Riccardo Lazzeretti

Orcid: 0000-0003-3835-9679

According to our database1, Riccardo Lazzeretti authored at least 52 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Is AI a Trick or T(h)reat for Securing Programmable Data Planes?
IEEE Netw., November, 2024

Anonymous Federated Learning via Named-Data Networking.
Future Gener. Comput. Syst., March, 2024

A comprehensive security and performance assessment of UAV authentication schemes.
Secur. Priv., 2024

Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices.
IEEE Secur. Priv., 2024

Do You Trust Your Device? Open Challenges in IoT Security Analysis.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Exploring Jamming and Hijacking Attacks for Micro Aerial Drones.
Proceedings of the IEEE International Conference on Communications, 2024

X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
A survey on security and privacy issues of UAVs.
Comput. Networks, April, 2023

Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2023

GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Sim2Testbed Transfer: NDN Performance Evaluation.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems.
ACM Trans. Cyber Phys. Syst., 2021

ICN PATTA: ICN Privacy Attack Through Traffic Analysis.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Bloom Filter based Collective Remote Attestation for Dynamic Networks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Malware Triage for Early Identification of Advanced Persistent Threat Activities.
DTRAP, 2020

Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges.
IEEE Commun. Surv. Tutorials, 2020

2019
SEMBA: secure multi-biometric authentication.
IET Biom., 2019

dAPTaset: A Comprehensive Mapping of APT-Related Data.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
Anonymous subject identification and privacy information management in video surveillance.
Int. J. Inf. Sec., 2018

PADS: Practical Attestation for Highly Dynamic Swarm Topologies.
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018

Leveraging Blockchain to Enable Smart-Health Applications.
Proceedings of the 4th IEEE International Forum on Research and Technology for Society and Industry, 2018

GATE and FENCE: Geo-Blocking Protocols for Named Data Networking.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

2017
ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks.
ACM Trans. Internet Techn., 2017

Building Regular Registers with Rational Malicious Servers and Anonymous Clients - Extended Version.
CoRR, 2017

Toward secure and efficient attestation for highly dynamic swarms: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Ensuring information security by using Haskell's advanced type system.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Building Regular Registers with Rational Malicious Servers and Anonymous Clients.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Malware Triage Based on Static Features and Public APT Reports.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2016
Piecewise Function Approximation With Private Data.
IEEE Trans. Inf. Forensics Secur., 2016

Learning With Privacy in Consensus + Obfuscation.
IEEE Signal Process. Lett., 2016

Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

2015
Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing.
IEEE Signal Process. Mag., 2015

Privacy preserving cloud computing through piecewise approximation of multivariate functions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Secure multi-party consensus gossip algorithms.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Private Computing with Garbled Circuits [Applications Corner].
IEEE Signal Process. Mag., 2013

Secure Evaluation of Private Functions through Piecewise Linear Approximation.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
General function evaluation in a STPC setting via piecewise linear approximation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Privacy preserving ECG quality evaluation.
Proceedings of the Multimedia and Security Workshop, 2012

An efficient protocol for private iris-code matching by means of garbled circuits.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2011

Division between encrypted integers by means of Garbled Circuits.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

2010
Privacy preserving evaluation of signal quality with application to ECG analysis.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Privacy-preserving fingercode authentication.
Proceedings of the Multimedia and Security Workshop, 2010

A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2009
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
IACR Cryptol. ePrint Arch., 2009

Efficient privacy-preserving classification of ECG signals.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

2008
Lossless compression of encrypted grey-level and color images.
Proceedings of the 2008 16th European Signal Processing Conference, 2008


  Loading...