default search action
Nicola Laurenti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Laura Crosara, Nicola Laurenti, Leonardo Badia:
Age of information is not just a number: Status updates against an eavesdropping node. Ad Hoc Networks 155: 103388 (2024) - [j28]Laura Crosara, Francesco Ardizzon, Stefano Tomasin, Nicola Laurenti:
Worst-Case Spoofing Attack and Robust Countermeasure in Satellite Navigation Systems. IEEE Trans. Inf. Forensics Secur. 19: 2039-2050 (2024) - [j27]Francesco Ardizzon, Laura Crosara, Stefano Tomasin, Nicola Laurenti:
On Mixing Authenticated and Non-Authenticated Signals Against GNSS Spoofing. IEEE Trans. Inf. Forensics Secur. 19: 4480-4493 (2024) - [c35]Anna V. Guglielmi, Laura Crosara, Stefano Tomasin, Nicola Laurenti:
Physical-Layer Challenge-Response Authentication with IRS and Single-Antenna Devices. ICC Workshops 2024: 560-565 - [c34]Laura Crosara, Anna V. Guglielmi, Nicola Laurenti, Stefano Tomasin:
Divergence-Minimizing Attack Against Challenge-Response Authentication with IRSs. ICC Workshops 2024: 1986-1991 - [c33]Francesco Ardizzon, Laura Crosara, Stefano Tomasin, Nicola Laurenti:
Enhancing Spreading Code Signal Authentication in GNSS: a GLRT-based Approach. ICL-GNSS 2024: 1-6 - 2023
- [j26]Francesco Ardizzon, Nicola Laurenti, Stefano Tomasin:
Multiround Message Scheduling for Fast GNSS Packet Broadcasting. IEEE Trans. Aerosp. Electron. Syst. 59(5): 5993-6004 (2023) - [c32]Francesco Ardizzon, Amedeo Giuliani, Nicola Laurenti, Stefano Tomasin:
Adversarial Learning for Advantage Distillation in Secret Key Agreement Over UWAC. ICC Workshops 2023: 715-720 - [c31]Laura Crosara, Francesco Ardizzon, Stefano Tomasin, Nicola Laurenti:
Performance Evaluation of an Indistinguishability Based Attack Against Spreading Code Secured GNSS Signals. PLANS 2023: 542-552 - [i12]Francesco Ardizzon, Laura Crosara, Stefano Tomasin, Nicola Laurenti:
On the Limits of Cross-Authentication Checks for GNSS Signals. CoRR abs/2304.02977 (2023) - [i11]Laura Crosara, Nicola Laurenti, Leonardo Badia:
It Is Rude to Ask a Sensor Its Age-of-Information: Status Updates Against an Eavesdropping Node. CoRR abs/2306.08475 (2023) - 2022
- [j25]Francesco Ardizzon, Laura Crosara, Nicola Laurenti, Stefano Tomasin, Nicola Montini:
Authenticated Timing Protocol Based on Galileo ACAS. Sensors 22(16): 6298 (2022) - [c30]Sanja Miljanovic, Francesco Ardizzon, Laura Crosara, Nicola Laurenti, Luca Canzian, Enrico Lovisotto, Nicola Montini, Oscar Pozzobon, Rigas T. Ioannides:
Experimental Testing and Impact Analysis of Jamming and Spoofing Attacks on Professional GNSS Receivers. ICL-GNSS (Work in Progress) 2022 - 2021
- [j24]Tomaso Erseghe, Gianluca Caparra, Francesco Formaggio, Nicola Laurenti:
On Trading the Spreading Gain With the Coding Rate and Its Application to GNSS Data Component Design. IEEE Trans. Aerosp. Electron. Syst. 57(4): 2526-2539 (2021) - [j23]Marco Ceccato, Francesco Formaggio, Nicola Laurenti, Stefano Tomasin:
Generalized Likelihood Ratio Test for GNSS Spoofing Detection in Devices With IMU. IEEE Trans. Inf. Forensics Secur. 16: 3496-3509 (2021) - [c29]Anna V. Guglielmi, Alberto Muraro, Giulia Cisotto, Nicola Laurenti:
Information Theoretic Key Agreement Protocol based on ECG signals. GLOBECOM 2021: 1-6 - [i10]Anna V. Guglielmi, Alberto Muraro, Giulia Cisotto, Nicola Laurenti:
Information Theoretic Key Agreement Protocol based on ECG signals. CoRR abs/2105.07037 (2021) - 2020
- [j22]Federico Chiariotti, Chiara Pielli, Nicola Laurenti, Andrea Zanella, Michele Zorzi:
