Publications by Panagiotis Papadimitratos

Latest sync with DiVA: 11/19/2018 12:29:10 AM
Go to category:

Peer reviewed

Articles

[1]
M. Khodaei, H. Jin and P. Papadimitratos, "SECMACE : Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems," IEEE transactions on intelligent transportation systems (Print), vol. 19, no. 5, pp. 1430-1444, 2018.
[2]
M. Mirmohseni and P. P. Papadimitratos, "Secrecy Capacity Scaling in Large Cooperative Wireless Networks," IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1923-1939, 2017.
[3]
S. Raza et al., "SecureSense : End-to-end secure communication architecture for the cloud-connected Internet of Things," Future generations computer systems, vol. 77, pp. 40-51, 2017.
[4]
M. Hollick et al., "Toward a Taxonomy and Attacker Model for Secure Routing Protocols," Computer communication review, vol. 47, no. 1, pp. 43-48, 2017.
[5]
M. Ehdaie et al., "2D Hash Chain robust Random Key Distribution scheme," Information Processing Letters, vol. 116, no. 5, pp. 367-372, 2016.
[6]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 839-853, 2016.
[7]
M. Ehdaie et al., "Key splitting : making random key distribution schemes resistant against node capture," Security and Communication Networks, vol. 8, no. 3, pp. 431-445, 2015.
[8]
S. Gisdakis et al., "Secure and Privacy-Preserving Smartphone based Traffic Information Systems," IEEE transactions on intelligent transportation systems (Print), vol. 16, no. 3, 2015.
[9]
M. Khodaei and P. Papadimitratos, "The Key to Intelligent Transportation : Identity and Credential Management in Vehicular Communication Systems," IEEE Vehicular Technology Magazine, vol. 10, no. 4, pp. 63-69, 2015.
[10]
R. Shokri et al., "Hiding in the Mobile Crowd : Location Privacy through Collaboration," IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 3, pp. 266-279, 2014.
[11]
M. Fiore et al., "Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 12, no. 2, pp. 289-303, 2013.
[12]
M. Poturalski, P. Papadimitratos and J.-P. Hubaux, "Formal Analysis of Secure Neighbor Discovery in Wireless Networks," IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 6, pp. 355-367, 2013.
[13]
M. Poturalski et al., "On Secure and Precise IR-UWB Ranging," IEEE Transactions on Wireless Communications, vol. 11, no. 3, pp. 1087-1099, 2012.
[14]
V. Manolopoulos et al., "Smartphone-based Traffic Information System for Sustainable Cities," Mobile Computing and Communications Review, vol. 16, no. 4, pp. 30-31, 2012.
[15]
F. Kargl and P. Papadimitratos, "ACM WiSec 2011 poster and demo session," ACM Mobile Computing and Communications Review (ACM MC2R), vol. 15, no. 3, pp. 34-34, 2011.
[16]
M. Poturalski et al., "Distance Bounding with IEEE 802.15.4a : Attacks and Countermeasures," IEEE Transactions on Wireless Communications, vol. 10, pp. 1334-1344, 2011.
