default search action
Riccardo Lazzeretti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Nicolò Dal Fabbro, Riccardo Lazzeretti:
Anonymous Federated Learning via Named-Data Networking. Future Gener. Comput. Syst. 152: 288-303 (2024) - [j16]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. IEEE Secur. Priv. 22(1): 10-23 (2024) - [j15]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti:
Is AI a Trick or T(h)reat for Securing Programmable Data Planes? IEEE Netw. 38(6): 146-152 (2024) - [j14]Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes. Secur. Priv. 7(1) (2024) - [c32]Edoardo Liberati, Alessandro Visintin, Riccardo Lazzeretti, Mauro Conti, A. Selcuk Uluagac:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. ACNS (1) 2024: 183-210 - [c31]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. ICC 2024: 1939-1944 - [c30]Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca:
Do You Trust Your Device? Open Challenges in IoT Security Analysis. SECRYPT 2024: 568-575 - [i12]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. CoRR abs/2402.03114 (2024) - [i11]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. CoRR abs/2403.03858 (2024) - 2023
- [j13]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
A survey on security and privacy issues of UAVs. Comput. Networks 224: 109626 (2023) - [j12]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(4): 2427-2455 (2023) - [c29]Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini:
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks. EuroS&P 2023: 615-630 - [c28]Emilio Coppa, Alessio Izzillo, Riccardo Lazzeretti, Simone Lenti:
FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns. VizSec 2023: 1-11 - 2022
- [c27]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal:
Sim2Testbed Transfer: NDN Performance Evaluation. ARES 2022: 63:1-63:9 - [i10]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey. CoRR abs/2209.02835 (2022) - 2021
- [j11]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Chia-Mu Yu:
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. ACM Trans. Cyber Phys. Syst. 5(1): 1:1-1:2 (2021) - [c26]Salvatore Frontera, Riccardo Lazzeretti:
Bloom Filter based Collective Remote Attestation for Dynamic Networks. ARES 2021: 80:1-80:10 - [c25]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
ICN PATTA: ICN Privacy Attack Through Traffic Analysis. LCN 2021: 443-446 - [i9]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues of UAVs. CoRR abs/2109.14442 (2021) - 2020
- [j10]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise:
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges. IEEE Commun. Surv. Tutorials 22(4): 2447-2461 (2020) - [j9]Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti:
Malware Triage for Early Identification of Advanced Persistent Threat Activities. DTRAP 1(3): 16:1-16:17 (2020)
2010 – 2019
- 2019
- [j8]Mauro Barni, Giulia Droandi, Riccardo Lazzeretti, Tommaso Pignata:
SEMBA: secure multi-biometric authentication. IET Biom. 8(6): 411-421 (2019) - [c24]Giuseppe Laurenza, Riccardo Lazzeretti:
dAPTaset: A Comprehensive Mapping of APT-Related Data. IOSec/MSTEC/FINSEC@ESORICS 2019: 217-225 - 2018
- [j7]Ying Luo, Sen-Ching S. Cheung, Riccardo Lazzeretti, Tommaso Pignata, Mauro Barni:
Anonymous subject identification and privacy information management in video surveillance. Int. J. Inf. Sec. 17(3): 261-278 (2018) - [c23]Alberto Compagno, Mauro Conti, Stefano Munari, Riccardo Lazzeretti:
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking. LCN 2018: 580-588 - [c22]Angelo Capossele, Andrea Gaglione, Michele Nati, Mauro Conti, Riccardo Lazzeretti, Paolo Missier:
Leveraging Blockchain to Enable Smart-Health Applications. RTSI 2018: 1-6 - [c21]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise:
PADS: Practical Attestation for Highly Dynamic Swarm Topologies. SIoT 2018: 18-27 - [i8]Giulia Droandi, Mauro Barni, Riccardo Lazzeretti, Tommaso Pignata:
SEMBA: SEcure multi-biometric authentication. CoRR abs/1803.10758 (2018) - [i7]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise:
PADS: Practical Attestation for Highly Dynamic Swarm Topologies. CoRR abs/1806.05766 (2018) - [i6]Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti:
Malware triage for early identification of Advanced Persistent Threat activities. CoRR abs/1810.07321 (2018) - 2017
- [j6]Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzeretti:
ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks. ACM Trans. Internet Techn. 18(1): 6:1-6:22 (2017) - [c20]Antonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti, Roberto Baldoni:
Building Regular Registers with Rational Malicious Servers and Anonymous Clients. CSCML 2017: 50-67 - [c19]Giuseppe Laurenza, Leonardo Aniello, Riccardo Lazzeretti, Roberto Baldoni:
Malware Triage Based on Static Features and Public APT Reports. CSCML 2017: 288-305 - [c18]Matteo Di Pirro, Mauro Conti, Riccardo Lazzeretti:
