What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stefano Tomasin
Google Scholar
ORCID:
0000-0003-3253-6793
14
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice.
Junqing Zhang
Francesco Ardizzon
Mattia Piana
Guanxiong Shen
Stefano Tomasin
2025
journals/tifs
Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach.
Mattia Piana
Francesco Ardizzon
Stefano Tomasin
2024
journals/tifs
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious Users.
Yun Wen
Gaojie Chen
Sisai Fang
Miaowen Wen
Stefano Tomasin
Marco Di Renzo
2024
journals/tifs
Multiple Access Wiretap Channel With Partial Rate-Limited Feedback.
Peng Xu
Gaojie Chen
Zheng Yang
Yong Li
Stefano Tomasin
2024
journals/tifs
Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces.
Stefano Tomasin
Tarek N. M. M. Elwakeel
Anna V. Guglielmi
Robin Maes
Nele Noels
Marc Moeneclaey
2024
journals/tifs
On Mixing Authenticated and Non-Authenticated Signals Against GNSS Spoofing.
Francesco Ardizzon
Laura Crosara
Stefano Tomasin
Nicola Laurenti
2024
journals/tifs
Worst-Case Spoofing Attack and Robust Countermeasure in Satellite Navigation Systems.
Laura Crosara
Francesco Ardizzon
Stefano Tomasin
Nicola Laurenti
2023
journals/tifs
Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks.
Roee Diamant
Stefano Tomasin
Francesco Ardizzon
Davide Eccher
Paolo Casari
2021
journals/tifs
Generalized Likelihood Ratio Test for GNSS Spoofing Detection in Devices With IMU.
Marco Ceccato
Francesco Formaggio
Nicola Laurenti
Stefano Tomasin
2015
journals/tifs
Resource Allocation for Secret Key Agreement Over Parallel Channels With Full and Partial Eavesdropper CSI.
Stefano Tomasin
Alberto Dall'Arche
2015
journals/tifs
On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading.
Augusto Ferrante
Nicola Laurenti
Chiara Masiero
Michele Pavon
Stefano Tomasin
2015
conf/cns
A Gale-Shapley algorithm for allocation of relayed parallel wiretap coding channels.
Stefano Tomasin
2014
journals/tifs
Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis.
Stefano Tomasin
Nicola Laurenti
2014
journals/tifs
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes.
Marco Baldi
Franco Chiaraluce
Nicola Laurenti
Stefano Tomasin
Francesco Renna
Coauthors
Alberto Dall'Arche
(1)
Anna V. Guglielmi
(1)
Augusto Ferrante
(1)
Chiara Masiero
(1)
Davide Eccher
(1)
Francesco Ardizzon
(5)
Francesco Formaggio
(1)
Francesco Renna
(1)
Franco Chiaraluce
(1)
Gaojie Chen
(2)
Guanxiong Shen
(1)
Junqing Zhang
(1)
Laura Crosara
(2)
Marc Moeneclaey
(1)
Marco Baldi
(1)
Marco Ceccato
(1)
Marco Di Renzo
(1)
Mattia Piana
(2)
Miaowen Wen
(1)
Michele Pavon
(1)
Nele Noels
(1)
Nicola Laurenti
(6)
Paolo Casari
(1)
Peng Xu
(1)
Robin Maes
(1)
Roee Diamant
(1)
Sisai Fang
(1)
Stefano Tomasin
(14)
Tarek N. M. M. Elwakeel
(1)
Yong Li
(1)
Yun Wen
(1)
Zheng Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to