[17]
G. Calandriello et al., "On the Performance of Secure Vehicular Communication Systems," IEEE Transactions on Dependable and Secure Computing, 2011.
[18]
A. Festag, P. Papadimitratos and T. Tielert, "Design and Performance of Secure Geocast for Vehicular Communication," IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2456-2471, 2010.
[19]
P. Papadimitratos, J. Luo and J. -. Hubaux, "Randomized Countermeasure Against Parasitic Adversaries in Wireless Sensor Networks," IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, pp. 1036-1045, 2010.
[20]
P. Papadimitratos et al., "Vehicular Communication Systems : Enabling Technologies, Applications, and Future Outlook on Intelligent Transportation," IEEE Communications Magazine, vol. 47, no. 11, pp. 84-95, 2009.
[21]
P. Papadimitratos et al., "Secure Neighborhood Discovery : A Fundamental Element for Mobile Ad Hoc Networking," IEEE Communications Magazine, vol. 46, no. 2, pp. 132-139, 2008.
[22]
F. Kargl et al., "Secure Vehicular Communication Systems : Implementation, Performance, and Research Challenges," IEEE Communications Magazine, vol. 46, pp. 110-118, 2008.
[23]
P. Papadimitratos et al., "Secure Vehicular Communication Systems : Design and Architecture," IEEE Communications Magazine, vol. 46, pp. 100-109, 2008.
[24]
M. Piórkowski et al., "TraNS : Realistic Joint Traffic and Network Simulator for VANETs," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), vol. 12, no. 1, pp. 31-33, 2008.
[25]
M. Raya et al., "Eviction of Misbehaving and Faulty Nodes in Vehicular Networks," IEEE Journal on Selected Areas in Communications, vol. 25, no. 8, pp. 1557-1568, 2007.
[26]
P. Papadimitratos and Z. J. Haas, "Secure Data Communication in Mobile Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 343-356, 2006.
[27]
M. Raya, P. Papadimitratos and J. -. Hubaux, "Securing Vehicular Communications," IEEE wireless communications, vol. 13, no. 5, pp. 8-15, 2006.
[28]
P. Papadimitratos, S. Sankaranarayanan and A. Mishra, "A Bandwidth Sharing Approach to Improve Licensed Spectrum Utilization," IEEE Communications Magazine, vol. 43, no. 12, 2005.
[29]
P. Papadimitratos and Z. J. Haas, "Secure Routing for Mobile Ad Hoc Networks," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R) - Special Issue: Report on a Working Session on Security in Wireless Ad hoc Networks, vol. 7, no. 1, pp. 79-80, 2003.
[30]
P. Papadimitratos and Z. Haas, "Secure message transmission in mobile ad hoc networks," Ad hoc networks, vol. 1, no. 1, pp. 193-209, 2003.
[31]
P. Papadimitratos and Z. J. Haas, "Securing the Internet Routing Infrastructure," IEEE Communications Magazine, vol. 40, no. 10, pp. 60-68, 2002.