Ensuring information security by using Haskell's advanced type system. ICCST 2017: 1-6 - [c17]Mauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi:
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features. WIFS 2017: 1-6 - [c16]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise:
Toward secure and efficient attestation for highly dynamic swarms: poster. WISEC 2017: 281-282 - [i5]Mauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi:
It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features. CoRR abs/1701.04221 (2017) - [i4]Antonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti, Roberto Baldoni:
Building Regular Registers with Rational Malicious Servers and Anonymous Clients - Extended Version. CoRR abs/1704.05521 (2017) - 2016
- [j5]Paolo Braca, Riccardo Lazzeretti, Stefano Maranò, Vincenzo Matta:
Learning With Privacy in Consensus + Obfuscation. IEEE Signal Process. Lett. 23(9): 1174-1178 (2016) - [j4]Riccardo Lazzeretti, Tommaso Pignata, Mauro Barni:
Piecewise Function Approximation With Private Data. IEEE Trans. Inf. Forensics Secur. 11(3): 642-657 (2016) - [c15]Kassem Kallas, Benedetta Tondi, Riccardo Lazzeretti, Mauro Barni:
Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach. GameSec 2016: 455-466 - [i3]Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzeretti:
ODIN: Obfuscation-based privacy preserving consensus algorithm for Decentralized Information fusion in smart device Networks. CoRR abs/1610.06694 (2016) - 2015
- [j3]Mauro Barni, Giulia Droandi, Riccardo Lazzeretti:
Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing. IEEE Signal Process. Mag. 32(5): 66-76 (2015) - [c14]Riccardo Lazzeretti, Tommaso Pignata:
Privacy preserving cloud computing through piecewise approximation of multivariate functions. CNS 2015: 515-523 - [p2]Riccardo Lazzeretti, Mauro Barni:
Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications. Medical Data Privacy Handbook 2015: 569-611 - [i2]Riccardo Lazzeretti, Tommaso Pignata, Mauro Barni:
Piecewise Function Approximation with Private Data. CoRR abs/1503.05144 (2015) - 2014
- [c13]Riccardo Lazzeretti, Steven Horn, Paolo Braca, Peter Willett:
Secure multi-party consensus gossip algorithms. ICASSP 2014: 7406-7410 - 2013
- [j2]Riccardo Lazzeretti, Mauro Barni:
Private Computing with Garbled Circuits [Applications Corner]. IEEE Signal Process. Mag. 30(2): 123-127 (2013) - [c12]Mauro Barni, Massimo Bernaschi, Riccardo Lazzeretti, Tommaso Pignata, Alessandro Sabellico:
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting. DPM/SETOP 2013: 66-82 - [c11]Riccardo Lazzeretti, Tommaso Pignata, Mauro Barni:
Secure Evaluation of Private Functions through Piecewise Linear Approximation. WIFS 2013: 55-60 - [p1]Riccardo Lazzeretti, Pierluigi Failla, Mauro Barni:
Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation. Security and Privacy in Biometrics 2013: 149-185 - 2012
- [c10]Ying Luo, Sen-ching Samson Cheung, Tommaso Pignata, Riccardo Lazzeretti, Mauro Barni:
An efficient protocol for private iris-code matching by means of garbled circuits. ICIP 2012: 2653-2656 - [c9]Riccardo Lazzeretti, Jorge Guajardo, Mauro Barni:
Privacy preserving ECG quality evaluation. MM&Sec 2012: 165-174 - [c8]Tommaso Pignata, Riccardo Lazzeretti, Mauro Barni:
General function evaluation in a STPC setting via piecewise linear approximation. WIFS 2012: 55-60 - 2011
- [j1]Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider:
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 452-468 (2011) - [c7]Riccardo Lazzeretti, Mauro Barni:
Division between encrypted integers by means of Garbled Circuits. WIFS 2011: 1-6 - 2010
- [c6]Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Alessandro Piva, Fabio Scotti:
A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates. BTAS 2010: 1-7 - [c5]Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Fabio Scotti, Alessandro Piva:
Privacy-preserving fingercode authentication. MM&Sec 2010: 231-240 - [c4]Mauro Barni, Jorge Guajardo, Riccardo Lazzeretti:
Privacy preserving evaluation of signal quality with application to ECG analysis. WIFS 2010: 1-6
2000 – 2009
- 2009
- [c3]Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider:
Secure Evaluation of Private Linear Branching Programs with Medical Applications. ESORICS 2009: 424-439 - [c2]Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider, Vladimir Kolesnikov:
Efficient privacy-preserving classification of ECG signals. WIFS 2009: 91-95 - [i1]Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider:
Secure Evaluation of Private Linear Branching Programs with Medical Applications. IACR Cryptol. ePrint Arch. 2009: 195 (2009) - 2008
- [c1]Riccardo Lazzeretti, Mauro Barni:
Lossless compression of encrypted grey-level and color images. EUSIPCO 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint