 networks. DCOSS 2011: 1-6 - 2010
- [c1]Gianluca Dini, Marco Tiloca:
Considerations on Security in ZigBee Networks. SUTC/UMC 2010: 58-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint