What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Savio Sciancalepore
Google Scholar
ORCID:
0000-0003-0974-3639
23
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Preventing Radio Fingerprinting through Low-Power Jamming.
Muhammad Irfan
Savio Sciancalepore
Gabriele Oligeri
2024
journals/compsec
MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning.
Omar Adel Ibrahim
Savio Sciancalepore
Roberto Di Pietro
2024
journals/popets
Selective Authenticated Pilot Location Disclosure for Remote ID-enabled Drones.
Pietro Tedeschi
Siva Ganesh Ganti
Savio Sciancalepore
2024
conf/eurosp
Attacking Operational Technology Without Specialized Knowledge: The Unspecialized OT Threat Actor Profile.
Stash Kempinski
Savio Sciancalepore
Emmanuele Zambon
Luca Allodi
2024
conf/wisec
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram.
Maurantonio Caprolu
Savio Sciancalepore
Aleksandar Grigorov
Velyan Kolev
Gabriele Oligeri
2023
journals/tifs
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning.
Gabriele Oligeri
Savio Sciancalepore
Simone Raponi
Roberto Di Pietro
2023
conf/acsac
The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time.
Saeif Alhazbi
Savio Sciancalepore
Gabriele Oligeri
2023
conf/acsac
Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones.
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
2022
conf/cns
PRM - Private Interference Discovery for IEEE 802.15 4 Networks.
Dominik Roy George
Savio Sciancalepore
2022
conf/icics
FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal.
Savio Sciancalepore
Simone Raponi
Daniele Caldarola
Roberto Di Pietro
2022
conf/acsac
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles.
Luca Morgese Zangrandi
Thijs van Ede
Tim M. Booij
Savio Sciancalepore
Luca Allodi
Andrea Continella
2022
conf/acsac
Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles.
Savio Sciancalepore
Dominik Roy George
2022
conf/wisec
MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions.
Omar Adel Ibrahim
Savio Sciancalepore
Roberto Di Pietro
2021
conf/cns
Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access.
Savio Sciancalepore
Pietro Tedeschi
Usman Riasat
Roberto Di Pietro
2021
conf/acsac
ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles.
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
2020
conf/cns
SecureAIS - Securing Pairwise Vessels Communications.
Ahmed Aziz
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
2020
conf/wisec
GNSS spoofing detection via opportunistic IRIDIUM signals.
Gabriele Oligeri
Savio Sciancalepore
Roberto Di Pietro
2020
conf/wisec
BrokenStrokes: on the (in)security of wireless keyboards.
Gabriele Oligeri
Savio Sciancalepore
Simone Raponi
Roberto Di Pietro
2019
conf/eurosp
Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges.
Pietro Tedeschi
Savio Sciancalepore
2019
conf/cns
DRAKE: Distributed Relay-Assisted Key Establishment.
Savio Sciancalepore
Roberto Di Pietro
2019
conf/wisec
Detecting Drones Status via Encrypted Traffic Analysis.
Savio Sciancalepore
Omar Adel Ibrahim
Gabriele Oligeri
Roberto Di Pietro
2019
conf/wisec
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments).
Gabriele Oligeri
Savio Sciancalepore
Omar Adel Ibrahim
Roberto Di Pietro
2018
conf/cns
Shooting to the Stars: Secure Location Verification via Meteor Burst Communications.
Savio Sciancalepore
Gabriele Oligeri
Roberto Di Pietro
Coauthors
Ahmed Aziz
(1)
Aleksandar Grigorov
(1)
Andrea Continella
(1)
Daniele Caldarola
(1)
Dominik Roy George
(2)
Emmanuele Zambon
(1)
Gabriele Oligeri
(9)
Luca Allodi
(2)
Luca Morgese Zangrandi
(1)
Maurantonio Caprolu
(1)
Muhammad Irfan
(1)
Omar Adel Ibrahim
(4)
Pietro Tedeschi
(6)
Roberto Di Pietro
(14)
Saeif Alhazbi
(1)
Savio Sciancalepore
(23)
Simone Raponi
(3)
Siva Ganesh Ganti
(1)
Stash Kempinski
(1)
Thijs van Ede
(1)
Tim M. Booij
(1)
Usman Riasat
(1)
Velyan Kolev
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to