Pericle Perazzo

Orcid: 0000-0003-3443-319X

According to our database1, Pericle Perazzo authored at least 44 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SmartFly: Fork-Free Super-Light Ethereum Classic Clients for Internet of Things.
IEEE Internet Things J., May, 2024

A Lightweight Cooperative Intrusion Detection System for RPL-based IoT.
Wirel. Pers. Commun., February, 2024

Deepfake Media Forensics: State of the Art and Challenges Ahead.
CoRR, 2024

On hardware acceleration of quantum-resistant FOTA systems in automotive.
Comput. Electr. Eng., 2024

Connectivity and Energy Consumption of Cyber-Physical Systems under Wi-Fi Attack.
Proceedings of the 15th IFIP Wireless and Mobile Networking Conference, 2024

2023
APBE: Anti-Piracy Security for SPARTN Augmented GNSS Services.
Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, 2023

2022
Indirect Revocable KP-ABE With Revocation Undoing Resistance.
IEEE Trans. Serv. Comput., 2022

A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things.
IEEE Internet Things J., 2022

Post-Quantum Attribute-Based Encryption: Performance Evaluation and Improvement for Embedded Systems.
Proceedings of the 2022 International Conference on Embedded Wireless Systems and Networks, 2022

A Rational Mining Strategy for Proof-of-Work Consensus Algorithms.
Proceedings of the 4th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2022

SegWit Extension and Improvement of the BlockSim Bitcoin Simulator.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Performance Evaluation of Attribute-Based Encryption in Automotive Embedded Platform for Secure Software Over-The-Air Update.
Sensors, 2021

SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks.
J. Inf. Secur. Appl., 2021

Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware.
Int. J. Inf. Sec., 2021

SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks.
CoRR, 2021

Performance evaluation of Attribute-Based Encryption on constrained IoT devices.
Comput. Commun., 2021

Assessing the Cost of Quantum Security for Automotive Over -The-Air Updates.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

On Improving SimBlock Blockchain Simulator.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
A lightweight and scalable attribute-based encryption system for smart cities.
Comput. Commun., 2020

Evaluating and improving the scalability of RPL security in the Internet of Things.
Comput. Commun., 2020

An Analysis of Routing Attacks Against IOTA Cryptocurrency.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
fABElous: An Attribute-Based Scheme for Industrial Internet of Things.
Proceedings of the IEEE International Conference on Smart Computing, 2019

On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems.
Proceedings of the IEEE International Conference on Smart Computing, 2019

BRUSCHETTA: An IoT Blockchain-Based Framework for Certifying Extra Virgin Olive Oil Supply Chain.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Virtual private ledgers: embedding private distributed ledgers over a public blockchain by cryptography.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

2018
Implementation of a wormhole attack against a rpl network: Challenges and effects.
Proceedings of the 14th Annual Conference on Wireless On-demand Network Systems and Services, 2018

ABE-Cities: An Attribute-Based Encryption System for Smart Cities.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

2017
Drone Path Planning for Secure Positioning and Secure Position Verification.
IEEE Trans. Mob. Comput., 2017

DIO Suppression Attack Against Routing in the Internet of Things.
IEEE Commun. Lett., 2017

Sensing the cities with social-aware unmanned aerial vehicles.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

An Implementation and Evaluation of the Security Features of RPL.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2017

A Low-Cost UAV-Based Secure Location Verification Method.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Secure Positioning in Wireless Sensor Networks through Enlargement Miscontrol Detection.
ACM Trans. Sens. Networks, 2016

Modeling Enlargement Attacks Against UWB Distance Bounding Protocols.
IEEE Trans. Inf. Forensics Secur., 2016

Localization with Guaranteed Bound on the Position Error using a Drone.
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016

2015
A uniformity-based approach to location privacy.
Comput. Commun., 2015

On Designing Resilient Location-Privacy Obfuscators.
Comput. J., 2015

The verifier bee: A path planner for drone-based secure location verification.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Secure positioning with non-ideal distance bounding protocols.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2014
Secure and Private Localization in Wireless Networks.
PhD thesis, 2014

On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding.
IEEE Commun. Lett., 2014

HUMsim: A Privacy-Oriented Human Mobility Simulator.
Proceedings of the Sensor Systems and Software - 5th International Conference, 2014

2013
Integration of Privacy Protection Mechanisms in Location-Based Services.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Uniform Obfuscation for Location Privacy.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012


  Loading...