A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks with a Learning Counterstrategy. ACM Trans. Sens. Networks 16(1): 6:1-6:25 (2020) - [c28]Thomas Marchioro, Nicola Laurenti, Deniz Gündüz:
Adversarial Networks for Secure Wireless Communications. ICASSP 2020: 8748-8752 - [c27]Leonardo Chiarello, Anna V. Guglielmi, Nicola Laurenti, Fabio Bernardi, Francesco Longhi, Samuele Fantinato:
Detection of GNSS Spoofing by a Receiver in Space via Fusion of Consistency Metrics. ICC 2020: 1-6 - [c26]Francesco Ardizzon, Nicola Laurenti, Stefano Tomasin:
Sub-Messages Scheduling in GNSS Packet Broadcasting By Message Splitting. ICL-GNSS 2020: 1-6 - [c25]Nicola Laurenti, Anna Poltronieri:
Optimal Compromise among Security, Availability and Resources in the Design of Sequences for GNSS Spreading Code Authentication. ICL-GNSS 2020: 1-6
2010 – 2019
- 2018
- [c24]Francesco Formaggio, Stefano Tomasin, Gianluca Caparra, Silvia Ceccato, Nicola Laurenti:
Authentication of Galileo GNSS Signal by Superimposed Signature with Artificial Noise. EUSIPCO 2018: 2573-2577 - [c23]Silvia Ceccato, Francesco Formaggio, Gianluca Caparra, Nicola Laurenti, Stefano Tomasin:
Exploiting side-information for resilient GNSS positioning in mobile phones. PLANS 2018: 1515-1524 - 2017
- [c22]Chiara Pielli, Federico Chiariotti, Nicola Laurenti, Andrea Zanella, Michele Zorzi:
A game-theoretic analysis of energy-depleting jamming attacks. ICNC 2017: 100-104 - [c21]Gianluca Caparra, Marco Centenaro, Nicola Laurenti, Stefano Tomasin:
Optimization of anchor nodes' usage for location verification systems. ICL-GNSS 2017: 1-6 - 2016
- [j21]Alessandro Biason, Nicola Laurenti, Michele Zorzi:
Achievable Secrecy Rates of an Energy Harvesting Device. IEEE J. Sel. Areas Commun. 34(5): 1502-1517 (2016) - [j20]Ahmed Benfarah, Stefano Tomasin, Nicola Laurenti:
Power Allocation in Multiuser Parallel Gaussian Broadcast Channels With Common and Confidential Messages. IEEE Trans. Commun. 64(6): 2326-2339 (2016) - [j19]Sang-Yoon Chang, Yih-Chun Hu, Nicola Laurenti:
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers. IEEE/ACM Trans. Netw. 24(2): 1095-1108 (2016) - [c20]Ahmed Benfarah, Nicola Laurenti, Stefano Tomasin:
Resource Allocation for Downlink of 5G Systems with OFDMA under Secrecy Outage Constraints. GLOBECOM Workshops 2016: 1-6 - [c19]Gianluca Caparra, Marco Centenaro, Nicola Laurenti, Stefano Tomasin, Lorenzo Vangelista:
Energy-based anchor node selection for IoT physical layer authentication. ICC 2016: 1-6 - [c18]Gianluca Caparra, Silvia Sturaro, Nicola Laurenti, Christian Wullems:
Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes. ICL-GNSS 2016: 1-6 - [i9]Hiroyuki Endo, Mikio Fujiwara, Mitsuo Kitamura, Toshiyuki Ito, Morio Toyoshima, Yoshihisa Takayama, Hideki Takenaka, Ryosuke Shimizu, Nicola Laurenti, Giuseppe Vallone, Paolo Villoresi, Takao Aoki, Masahide Sasaki:
Free-space optical channel estimation for physical layer security. CoRR abs/1607.07799 (2016) - 2015
- [j18]Augusto Ferrante, Nicola Laurenti, Chiara Masiero, Michele Pavon, Stefano Tomasin:
On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading. IEEE Trans. Inf. Forensics Secur. 10(5): 941-952 (2015) - [c17]Alessandro Biason, Atieh Rajabi Khamesi, Nicola Laurenti, Michele Zorzi:
Achievable Secrecy Rates of an Energy Harvesting Device with a Finite Battery. GLOBECOM 2015: 1-7 - [i8]Alessandro Biason, Nicola Laurenti, Michele Zorzi:
Achievable Secrecy Rates of an Energy Harvesting Device. CoRR abs/1508.05181 (2015) - 2014
