What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Roberto Di Pietro
Google Scholar
ORCID:
0000-0003-1909-0336
51
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/dsn
Replicating Human Immune System via Harmonic Radar: A Framework and Preliminary Results in Thwarting Cyber-physical Attacks.
Nathanaël Denis
Roberto Di Pietro
2025
conf/icbc2
SoK: A Structured Analysis of Economic and Technical Stablecoin-Related Research.
Ahmed Mahrous
Maurantonio Caprolu
Roberto Di Pietro
2025
conf/asiaccs
NoBU: An effective and viable cyber-physical solution to thwart BadUSB attacks.
Andrea Ciccotelli
Maurantonio Caprolu
Roberto Di Pietro
2025
conf/esorics
The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment.
Eduard Marin
Jinwoo Kim
Alessio Pavoni
Mauro Conti
Roberto Di Pietro
2024
journals/compsec
MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning.
Omar Adel Ibrahim
Savio Sciancalepore
Roberto Di Pietro
2024
conf/esorics
MAG-JAM: Jamming Detection via Magnetic Emissions.
Omar Adel Ibrahim
Roberto Di Pietro
2023
journals/tifs
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning.
Gabriele Oligeri
Savio Sciancalepore
Simone Raponi
Roberto Di Pietro
2023
conf/fc
Understanding Polkadot Through Graph Analysis: Transaction Model, Network Properties, and Insights.
Hanaa Abbas
Maurantonio Caprolu
Roberto Di Pietro
2023
conf/icbc2
Account Clustering in the Polkadot Network: Heuristic, Experiments, and Insights.
Maurantonio Caprolu
Roberto Di Pietro
2023
conf/icbc2
LLD: A Low Latency Detection Solution to Thwart Cryptocurrency Pump & Dumps.
Ahmad Sani Bello
Jens Schneider
Roberto Di Pietro
2023
conf/acsac
Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones.
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
2023
conf/wisec
Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions.
Omar Adel Ibrahim
Roberto Di Pietro
2022
conf/cns
Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations.
Omar Adel Ibrahim
Gabriele Oligeri
Roberto Di Pietro
2022
conf/icics
FN2: Fake News DetectioN Based on Textual and Contextual Features.
Mouna Rabhi
Spiridon Bakiras
Roberto Di Pietro
2022
conf/icics
FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal.
Savio Sciancalepore
Simone Raponi
Daniele Caldarola
Roberto Di Pietro
2022
conf/wisec
MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions.
Omar Adel Ibrahim
Savio Sciancalepore
Roberto Di Pietro
2021
conf/cns
Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access.
Savio Sciancalepore
Pietro Tedeschi
Usman Riasat
Roberto Di Pietro
2021
conf/acsac
ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles.
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
2020
conf/cns
SecureAIS - Securing Pairwise Vessels Communications.
Ahmed Aziz
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
2020
conf/wisec
GNSS spoofing detection via opportunistic IRIDIUM signals.
Gabriele Oligeri
Savio Sciancalepore
Roberto Di Pietro
2020
conf/wisec
BrokenStrokes: on the (in)security of wireless keyboards.
Gabriele Oligeri
Savio Sciancalepore
Simone Raponi
Roberto Di Pietro
2019
conf/cns
DRAKE: Distributed Relay-Assisted Key Establishment.
Savio Sciancalepore
Roberto Di Pietro
2019
conf/cns
GPU Algorithms for K-Anonymity in Microdata.
Roberto Di Pietro
Leonardo Jero
Flavio Lombardi
Agusti Solanas
2019
conf/cns
JAM-ME: Exploiting Jamming to Accomplish Drone Mission.
Roberto Di Pietro
Gabriele Oligeri
Pietro Tedeschi
2019
conf/wisec
Detecting Drones Status via Encrypted Traffic Analysis.
Savio Sciancalepore
Omar Adel Ibrahim
Gabriele Oligeri
Roberto Di Pietro
2019
conf/wisec
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments).
Gabriele Oligeri
Savio Sciancalepore
Omar Adel Ibrahim
Roberto Di Pietro
2018
conf/esorics
Key is in the Air: Hacking Remote Keyless Entry Systems.
Omar Adel Ibrahim
Ahmed Mohamed Hussain
Gabriele Oligeri
Roberto Di Pietro
2018
conf/cns
Shooting to the Stars: Secure Location Verification via Meteor Burst Communications.
Savio Sciancalepore
Gabriele Oligeri
Roberto Di Pietro
2018
conf/cns
N-Guard: a Solution to Secure Access to NFC tags.
Roberto Di Pietro
Gabriele Oligeri
Xavier Salleras
Matteo Signorini
2017
conf/sec
HyBIS: Advanced Introspection for Effective Windows Guest Protection.
Roberto Di Pietro
Federico Franzoni
Flavio Lombardi
2015
conf/wisec
Freedom of speech: thwarting jammers via a probabilistic approach.
Roberto Di Pietro
Gabriele Oligeri
2014
conf/cns
A tunable proof of ownership scheme for deduplication using Bloom filters.
