A broadband wireless communications system for emergency management F Chiti, R Fantacci, L Maccari, D Marabissi, D Tarchi IEEE Wireless Communications 15 (3), 8-14, 2008 | 96 | 2008 |
A week in the life of three large Wireless Community Networks L Maccari, RL Cigno Ad Hoc Networks 24, 175-190, 2015 | 83 | 2015 |
Short authentication procedure in wireless data communications networks L Costa, G Freguglia, F Frosali, R Fantacci, L Maccari, T Pecorella US Patent 8,621,201, 2013 | 70 | 2013 |
Do we need a contact tracing app? L Maccari, V Cagno Computer Communications 166, 9-18, 2021 | 60 | 2021 |
Security analysis of IEEE 802.16 L Maccari, M Paoli, R Fantacci 2007 IEEE International Conference on Communications, 1160-1165, 2007 | 47 | 2007 |
An analysis of the Ninux wireless community network L Maccari 2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013 | 44 | 2013 |
How to reduce and stabilize MPR sets in OLSR networks L Maccari, RL Cigno 2012 IEEE 8th International Conference on Wireless and Mobile Computing …, 2012 | 38 | 2012 |
Avoiding eclipse attacks on Kad/Kademlia: an identity based approach R Fantacci, L Maccari, M Rosi, L Chisci, LM Aiello, M Milanesio 2009 IEEE International Conference on Communications, 1-5, 2009 | 35 | 2009 |
A secure and performant token-based authentication for infrastructure and mesh 802.1 X networks R Fantacci, L Maccari, T Pecorella, F Frosali IEEE Conference on Computer Communications (INFOCOM), 2006 | 30 | 2006 |
On the computation of centrality metrics for network security in mesh networks L Maccari, Q Nguyen, RL Cigno 2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016 | 29 | 2016 |
Pop-routing: Centrality-based tuning of control messages for faster route convergence L Maccari, RL Cigno IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 29 | 2016 |
What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things L Ghiro, F Restuccia, S D'Oro, S Basagni, T Melodia, L Maccari, RL Cigno arXiv preprint arXiv:2102.03750, 2021 | 28 | 2021 |
Analysis of secure handover for IEEE 802.1 x-based wireless ad hoc networks R Fantacci, L Maccari, T Pecorella, F Frosali IEEE Wireless Communications 14 (5), 21-29, 2007 | 28 | 2007 |
Mesh network firewalling with bloom filters L Maccari, R Fantacci, P Neira, RM Gasca 2007 IEEE International Conference on Communications, 1546-1551, 2007 | 28 | 2007 |
Augustus: a CCN router for programmable networks D Kirchner, R Ferdous, RL Cigno, L Maccari, M Gallo, D Perino, L Saino Proceedings of the 3rd ACM Conference on Information-Centric Networking, 31-39, 2016 | 26 | 2016 |
On the distributed computation of load centrality and its application to DV routing L Maccari, L Ghiro, A Guerrieri, A Montresor, RL Cigno IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2582-2590, 2018 | 21 | 2018 |
Improving P2P streaming in wireless community networks L Baldesi, L Maccari, RL Cigno Computer Networks 93, 389-403, 2015 | 21 | 2015 |
Where have all the MPRs gone? On the optimal selection of Multi-Point Relays L Maccari, M Maischberger, RL Cigno Ad Hoc Networks 77, 69-83, 2018 | 20 | 2018 |
Proof of networking: Can blockchains boost the next generation of distributed networks? L Ghiro, L Maccari, RL Cigno 2018 14th Annual Conference on Wireless On-demand Network Systems and …, 2018 | 20 | 2018 |
Fast distributed bi‐directional authentication for wireless sensor networks R Fantacci, F Chiti, L Maccari Security and Communication Networks 1 (1), 17-24, 2008 | 19 | 2008 |