Conference papers

[32]
K. Zhang and P. Papadimitratos, "Analysis of the eect of the distance-decreasing aacks on GNSS authenticated signals," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 285-286.
[33]
M. Khodaei and P. Papadimitratos, "Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs," in Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., 2018.
[34]
J. Borsub and P. Papadimitratos, "Hardened registration process for participatory sensing," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 281-282.
[35]
C. Vaas, P. Papadimitratos and I. Martinovic, "Increasing mix-zone eicacy for pseudonym change in VANETs using cha messages," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 287-288.
[36]
F. Forsby et al., "Lightweight X.509 Digital Certificates for the Internet of Things," in 3rd International Conference on Interoperability in IoT, InterIoT 2017 on conjunction with 4th International Conference on Safety and Security in Internet of Things, SaSeIoT 2017, 2018, pp. 123-133.
[37]
S. Ghasemi-Goojani and P. Papadimitratos, "On the Capacity of Gaussian "Dirty" Z-Interference Channel with Common State," in 2018 52ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2018.
[38]
M. Khodaei, H. Noroozi and P. Papadimitratos, "Privacy Preservation through Uniformity," in Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., 2018.
[39]
M. Khodaei, H. Noroozi and P. Papadimitratos, "Privacy preservation through uniformity," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 279-280.
[40]
S. Hylamia et al., "Security on harvested power," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 296-298.
[41]
H. Noroozi, M. Khodaei and P. Papadimitratos, "VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure," in Proceedings of the ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec), Stockholm, Sweden, June 2018., 2018.
[42]
H. Noroozi, M. Khodaei and P. Papadimitratos, "VPKIaaS: A highly-available and dynamically-scalable vehicular public-key infrastructure," in WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018, pp. 302-304.
[43]
M. Gerami et al., "Optimal secure partial-repair in distributed storage systems," in 2017 51st Annual Conference on Information Sciences and Systems, CISS 2017, 2017.
[44]
H. Jin and P. Papadimitratos, "Poster : Bloom Filter based certificate validation for VANET," in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, 2017, pp. 273-274.
[45]
H. Jin and P. Papadimitratos, "Poster : Bloom Filter based certificate validation for VANET," in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, 2017, pp. 273-274.
[46]
P. Babaheidarian, S. Salimi and P. Papadimitratos, "Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward," in 2017 51st Annual Conference on Information Sciences and Systems, CISS 2017, 2017.
[47]
H. Jin and P. Papadimitratos, "Proactive certificate validation for VANETs," in IEEE Vehicular Networking Conference, VNC, 2017.
[48]
M. Khodaei, A. Messing and P. Papadimitratos, "RHyTHM: A Randomized Hybrid Scheme To Hide in the Mobile Crowd," in IEEE Vehicular Networking Conference (VNC) 2017, 2017, pp. 155-158.
[49]
H. Jin and P. Papadimitratos, "Resilient privacy protection for location-based services through decentralization," in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, 2017, pp. 253-258.
[50]
H. Jin and P. Papadimitratos, "Resilient privacy protection for location-based services through decentralization," in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, 2017, pp. 253-258.
[51]
G. Stylianos, T. Giannetsos and P. Papadimitratos, "Android privacy C(R)ache : Reading your external storage and sensors for fun and profit," in PAMCO 2016 - Proceedings of the 2nd MobiHoc International Workshop on Privacy-Aware Mobile Computing, 2016, pp. 1-10.
[52]
M. Khodaei and P. Papadimitratos, "Evaluating On-demand Pseudonym Acquisition Policies in Vehicular Communication Systems," in Workshop on Internet of Vehicles and Vehicles of Internet (IoV-VoI 2016), 2016, pp. 7-12.
[53]
M. Wiese and P. Papadimitratos, "Frequency hopping does not increase anti-jamming resilience of wireless channels," in 2016 International Zurich Seminar on Communications, March 2 – 4, 2016, 2016.
[54]
M. Franz and P. Papadimitratos, "Preface," in 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, 2016.
[55]
M. Wiese et al., "Secure Estimation for Unstable Systems," in 2016 IEEE 55th Conference on Decision and Control, CDC 2016, 2016, pp. 5059-5064.
