Sara Lazzaro

Orcid: 0000-0002-0846-4980

According to our database1, Sara Lazzaro authored at least 20 papers between 2022 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Hiding identities of MQTT devices against a global network adversary.
EURASIP J. Inf. Secur., December, 2025

A black-box assessment of authentication and reliability in consumer IoT devices.
Pervasive Mob. Comput., 2025

MQTT-E: E2E encryption in MQTT via proxy re-encryption avoiding broker overloading.
Ad Hoc Networks, 2025

Securing Telephone Communication with Trusted Services.
Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025

2024
Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System.
Future Internet, July, 2024

MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT.
IEEE Trans. Dependable Secur. Comput., 2024

Enforcing security policies on interacting authentication systems.
Comput. Secur., 2024

K-Anonymous Payments in Pseudonymous Blockchains.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024

REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024

Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2024

Towards K-Anonymous Payments in Ethereum.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

A Framework for Secure Internet of Things Applications.
Proceedings of the 10th International Conference on Control, 2024

Beyond Likes: Enhancing Social Media Engagement Metrics.
Proceedings of the Advances in Social Networks Analysis and Mining - Proceedings of the 16th International Conference on Advances in Social Networks Analysis and Mining, 2024

2023
MQTT-A: A Broker-Bridging P2P Architecture to Achieve Anonymity in MQTT.
IEEE Internet Things J., September, 2023

Enabling anonymized open-data linkage by authorized parties.
J. Inf. Secur. Appl., May, 2023

Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive Applications.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

COPSEC: Compliance-Oriented IoT Security and Privacy Evaluation Framework.
Proceedings of the 14th ACM Wireless of the Students, 2023

2022
A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees.
Future Internet, 2022

An Anonymous Overlay Routing Protocol for Uplink-Intensive Applications.
CoRR, 2022

The Ginger: Another Spice to Hinder Attacks on Password Files.
Proceedings of the 18th International Conference on Web Information Systems and Technologies, 2022


  Loading...