Jorge Blasco Alís
Roberto Di Pietro
Agustín Orfila
Alessandro Sorniotti
2013
journals/tifs
COKE Crypto-Less Over-the-Air Key Establishment.
Roberto Di Pietro
Gabriele Oligeri
2012
journals/compsec
A business-driven decomposition methodology for role mining.
Alessandro Colantonio
Roberto Di Pietro
Nino Vincenzo Verde
2012
conf/ccs
Boosting efficiency and security in proof of ownership for deduplication.
Roberto Di Pietro
Alessandro Sorniotti
2011
conf/wisec
Epidemic data survivability in unattended wireless sensor networks.
Roberto Di Pietro
Nino Vincenzo Verde
2010
journals/compsec
Taming role mining complexity in RBAC.
Alessandro Colantonio
Roberto Di Pietro
Alberto Ocello
Nino Vincenzo Verde
2010
conf/sec
Mining Business-Relevant RBAC States through Decomposition.
Alessandro Colantonio
Roberto Di Pietro
Alberto Ocello
Nino Vincenzo Verde
2010
conf/icics
Time Warp: How Time Affects Privacy in LBSs.
Luciana Marconi
Roberto Di Pietro
Bruno Crispo
Mauro Conti
2010
conf/icics
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization.
Flavio Lombardi
Roberto Di Pietro
2009
conf/sec
Mining Stable Roles in RBAC.
Alessandro Colantonio
Roberto Di Pietro
Alberto Ocello
Nino Vincenzo Verde
2009
conf/sec
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.
Alessandro Colantonio
Roberto Di Pietro
Alberto Ocello
Nino Vincenzo Verde
2009
conf/wisec
Collaborative authentication in unattended WSNs.
Roberto Di Pietro
Claudio Soriente
Angelo Spognardi
Gene Tsudik
2008
conf/sec
A Live Digital Forensic system for Windows networks.
Roberto Battistoni
Alessandro Di Biagio
Roberto Di Pietro
Matteo Formica
Luigi V. Mancini
2008
conf/sec
Leveraging Lattices to Improve Role Mining.
Alessandro Colantonio
Roberto Di Pietro
Alberto Ocello
2008
conf/wisec
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Mauro Conti
Roberto Di Pietro
Luigi V. Mancini
Alessandro Mei
2008
conf/wisec
RFID security and privacy: long-term research or short-term tinkering?
Gene Tsudik
Mike Burmester
Ari Juels
Alfred Kobsa
David Molnar
Roberto Di Pietro
Melanie R. Rieback
2007
conf/esorics
Information Confinement, Privacy, and Security in RFID Systems.
Roberto Di Pietro
Refik Molva
2006
conf/ccs
Addressing the shortcomings of one-way chains.
Roberto Di Pietro
Luigi V. Mancini
Antonio Durante
Vishwas Patil
2003
conf/sec
A Time Driven Methodology for Key Dimensioning in Multicast Communications.
Roberto Di Pietro
Luigi V. Mancini
Alessandro Mei
2002
conf/sec
Secure Selective Exclusion in Ad Hoc Wireless Network.
Roberto Di Pietro
Luigi V. Mancini
Sushil Jajodia
Coauthors
Agusti Solanas
(1)
Agustín Orfila
(1)
Ahmad Sani Bello
(1)
Ahmed Aziz
(1)
Ahmed Mahrous
(1)
Ahmed Mohamed Hussain
(1)
Alberto Ocello
(5)
Alessandro Colantonio
(6)
Alessandro Di Biagio
(1)
Alessandro Mei
(2)
Alessandro Sorniotti
(2)
Alessio Pavoni
(1)
Alfred Kobsa
(1)
Andrea Ciccotelli
(1)
Angelo Spognardi
(1)
Antonio Durante
(1)
Ari Juels
(1)
Bruno Crispo
(1)
Claudio Soriente
(1)
Daniele Caldarola
(1)
David Molnar
(1)
Eduard Marin
(1)
Federico Franzoni
(1)
Flavio Lombardi
(3)
Gabriele Oligeri
(12)
Gene Tsudik
(2)
Hanaa Abbas
(1)
Jens Schneider
(1)
Jinwoo Kim
(1)
Jorge Blasco Alís
(1)
Leonardo Jero
(1)
Luciana Marconi
(1)
Luigi V. Mancini
(5)
Matteo Formica
(1)
Matteo Signorini
(1)
Maurantonio Caprolu
(4)
Mauro Conti
(3)
Melanie R. Rieback
(1)
Mike Burmester
(1)
Mouna Rabhi
(1)
Nathanaël Denis
(1)
Nino Vincenzo Verde
(6)
Omar Adel Ibrahim
(8)
Pietro Tedeschi
(5)
Refik Molva
(1)
Roberto Battistoni
(1)
Roberto Di Pietro
(51)
Savio Sciancalepore
(14)
Simone Raponi
(3)
Spiridon Bakiras
(1)
Sushil Jajodia
(1)
Usman Riasat
(1)
Vishwas Patil
(1)
Xavier Salleras
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to