[56]
P. Babaheidarian, S. Salimi and P. Papadimitratos, "Security in the Gaussian interference channel : Weak and moderately weak interference regimes," in 2016 IEEE International Symposium on Information Theory - Proceedings, 2016, pp. 2434-2438.
[57]
P. Papadimitratos, "Security on Wheels : Security and Privacy for Vehicular Communication Systems," in CCS'16 : PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, pp. 1855-1856.
[58]
M. Wiese et al., "Uncertain wiretap channels and secure estimation," in 2016 IEEE International Symposium on Information Theory, 2016, pp. 2004-2008.
[59]
K. Zhang, R. A. Tuhin and P. Papadimitratos, "Detection and Exclusion RAIM Algorithm against Spoofing/Replaying Attacks," in International Symposium on GNSS, 2015.
[60]
P. Babaheidarian, S. Salimi and P. Papadimitratos, "Finite-SNR Regime Analysis of The Gaussian Wiretap Multiple-Access Channel," in 2015 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2015, 2015, pp. 307-314.
[61]
K. Zhang and P. Papadimitratos, "GNSS receiver tracking performance analysis under distance-decreasing attacks," in Proceedings of 2015 International Conference on Localization and GNSS, 2015.
[62]
S. Salimi et al., "Key Agreement over an Interference Channel with Noiseless Feedback : Achievable Region & Distributed Allocation," in IEEE Conference on Communications and Network Security (CNS), 2015, pp. 59-64.
[63]
L. Ye et al., "Path metric authentication for low-power and lossy networks," in 1st ACM International Workshop on Cyber-Physical Systems for Smart Water Networks, CySWater 2015, 2015.
[64]
H. Jin and P. Papadimitratos, "Resilient collaborative privacy for Location-Based services," in 20th Nordic Conference on Secure IT Systems, NordSec 2015, 2015, pp. 47-63.
[65]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "SHIELD : a data verification framework for participatory sensing systems," in WiSec '15 Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015.
[66]
H. Jin and P. Papadimitratos, "Scaling VANET Security Through Cooperative Message Verification," in 2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, pp. 275-278.
[67]
M. Mirmohseni and P. Papadimitratos, "Active adversaries from an information-theoretic perspective : Data modification attacks," in IEEE International Symposium on Information Theory - Proceedings, 2014, pp. 791-795.
[68]
M. Mirmohseni and P. Papadimitratos, "Colluding eavesdroppers in large cooperative wireless networks," in IWCIT 2014 - Iran Workshop on Communication and Information Theory, 2014.
[69]
M. Mirmohseni and P. Papadimitratos, "Constrained colluding eavesdroppers : an information-theoretic model," in International Zurich Seminar on Communications, 2014, pp. 63-66.
[70]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "SPPEAR : Security & privacy-preserving architecture for participatory-sensing applications," in WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2014, pp. 39-50.
[71]
M. Mirmohseni and P. Papadimitratos, "Scaling laws for secrecy capacity in cooperative wireless networks," in INFOCOM, 2014 Proceedings IEEE, 2014, pp. 1527-1535.
[72]
M. Khodaei, H. Jin and P. Papadimitratos, "Towards deploying a scalable & robust vehicular identity and credential management infrastructure," in Vehicular Networking Conference (VNC), 2014 IEEE, 2014, pp. 33-40.
[73]
T. Giannetsos, S. Gisdakis and P. Papadimitratos, "Trustworthy People-Centric Sensing : Privacy, Security and User Incentives Road-Map," in 2014 13th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2014, 2014, pp. 39-46.
[74]
S. Gisdakis, D. Katselis and P. Papadimitratos, "Allocating adversarial resources in wireless networks," in 2013 Proceedings of the 21st European Signal Processing Conference (EUSIPCO), 2013, p. 6811603.
[75]
D. Katselis and P. Papadimitratos, "On secret key generation through multipath for wireless networks," in 2013 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2013, pp. 148-153.
[76]
S. Gisdakis et al., "SEROSA : SERvice oriented security architecture for Vehicular Communications," in 2013 IEEE Vehicular Networking Conference (VNC), 2013 IEEE, 2013, pp. 111-118.
[77]
N. Alexiou et al., "Towards a secure and privacy-preserving multi-service vehicular architecture," in 2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2013, 2013, p. 6583472.
[78]
N. Alexiou et al., "VeSPA : Vehicular security and privacy-preserving architecture," in HotWiSec 2013 : Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy, 2013, pp. 19-23.
[79]
M. Ehdaie et al., "Key Splitting for Random Key Distribution Schemes," in 7th Workshop on Secure Network Protocols (NPSec12), 2012.
[80]
M. Ehdaie et al., "Key splitting for random key distribution schemes," in Network Protocols (ICNP), 2012 20th IEEE International Conference on, 2012, p. 6459951.
[81]
G. Stylianos and P. Papadimitratos, "On the Optimal Allocation of Adversarial Resources," in Mobicom'12 The 18th Annual International Conference on Mobile Computing and Networking : Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking, 2012, pp. 33-38.
[82]
V. Manolopoulos et al., "Smartphone-based Traffic Information System for Sustainable Cities," in HotMobile, 13th International Workshop on Mobile Computing Systems and Applications; San Diego, CA, USA, 28-29 February, 2012, 2012.
[83]
P. Papadimitratos and J. Deng, "Stealthy pre-attacks against random key pre-distribution security," in Communications (ICC), 2012 IEEE International Conference on, 2012, pp. 955-959.
[84]
C. Neuberg et al., "A Mobile World of Security - The Model," in IEEE Information Theory Society Conference on Information Sciences and Systems (CISS), 2011, pp. 1-6.
[85]
R. Shokri et al., "Collaborative Location Privacy," in 8th IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), 2011, pp. 500-509.
[86]
J. M. Bohli et al., "Resilient Data Aggregation for Unattended WSNs," in 6th International IEEE Workshop on PracticalᅵIssues in Building Sensor Network Applicationsᅵ(IEEE SenseApp 2011), in conjunction with the 36th IEEE LCN, 2011, pp. 994-1002.
[87]
M. Fiore et al., "Secure Neighbor Position Discovery in Vehicular Networks," in Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2011, pp. 71-78.
[88]
V. Manolopoulos et al., "Securing smartphone based ITS," in ITST 2011 : Proceedings of the 11th International Conference on ITS Telecommunications, 2011, 2011, pp. 201-206.
[89]
W. Galuba et al., "Castor : Scalable Secure Routing for Ad Hoc Networks," in 2010 PROCEEDINGS IEEE INFOCOM, 2010, pp. 1-9.
[90]
M. Flury et al., "Effectiveness of distance-decreasing attacks against impulse radio ranging," in Proceedings of the Third ACM Conference on Wireless Network Security (WiSec), 2010, pp. 117-128.
[91]
M. Poturalski et al., "The Cicada Attack : Degradation and Denial of Service in IR Ranging," in IEEE International Conference on Ultra-Wideband (ICUWB), 2010.
[92]
R. Shokri et al., "A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks," in Second ACM Conference on Wireless Network Security (WiSec’09), 2009.
[93]
N. Ristanovic et al., "Adaptive Message Authentication for Vehicular Networks," in Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, VANET 2009., 2009, pp. 121-122.
[94]
G. Mezzour et al., "Privacy-Preserving Relationship Path Discovery in Social Networks," in Proceedings of the 8th International Conference on Cryptology and Network Security, 2009, pp. 189-208.
[95]
P. Papadimitratos, G. Mezzour and J. -. Hubaux, "Certificate Revocation List Distribution in Vehicular Communication Systems," in Proceedings of the Fifth ACM International Workshop on Vehicular Inter-NETworking (VANET'08), 2008, pp. 86-87.
[96]
T. Moore et al., "Fast Exclusion of Errant Devices from Vehicular Networks," in Proceedings of the Fifth IEEE-CS Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008, pp. 135-143.
[97]
P. Papadimitratos and A. Jovanovic, "GNSS-based Positioning : Attacks and Countermeasures," in Proceedings of the IEEE Military Communications Conference (MILCOM), 2008, pp. 1-7.
[98]
J. Luo, P. Papadimitratos and J.-P. Hubaux, "GossiCrypt : Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries," in Proceedings of the Fifth IEEE-CS Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008, pp. 441-450.
[99]
P. Papadimitratos et al., "Impact of Vehicular Communication Security on Transportation Safety," in Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM) Workshop on Mobile Networking for Vehicular Environments (MOVE), 2008, pp. 1-6.
[100]
M. Raya et al., "On Data-Centric Trust Establishment in Ephemeral Ad hoc Networks," in Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM), 2008, pp. 1238-1246.
[101]
M. Poturalski, P. Papadimitratos and J. -. Hubaux, "Secure Neighbor Discovery in Wireless Networks : Formal Investigation of Possibility," in ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008, pp. 189-200.
[102]
P. Papadimitratos and P. Ardelean, "Secure and Privacy-Enhancing Vehicular Communication : Demonstration of Implementation and Operation," in Proceedings of the IEEE Vehicular Technology Conference (VTC-Fall), 2008, pp. 1-2.
[103]
M. Poturalski, P. Papadimitratos and J. -. Hubaux, "Towards Provable Secure Neighbor Discovery in Wireless Networks," in FMSE '08 Proceedings of the 6th ACM workshop on Formal methods in security engineering, 2008, pp. 31-41.
[104]
M. Kafsi et al., "VANET Connectivity Analysis," in Proceedings of the IEEE Workshop on Automotive Networking and Applications (Autonet), 2008.
[105]
J. Panchard et al., "Wireless Sensor Networking for Rain-fed Farming Decision Support," in Proceedings of the ACM SIGCOMM Worskhop on Networked Systems for Developing Regions, 2008, pp. 31-36.
[106]
P. Papadimitratos et al., "Architecture for Secure and Private Vehicular Communications," in IEEE International Conference on ITS Telecommunications (IEEE ITST), 2007, pp. 1-6.
[107]
R. Shokri et al., "Efficient and Adjustable Recipient Anonymity in Mobile Ad Hoc Networks," in 2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, pp. 1-3.
[108]
G. Calandriello et al., "Efficient and Robust Pseudonymous Authentication in VANET," in VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, 2007, pp. 19-27.
[109]
P. Haghani et al., "Efficient and Robust Secure Aggregation for Sensor Networks," in Proceedings of the Third IEEE ICNP Workshop on Secure Network Protocols (NPSec), 2007, pp. 1-6.
[110]
J. Freudiger et al., "Mix-zones for Location Privacy in Vehicular Networks," in Proceedings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (Win-ITS), 2007.
[111]
C. Harsch, A. Festag and P. Papadimitratos, "Secure Position-Based Routing for VANETs," in Proceedings of the IEEE 66th Vehicular Technology Conference (VTC-Fall), 2007, pp. 26-30.
[112]
E. Schoch et al., "Impact of Pseudonym Changes on Geographic Routing in VANETs," in LECTURE NOTES IN COMPUTER SCIENCE, 2006, pp. 43-57.
[113]
P. Papadimitratos et al., "Privacy and Identity Management for Vehicular Communication Systems : A Position Paper," in Workshop on Standards for Privacy in User-Centric Identity Management, 2006.
[114]
T. Leinmüller et al., "SEVECOM - Secure Vehicle Communication," in Proceedings of IST Mobile Summit, 2006.
[115]
P. Papadimitratos, V. Gligor and J. -. Hubaux, "Securing Vehicular Communications - Assumptions, Requirements, and Principles," in Proceedings of the Fourth Workshop on Embedded Security in Cars (ESCAR), 2006, pp. 5-14.
[116]
S. Sankaranarayanan, P. Papadimitratos and A. Mishra, "A Bandwidth Sharing Approach to Improve Licenced Spectrum Utilization," in IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), 2005, pp. 279-288.
[117]
P. Papadimitratos, A. Mishra and D. Rosenburgh, "A Cross-Layer Design Approach to Enhance 802.15.4," in Proceedings of the IEEE Military Communications Conference MILCOM, 2005, pp. 1719-1726.
[118]
S. Sankaranarayanan, P. Papadimitratos and A. Mishra, "Enhancing Wireless Spectrum Utilization with a Cellular-Ad hoc Overlay Architecture," in Proceedings of the IEEE Military Communications Conference (MILCOM), 2005, pp. 405-415.
[119]
P. Papadimitratos and Z. J. Haas, "Secure On-Demand Distance Vector Routing in Ad hoc Networks," in Proceedings of the IEEE Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005, pp. 168-171.
[120]
P. Papadimitratos and Z. J. Haas, "Secure Route Discovery for QoS-Aware Routing in Ad Hoc Networks," in Proceedings of the IEEE Sarnoff Symposium on Advances in Wired and Wireless Communications, 2005, pp. 176-179.
[121]
P. Papadimitratos and Z. J. Haas, "Secure Data Transmission in Mobile Ad Hoc Networks," in Proceedings of the ACM MobiCom Workshop on Wireless Security (WiSe), 2003, pp. 41-50.
[122]
P. Papadimitratos and Z. J. Haas, "Secure Link State Routing for Mobile Ad Hoc Networks," in Proceedings of the IEEE Symposium on Applications and the Internet Workshop on Security and Assurance in Ad hoc Networks, 2003, pp. 379-383.
[123]
P. Papadimitratos, E. G. Sirer and Z. J. Haas, "Path Set Selection in Mobile Ad Hoc Networks," in Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2002, pp. 1-11.
[124]
P. Papadimitratos and Z. J. Haas, "Secure Routing for Mobile Ad Hoc Networks," in Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002, pp. 193-204.

