Follow
Roberto Metere
Roberto Metere
Lecturer (Assistant Professor), University of York
Verified email at york.ac.uk - Homepage
Title
Cited by
Cited by
Year
Efficient delegated private set intersection on outsourced private datasets
A Abadi, S Terzis, R Metere, C Dong
IEEE Transactions on Dependable and Secure Computing 16 (4), 608-624, 2017
862017
Automated cryptographic analysis of the Pedersen commitment scheme
R Metere, C Dong
International Conference on Mathematical Methods, Models, and Architectures …, 2017
422017
Securing the Electric Vehicle Charging Infrastructure
R Metere, M Neaimeh, C Morisset, C Maple, X Bellekens, RM Czekster
arXiv preprint arXiv:2105.02905, 2021
352021
Socially-conforming cooperative computation in cloud networks
T Li, BB Gupta, R Metere
Journal of Parallel and Distributed Computing 117, 274-280, 2018
352018
Modelling load-changing attacks in cyber-physical systems
L Arnaboldi, RM Czekster, C Morisset, R Metere
Electronic Notes in Theoretical Computer Science 353, 39-60, 2020
312020
TrABin: Trustworthy analyses of binaries
A Lindner, R Guanciale, R Metere
Science of Computer Programming 174, 72-89, 2019
222019
Analyzing and patching SPEKE in ISO/IEC
F Hao, R Metere, SF Shahandashti, C Dong
IEEE Transactions on Information Forensics and Security 13 (11), 2844-2855, 2018
182018
Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings
RM Czekster, R Metere, C Morisset
Applied Sciences 12 (10), 5005, 2022
102022
Sound transpilation from binary to machine-independent code
R Metere, A Lindner, R Guanciale
Formal Methods: Foundations and Applications: 20th Brazilian Symposium, SBMF …, 2017
102017
End-to-End Verifiable E-Voting Trial for Polling Station Voting
F Hao, S Wang, S Bag, R Procter, SF Shahandashti, M Mehrnezhad, ...
IEEE Security & Privacy 18 (6), 6-13, 2020
82020
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models
RM Czekster, R Metere, C Morisset
arXiv preprint arXiv:2204.03676, 2022
72022
Poster: Towards a data centric approach for the design and verification of cryptographic protocols
L Arnaboldi, R Metere
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
62019
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+
F Li, D Xie, W Gao, K Chen, G Wang, R Metere
Journal of Ambient Intelligence and Humanized Computing, 1-10, 2024
52024
An Overview of Cyber Security and Privacy on the Electric Vehicle Charging Infrastructure
R Metere, Z Pourmirza, S Walker, M Neaimeh
arXiv preprint arXiv:2209.07842, 2022
52022
Automating cryptographic protocol language generation from structured specifications
R Metere, L Arnaboldi
2022 IEEE/ACM 10th International Conference on Formal Methods in Software …, 2022
42022
ValuED: A Blockchain-based Trading Platform to EncourageStudent Engagement in Higher Education
A Abadi, J Xiao, R Metere, R Shillcock
PsyArXiv, 2021
42021
Incentive-driven attacker for corrupting two-party protocols
Y Wang, R Metere, H Zhou, G Cui, T Li
Soft Computing 22 (23), 7733-7740, 2018
12018
Towards Achieving Energy Efficiency and Service Availability in O-RAN via Formal Verification
R Metere, K Ye, Y Gu, Z Zhang, D Alrajeh, M Sevegnani, P Yadav
arXiv preprint arXiv:2411.03943, 2024
2024
User-Guided Verification of Security Protocols via Sound Animation
K Ye, R Metere, P Yadav
arXiv preprint arXiv:2410.00676, 2024
2024
Enhancing Expressiveness in Stochastic Modelling of Cyber-Physical Systems
R Metere, RM Czekster, L Arnaboldi
2024 13th Mediterranean Conference on Embedded Computing (MECO), 1-4, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20