Paolo Gasti
Home
Contact
Publications
Grants
Projects
Invited Talks
Service
Paolo Gasti
Latest
SMARTCOPE: Smartphone Change Of Possession Evaluation for Continuous Authentication
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures
Passgan: A deep learning approach for password guessing
PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos
Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest
Continuous and Transparent Authentication of Haptic Users
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones
SILK-TV: Secret Information Leakage from Keystroke Timing Videos
The impact of application context on privacy and performance of keystroke authentication systems
USB Side-channel Attack on Tor
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel
PassGAN: A Deep Learning Approach for Password Guessing
Privacy-Aware Caching in Information-Centric Networking
FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization
HMOG: New behavioral biometric features for continuous authentication of smartphone users
Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones
Privacy-preserving user matching
Secure and efficient iris and fingerprint identification
Secure outsourced biometric authentication with performance evaluation on smartphones
Violating consumer anonymity: Geo-locating nodes in named data networking
A multimodal data set for evaluating continuous authentication performance in smartphones
Automatic identification of solid-phase medication intake using wireless wearable accelerometers
Continuous authentication with cognition-centric text production and revision features
Covert ephemeral communication in named data networking
Espresso: efficient privacy-preserving evaluation of sample set similarity
Privacy-preserving distance computation and proximity testing on earth, done right
Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics
Secure sensing over named data networking
A lightweight mechanism for detection of cache pollution attacks in named data networking
Cache privacy in named-data networking
DoS and DDoS in Named Data Networking
EsPRESSo: efficient privacy-preserving evaluation of sample set similarity
Optimizing bi-directional low-latency communication in named data networking
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
Privacy-preserving matching of community-contributed content
Privacy-Preserving Symptoms-to-Disease Mapping on Smartphones
Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data
Securing instrumented environments over content-centric networking: the case of lighting control and NDN
ANDaNA: Anonymous Named Data Networking Application
Fast and private computation of cardinality of set intersection and union
Genodroid: are privacy-preserving genomic tests ready for prime time?
NDN interest flooding attacks and countermeasures
On the Security of Password Manager Database Formats.
A new approach to securing audio conference tools
ANDaNA: Anonymous named data networking application
Anonymous named data networking application
Countering gattaca: efficient and secure testing of fully-sequenced human genomes
Fast and Private Computation of Set Intersection Cardinality.
On Re-use of randomness in broadcast encryption
Secure and efficient protocols for iris and fingerprint identification
Breaking and fixing the self encryption scheme for data security in mobile devices
Deniable cloud storage: sharing files via public-key deniability
On the integrity of network coding-based anonymous p2p file sharing networks
Resource management with X. 509 inter-domain authorization certificates (InterAC)
StemCerts-2: pairs of X. 509 v3 certificates for greater security, flexibility and convenience
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption.
Cite
×