Non-peer reviewed

Articles

[125]
P. Papadimitratos and J. -. Hubaux, "Report on the “Secure Vehicular Communications : Results and Challenges Ahead” Workshop," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), vol. 12, pp. 53-64, 2008.

Conference papers

[126]
K. Bauer et al., "Welcome message from the PADE chairs," in Welcome message from the PADE chairs  (Editorial), 2013, pp. lxi-lxii.
[127]
N. Ristanovic et al., "Adaptive Message Authentication for Multi-Hop Networks," in International Conference on Wireless On-Demand Network Systems and Services (IEEE/IFIP WONS), 2011, pp. 96-103.
[128]
B. Wiedersheim et al., "Privacy in Inter-Vehicular Networks : Why Simple Pseudonym Change Is Not Enough," in International Conference on Wireless On-Demand Network Systems and Services (IEEE/IFIP WONS), 2010, pp. 176-183.
[129]
P. Papadimitratos, "“On the road” : Reflections on the Security of Vehicular Communication Systems," in Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES), 2008, pp. 359-363.
[130]
P. Papadimitratos, Z. J. Haas and J. P. Hubaux, "How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET," in IEEE-CS Third International Conference on BroadBand Communcations, Networks, and Systems (IEEE BroadNets), 2006.
[131]
P. Papadimitratos, "Secure Ad hoc Networking," in Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC), 2006, pp. 10-14.

Chapters in books

[132]
H. Jin, M. Khodaei and P. Papadimitratos, "Security and Privacy in Vehicular Social Networks," in Vehicular Social Networks, : Taylor & Francis Group, 2016.
[133]
P. Papadimitratos, "Digital Signatures," in Modern Cryptography : Theory and Applications, M. Burmester, S. Gritzalis, S. Katsikas, V. Chrissikopoulos Ed., Athens : Papasotiriou Books, 2011.
[134]
P. Papadimitratos and J. -. Hubaux, "Secure Vehicular Communication Systems," in Encyclopedia of Cryptography and Security, H.C.A. van Tilborg and S. Jajodia Ed., 2nd ed. Berlin : Springer, 2011, pp. 1140-1143.
[135]
P. Papadimitratos, "Security and Privacy Mechanisms for Vehicular Networks," in Vehicular Networking : Automotive Applications and Beyond, Marc Emmelmann, Bernd Bochow, C. Christopher Kellum Ed., 1st ed. : John Wiley & Sons, 2010, pp. 105-127.
[136]
P. Papadimitratos and Z. J. Haas, "Securing Mobile Ad Hoc Networks," in Mobile Computing Handbook, Mohammad Ilyas, Imad Mahgoub Ed., : Boca Raton, FL: Auerbach Publications, 2005.
[137]
Z. J. Haas et al., "Wireless ad hoc networks," in Encyclopedia of Telecommunications, John G. Proakis Ed., 1st ed. : John Wiley & Sons, 2003.

Theses

[138]
P. Papadimitratos, "Secure and Fault-Tolerant Communication in Mobile Ad Hoc Networks," Doctoral thesis : Cornell University, 2005.

Reports

[139]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "Android Privacy C(R)ache : Reading your External Storageand Sensors for Fun and Profit," KTH Royal Institute of Technology, 2015.
[140]
S. Gisdakis, P. Papadimitratos and A. Giannetsos, "Data Verification andPrivacy-respecting User Remuneration in Mobile Crowd Sensing," , 2015.
[141]
S. Gisdakis, T. Giannetsos and P. Papadimitratos, "Security, Privacy & Incentive Provision for Mobile Crowd Sensing Systems," , 2015.
[142]
M. Poturalski, P. Papadimitratos and J. -. Hubaux, "Formal Analysis of Secure Neighbor Discovery in Wireless Networks," , 2013.
[143]
W. Galuba et al., "More on Castor : the Scalable Secure Routing Protocol for Ad-hoc Networks," EPFL, Tech. Rep. LSIR-REPORT-2009-002, LISIR-REPORT, 2009-002, 2009.
[146]
M. Poturalski, P. Papadimitratos and J. -. Hubaux, "Secure Neighbor Discovery in Wireless Networks : Is It Possible?," Ecole Polytechnique Fedrale de Lausanne, EPFL-LCA Report, 2007-004, 2007.
[147]
M. Raya et al., "Certificate Revocation in Vehicular Networks," , LCA Report, 2006-006, 2006.

Patents

Patents

[150]
P. Papadimitratos and A. Jovanovic, "Method to secure GNSS based locations in a device having GNSS receiver," us 8159391-B2 (2012-04-17), 2009.
[151]
Z. J. Haas and P. Papadimitratos, "Secure end-to-end communication in mobile ad hoc networks," us 2004025018 , 2003.