Roberto Metere
Roberto Metere
Lecturer (Assistant Professor), University of York
Verified email at - Homepage
Cited by
Cited by
Efficient delegated private set intersection on outsourced private datasets
A Abadi, S Terzis, R Metere, C Dong
IEEE Transactions on Dependable and Secure Computing 16 (4), 608-624, 2017
Automated cryptographic analysis of the Pedersen commitment scheme
R Metere, C Dong
International Conference on Mathematical Methods, Models, and Architectures …, 2017
Socially-conforming cooperative computation in cloud networks
T Li, BB Gupta, R Metere
Journal of Parallel and Distributed Computing 117, 274-280, 2018
Modelling load-changing attacks in cyber-physical systems
L Arnaboldi, RM Czekster, C Morisset, R Metere
Electronic Notes in Theoretical Computer Science 353, 39-60, 2020
Securing the Electric Vehicle Charging Infrastructure
R Metere, M Neaimeh, C Morisset, C Maple, X Bellekens, RM Czekster
arXiv preprint arXiv:2105.02905, 2021
TrABin: Trustworthy analyses of binaries
A Lindner, R Guanciale, R Metere
Science of Computer Programming 174, 72-89, 2019
Analyzing and patching SPEKE in ISO/IEC
F Hao, R Metere, SF Shahandashti, C Dong
IEEE Transactions on Information Forensics and Security 13 (11), 2844-2855, 2018
Sound transpilation from binary to machine-independent code
R Metere, A Lindner, R Guanciale
Formal Methods: Foundations and Applications: 20th Brazilian Symposium, SBMF …, 2017
Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings
RM Czekster, R Metere, C Morisset
Applied Sciences 12 (10), 5005, 2022
End-to-End Verifiable E-Voting Trial for Polling Station Voting
F Hao, S Wang, S Bag, R Procter, SF Shahandashti, M Mehrnezhad, ...
IEEE Security & Privacy 18 (6), 6-13, 2020
Poster: Towards a data centric approach for the design and verification of cryptographic protocols
L Arnaboldi, R Metere
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Automating cryptographic protocol language generation from structured specifications
R Metere, L Arnaboldi
2022 IEEE/ACM 10th International Conference on Formal Methods in Software …, 2022
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models
RM Czekster, R Metere, C Morisset
arXiv preprint arXiv:2204.03676, 2022
ValuED: A Blockchain-based Trading Platform to EncourageStudent Engagement in Higher Education
A Abadi, J Xiao, R Metere, R Shillcock
PsyArXiv, 2021
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+
F Li, D Xie, W Gao, K Chen, G Wang, R Metere
Journal of Ambient Intelligence and Humanized Computing, 1-10, 2017
An Overview of Cyber Security and Privacy on the Electric Vehicle Charging Infrastructure
R Metere, Z Pourmirza, S Walker, M Neaimeh
arXiv preprint arXiv:2209.07842, 2022
Incentive-driven attacker for corrupting two-party protocols
Y Wang, R Metere, H Zhou, G Cui, T Li
Soft Computing 22 (23), 7733-7740, 2018
A Direct Lazy Sampling Proof Technique in Probabilistic Relational Hoare Logic
R Metere, C Dong
arXiv preprint arXiv:2311.16844, 2023
Checking and Automating Confidentiality Theory in Isabelle/UTP
L Bailey, J Woodcock, S Foster, R Metere
arXiv preprint arXiv:2310.10658, 2023
Machine-Checked Formalisation and Verification of Cryptographic Protocols
R Metere
Newcastle University, 2020
The system can't perform the operation now. Try again later.
Articles 1–20