[go: up one dir, main page]

Follow
Roberto Metere
Roberto Metere
Lecturer (Assistant Professor), University of York
Verified email at york.ac.uk - Homepage
Title
Cited by
Cited by
Year
Efficient delegated private set intersection on outsourced private datasets
A Abadi, S Terzis, R Metere, C Dong
IEEE Transactions on Dependable and Secure Computing 16 (4), 608-624, 2017
1092017
Automated cryptographic analysis of the Pedersen commitment scheme
R Metere, C Dong
International Conference on Mathematical Methods, Models, and Architectures …, 2017
602017
Securing the Electric Vehicle Charging Infrastructure
R Metere, M Neaimeh, C Morisset, C Maple, X Bellekens, RM Czekster
arXiv preprint arXiv:2105.02905, 2021
572021
Modelling load-changing attacks in cyber-physical systems
L Arnaboldi, RM Czekster, C Morisset, R Metere
Electronic Notes in Theoretical Computer Science 353, 39-60, 2020
352020
Socially-conforming cooperative computation in cloud networks
T Li, BB Gupta, R Metere
Journal of Parallel and Distributed Computing 117, 274-280, 2018
352018
TrABin: Trustworthy analyses of binaries
A Lindner, R Guanciale, R Metere
Science of Computer Programming 174, 72-89, 2019
282019
An overview of cyber security and privacy on the electric vehicle charging infrastructure
R Metere, Z Pourmirza, S Walker, M Neaimeh
arXiv preprint arXiv:2209.07842, 2022
222022
Analyzing and patching SPEKE in ISO/IEC
F Hao, R Metere, SF Shahandashti, C Dong
IEEE Transactions on Information Forensics and Security 13 (11), 2844-2855, 2018
202018
Incorporating cyber threat intelligence into complex cyber-physical systems: A STIX model for active buildings
RM Czekster, R Metere, C Morisset
Applied Sciences 12 (10), 5005, 2022
162022
End-to-End Verifiable E-Voting Trial for Polling Station Voting
F Hao, S Wang, S Bag, R Procter, SF Shahandashti, M Mehrnezhad, ...
IEEE Security & Privacy 18 (6), 6-13, 2020
142020
Automating cryptographic protocol language generation from structured specifications
R Metere, L Arnaboldi
2022 IEEE/ACM 10th International Conference on Formal Methods in Software …, 2022
112022
CyberaCTIve: a STIX-based tool for cyber threat intelligence in complex models
RM Czekster, R Metere, C Morisset
arXiv preprint arXiv:2204.03676, 2022
112022
Sound transpilation from binary to machine-independent code
R Metere, A Lindner, R Guanciale
Brazilian Symposium on Formal Methods, 197-214, 2017
112017
Poster: Towards a data centric approach for the design and verification of cryptographic protocols
L Arnaboldi, R Metere
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
72019
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+
F Li, D Xie, W Gao, K Chen, G Wang, R Metere
Journal of Ambient Intelligence and Humanized Computing 15 (2), 1317-1326, 2024
62024
Securing the electric vehicle charging infrastructure. arXiv 2021
R Metere, M Neaimeh, C Morisset, C Maple, X Bellekens, RM Czekster
arXiv preprint arXiv:2105.02905, 0
5
ValuED: A Blockchain-based Trading Platform to Encourage Student Engagement in Higher Education
A Abadi, J Xiao, R Metere, R Shillcock
2025 IEEE 22nd International Conference on Software Architecture Companion …, 2025
42025
User-Guided Verification of Security Protocols via Sound Animation
K Ye, R Metere, P Yadav
International Conference on Software Engineering and Formal Methods, 33-51, 2024
22024
Formal Verification of Physical Layer Security Protocols for Next-Generation Communication Networks (extended version)
K Ye, R Metere, J Woodcock, P Yadav
arXiv preprint arXiv:2508.19430, 2025
12025
Enhancing Expressiveness in Stochastic Modelling of Cyber-Physical Systems
R Metere, RM Czekster, L Arnaboldi
2024 13th Mediterranean Conference on Embedded Computing (MECO), 1-4, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20