- [j17]Alessandro Chiuso, Nicola Laurenti, Luca Schenato, Andrea Zanella:
LQG-like control of scalar systems over communication channels: The role of data losses, delays and SNR limitations. Autom. 50(12): 3155-3163 (2014) - [j16]Stefano Tomasin, Francesco Trentini, Nicola Laurenti:
Secret Key Agreement by LLR Thresholding and Syndrome Feedback over AWGN Channel. IEEE Commun. Lett. 18(1): 26-29 (2014) - [j15]Stefano Tomasin, Nicola Laurenti:
Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis. IEEE Trans. Inf. Forensics Secur. 9(10): 1708-1719 (2014) - [j14]Marco Baldi, Franco Chiaraluce, Nicola Laurenti, Stefano Tomasin, Francesco Renna:
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes. IEEE Trans. Inf. Forensics Secur. 9(11): 1765-1779 (2014) - [c16]Ahmed Benfarah, Stefano Tomasin, Nicola Laurenti:
Parallel BCC with one common and two confidential messages and imperfect CSIT. GLOBECOM Workshops 2014: 1373-1378 - [c15]Stefano Tomasin, Nicola Laurenti:
Secret message transmission by HARQ with multiple encoding. ICC 2014: 2191-2196 - [c14]Nicola Laurenti, Stefano Tomasin, Francesco Renna:
Resource allocation for secret transmissions on parallel Rayleigh channels. ICC 2014: 2209-2214 - [c13]Francesco Renna, Nicola Laurenti, Stefano Tomasin:
Achievable secrecy rates over MIMOME Gaussian channels with GMM signals in low-noise regime. VITAE 2014: 1-5 - [i7]Stefano Tomasin, Nicola Laurenti:
Secret Message Transmission by HARQ with Multiple Encoding. CoRR abs/1401.3088 (2014) - [i6]Ahmed Benfarah, Stefano Tomasin, Nicola Laurenti:
On the Secrecy Capacity Region of Parallel Broadcast Channel with Common and Confidential Messages. CoRR abs/1403.6982 (2014) - [i5]Francesco Renna, Nicola Laurenti, Stefano Tomasin:
Achievable Secrecy Rates over MIMOME Gaussian Channels with GMM Signals in Low-Noise Regime. CoRR abs/1404.3411 (2014) - 2013
- [j13]Francesco Renna, Matthieu R. Bloch, Nicola Laurenti:
Semi-Blind Key-Agreement over MIMO Fading Channels. IEEE Trans. Commun. 61(2): 620-627 (2013) - [c12]Alessandro Chiuso, Nicola Laurenti, Luca Schenato, Andrea Zanella:
LQG cheap control over SNR-limited lossy channels with delay. CDC 2013: 3988-3993 - [c11]Alessandro Chiuso, Nicola Laurenti, Luca Schenato, Andrea Zanella:
LQG cheap control subject to packet loss and SNR limitations. ECC 2013: 2374-2379 - [c10]Francesca Gerlin, Nicola Laurenti, Giampiero Naletto, Giuseppe Vallone, Paolo Villoresi, Luciana Bonino, Sergio Mottini, Zoran Sodnik:
Design optimization for quantum communications in a GNSS intersatellite network. ICL-GNSS 2013: 1-6 - [i4]Francesco Renna, Nicola Laurenti, Stefano Tomasin, Marco Baldi, Nicola Maturo, Marco Bianchi, Franco Chiaraluce, Matthieu R. Bloch:
Low-power Secret-key Agreement over OFDM. CoRR abs/1302.4767 (2013) - [i3]Augusto Ferrante, Nicola Laurenti, Chiara Masiero, Michele Pavon, Stefano Tomasin:
On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels. CoRR abs/1303.0707 (2013) - [i2]Marco Baldi, Marco Bianchi, Franco Chiaraluce, Nicola Laurenti, Stefano Tomasin, Francesco Renna:
Secrecy Transmission on Block Fading Channels: Theoretical Limits and Performance of Practical Codes. CoRR abs/1305.3055 (2013) - 2012
- [j12]Francesco Renna, Nicola Laurenti, H. Vincent Poor:
Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels. IEEE Trans. Inf. Forensics Secur. 7(4): 1354-1367 (2012) - [j11]Paolo Baracca, Nicola Laurenti, Stefano Tomasin:
Physical Layer Authentication over MIMO Fading Wiretap Channels. IEEE Trans. Wirel. Commun. 11(7): 2564-2573 (2012) - [c9]Sang-Yoon Chang, Yih-Chun Hu, Nicola Laurenti:
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination. MobiCom 2012: 77-88 - 2011
- [j10]Gianfranco L. Cariolaro, Tomaso Erseghe, Nicola Laurenti, Gianfranco L. Pierobon:
New Results on the Spectral Analysis of Multi-h CPM Signals. IEEE Trans. Commun. 59(7): 1893-1903 (2011) - [c8]Francesco Renna, Matthieu R. Bloch, Nicola Laurenti:
Semi-Blind Key-Agreement over MIMO Fading Channels. ICC 2011: 1-6 - [c7]Matteo Canale, Davide Bacco, Simon Calimani, Francesco Renna, Nicola Laurenti, Giuseppe Vallone, Paolo Villoresi:
A prototype of a free-space QKD scheme based on the B92 protocol. ISABEL 2011: 186:1-186:5 - [c6]Jason J. Haas, Yih-Chun Hu, Nicola Laurenti:
Low-cost mitigation of privacy loss due to radiometric identification. Vehicular Ad Hoc Networks 2011: 31-40 - [c5]Francesco Renna, Nicola Laurenti, Yih-Chun Hu:
The jamming game in an OFDM setting. VALUETOOLS 2011: 496-505 - [c4]Paolo Baracca, Nicola Laurenti, Stefano Tomasin:
Physical layer authentication over an OFDM fading wiretap channel. VALUETOOLS 2011: 648-657 - [c3]Francesco Renna, Nicola Laurenti, H. Vincent Poor:
Achievable secrecy rates for wiretap OFDM with QAM constellations. VALUETOOLS 2011: 679-686 - 2010
- [j9]Tomaso Erseghe, Nicola Laurenti:
An Analysis of GLRT Packet Detection for WiMedia UWB Applications. IEEE Trans. Veh. Technol. 59(3): 1229-1241 (2010) - [c2]Francesco Renna, Nicola Laurenti, H. Vincent Poor:
High SNR secrecy rates with OFDM signaling over fading channels. PIMRC 2010: 2692-2697
2000 – 2009
- 2008
- [j8]Danilo Manstretta, Nicola Laurenti, Rinaldo Castello:
A Reconfigurable Narrow-Band MB-OFDM UWB Receiver Architecture. IEEE Trans. Circuits Syst. II Express Briefs 55-II(4): 324-328 (2008) - 2007
- [j7]Nicola Laurenti, Giovanni De Poli, Daniele Montagner:
A Nonlinear Method for Stochastic Spectrum Estimation in the Modeling of Musical Sounds. IEEE Trans. Speech Audio Process. 15(2): 531-541 (2007) - 2006
- [j6]Tomaso Erseghe, Nicola Laurenti:
Design and performance evaluation of a full-duplex operating receiver for time-hopping UWB. Mob. Networks Appl. 11(4): 429-439 (2006) - [i1]Gianfranco L. Cariolaro, Tomaso Erseghe, Nicola Laurenti:
Exact Spectral Analysis of Single-h and Multi-h CPM Signals through PAM decomposition and Matrix Series Evaluation. CoRR abs/cs/0609050 (2006) - 2005
- [j5]Tomaso Erseghe, Nicola Laurenti, Valentina Cellini:
A multicarrier architecture based upon the affine Fourier transform. IEEE Trans. Commun. 53(5): 853-862 (2005) - 2002
- [c1]Anna Berno, Nicola Laurenti:
Time and Frequency Synchronization for Hiperlan/2. NETWORKING 2002: 491-502 - 2001
- [j4]Lorenzo Vangelista, Nicola Laurenti:
Efficient implementations and alternative architectures for OFDM-OQAM systems. IEEE Trans. Commun. 49(4): 664-675 (2001) - 2000
- [j3]Gianfranco L. Cariolaro, Tomaso Erseghe, Peter Kraniauskas, Nicola Laurenti:
Multiplicity of fractional Fourier transforms and their relationships. IEEE Trans. Signal Process. 48(1): 227-241 (2000)
1990 – 1999
- 1998
- [j2]Norbert J. Fliege, Lorenzo Vangelista, Nicola Laurenti:
Comments on "Orthogonal multiple carrier data transmission". Eur. Trans. Telecommun. 9(6): 571-572 (1998) - [j1]Gianfranco L. Cariolaro, Tomaso Erseghe, Peter Kraniauskas, Nicola Laurenti:
A unified framework for the fractional Fourier transform. IEEE Trans. Signal Process. 46(12): 3206-3219 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint