Follow
Paolo Gasti
Title
Cited by
Cited by
Year
DoS and DDoS in Named Data Networking
P Gasti, G Tsudik, E Uzun, L Zhang
Computer Communications and Networks (ICCCN), 2013 22nd International …, 2013
5602013
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
4072013
HMOG: New behavioral biometric features for continuous authentication of smartphone users
Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015
3682015
Countering gattaca: efficient and secure testing of fully-sequenced human genomes
P Baldi, R Baronio, E De Cristofaro, P Gasti, G Tsudik
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2852011
Secure and efficient protocols for iris and fingerprint identification
M Blanton, P Gasti
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
2342011
Passgan: A deep learning approach for password guessing
B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
Applied Cryptography and Network Security: 17th International Conference …, 2019
2322019
Fast and private computation of cardinality of set intersection and union
E De Cristofaro, P Gasti, G Tsudik
Cryptology and Network Security, 218-231, 2012
2162012
A lightweight mechanism for detection of cache pollution attacks in named data networking
M Conti, P Gasti, M Teoli
Computer Networks 57 (16), 3178-3191, 2013
1602013
ANDaNA: Anonymous named data networking application
S DiBenedetto, P Gasti, G Tsudik, E Uzun
arXiv preprint arXiv:1112.2205, 2011
1572011
Securing instrumented environments over content-centric networking: The case of lighting control and NDN
J Burke, P Gasti, N Nathan, G Tsudik
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013
1332013
Cache privacy in named-data networking
G Acs, M Conti, P Gasti, C Ghali, G Tsudik
2013 IEEE 33rd International Conference on Distributed Computing Systems, 41-51, 2013
1282013
On the security of password manager database formats
P Gasti, KB Rasmussen
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
982012
EsPRESSo: efficient privacy-preserving evaluation of sample set similarity
C Blundo, E De Cristofaro, P Gasti
Data Privacy Management and Autonomous Spontaneous Security: 7th …, 2013
842013
Genodroid: are privacy-preserving genomic tests ready for prime time?
E De Cristofaro, S Faber, P Gasti, G Tsudik
Proceedings of the 2012 ACM workshop on Privacy in the electronic society …, 2012
732012
On inferring browsing activity on smartphones via USB power analysis side-channel
Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani
IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016
672016
Privacy-preserving distance computation and proximity testing on earth, done right
J Šeděnka, P Gasti
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
642014
Secure sensing over named data networking
J Burke, P Gasti, N Nathan, G Tsudik
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
572014
Deniable cloud storage: sharing files via public-key deniability
P Gasti, G Ateniese, M Blanton
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
552010
Secure outsourced biometric authentication with performance evaluation on smartphones
J Šeděnka, S Govindarajan, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 10 (2), 384-396, 2014
492014
Universally anonymous IBE based on the quadratic residuosity assumption
G Ateniese, P Gasti
Topics in Cryptology–CT-RSA 2009: The Cryptographers’ Track at the RSA …, 2009
472009
The system can't perform the operation now. Try again later.
Articles 1–20