Paolo Gasti

Orcid: 0000-0001-7810-3614

According to our database1, Paolo Gasti authored at least 52 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication.
Pervasive Mob. Comput., 2024

2020
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures.
IEEE Trans. Netw. Serv. Manag., 2020

Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2019

Privacy-Aware Caching in Information-Centric Networking.
IEEE Trans. Dependable Secur. Comput., 2019

PILOT: Password and PIN information leakage from obfuscated typing videos.
J. Comput. Secur., 2019

Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage.
CoRR, 2019

PassGAN: A Deep Learning Approach for Password Guessing.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
The impact of application context on privacy and performance of keystroke authentication systems.
J. Comput. Secur., 2018

USB side-channel attack on Tor.
Comput. Networks, 2018

Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest.
Proceedings of the 2018 IEEE International Symposium on Local and Metropolitan Area Networks, 2018

SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Proceedings of the Computer Security, 2018

2017
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel.
IEEE Trans. Inf. Forensics Secur., 2017

2016
HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users.
IEEE Trans. Inf. Forensics Secur., 2016

Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones.
IEEE Trans. Inf. Forensics Secur., 2016

FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2015

HMOG: A New Biometric Modality for Continuous Authentication of Smartphone Users.
CoRR, 2015

Privacy-preserving User Matching.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity.
J. Comput. Secur., 2014

Optimizing bi-directional low-latency communication in named data networking.
Comput. Commun. Rev., 2014

A multimodal data set for evaluating continuous authentication performance in smartphones.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014

Secure Sensing over Named Data Networking.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Continuous authentication with cognition-centric text production and revision features.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Automatic identification of solid-phase medication intake using wireless wearable accelerometers.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Privacy-preserving distance computation and proximity testing on earth, done right.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Covert ephemeral communication in named data networking.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
A lightweight mechanism for detection of cache pollution attacks in Named Data Networking.
Comput. Networks, 2013

Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Cache Privacy in Named-Data Networking.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

DoS and DDoS in Named Data Networking.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Privacy-Preserving Matching of Community-Contributed Content.
Proceedings of the Computer Security - ESORICS 2013, 2013

Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control
CoRR, 2012

Genodroid: are privacy-preserving genomic tests ready for prime time?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

ANDaNA: Anonymous Named Data Networking Application.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

On the Security of Password Manager Database Formats.
Proceedings of the Computer Security - ESORICS 2012, 2012

Fast and Private Computation of Cardinality of Set Intersection and Union.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Fast and Private Computation of Set Intersection Cardinality.
IACR Cryptol. ePrint Arch., 2011

On Re-use of randomness in broadcast encryption.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

A new approach to securing audio conference tools.
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011

2010
Secure and Efficient Protocols for Iris and Fingerprint Identification.
IACR Cryptol. ePrint Arch., 2010

Deniable cloud storage: sharing files via public-key deniability.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

On the Integrity of Network Coding-Based Anonymous P2P File Sharing Networks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

2009
Universally Anonymous IBE based on the Quadratic Residuosity Assumption.
IACR Cryptol. ePrint Arch., 2009

Resource Management with X.509 Inter-domain Authorization Certificates (InterAC).
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

StemCerts-2: Pairs of X.509 v3 Certificates for Greater Security, Flexibility and Convenience.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009


  Loading...