default search action
Paolo Gasti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Nicholas Cariello, Seth Levine, Gang Zhou, Blair Hoplight, Paolo Gasti, Kiran S. Balagani:
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication. Pervasive Mob. Comput. 97: 101873 (2024) - 2020
- [j13]Santhanakrishnan Anand, Ding Ding, Paolo Gasti, Mike O'Neal, Mauro Conti, Kiran S. Balagani:
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures. IEEE Trans. Netw. Serv. Manag. 17(1): 201-212 (2020) - [c35]Matteo Cardaioli, Mauro Conti, Kiran S. Balagani, Paolo Gasti:
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage. ESORICS (1) 2020: 720-735
2010 – 2019
- 2019
- [j12]Kiran S. Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN information leakage from obfuscated typing videos. J. Comput. Secur. 27(4): 405-425 (2019) - [j11]Gergely Ács, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood:
Privacy-Aware Caching in Information-Centric Networking. IEEE Trans. Dependable Secur. Comput. 16(2): 313-328 (2019) - [j10]Qing Yang, Ge Peng, Paolo Gasti, Kiran S. Balagani, Yantao Li, Gang Zhou:
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones. IEEE Trans. Inf. Forensics Secur. 14(4): 913-922 (2019) - [c34]Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz:
PassGAN: A Deep Learning Approach for Password Guessing. ACNS 2019: 217-237 - [i16]Kiran S. Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos. CoRR abs/1904.00188 (2019) - [i15]Matteo Cardaioli, Mauro Conti, Kiran S. Balagani, Paolo Gasti:
Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage. CoRR abs/1905.08742 (2019) - 2018
- [j9]Qing Yang, Paolo Gasti, Kiran S. Balagani, Yantao Li, Gang Zhou:
USB side-channel attack on Tor. Comput. Networks 141: 57-66 (2018) - [j8]Kiran S. Balagani, Paolo Gasti, Aaron Elliott, Azriel Richardson, Mike O'Neal:
The impact of application context on privacy and performance of keystroke authentication systems. J. Comput. Secur. 26(4): 543-556 (2018) - [c33]Kiran S. Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
SILK-TV: Secret Information Leakage from Keystroke Timing Videos. ESORICS (1) 2018: 263-280 - [c32]Paolo Gasti, Gene Tsudik:
Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest. LANMAN 2018: 1-6 - [c31]Kasper Bonne Rasmussen, Paolo Gasti:
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications. PST 2018: 1-10 - 2017
- [j7]Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani:
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel. IEEE Trans. Inf. Forensics Secur. 12(5): 1056-1066 (2017) - [i14]Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz:
PassGAN: A Deep Learning Approach for Password Guessing. CoRR abs/1709.00440 (2017) - 2016
- [j6]Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, Kiran S. Balagani:
HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users. IEEE Trans. Inf. Forensics Secur. 11(5): 877-892 (2016) - [j5]Paolo Gasti, Jaroslav Sedenka, Qing Yang, Gang Zhou, Kiran S. Balagani:
Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones. IEEE Trans. Inf. Forensics Secur. 11(11): 2556-2571 (2016) - [c30]Gabriele Costa, Paolo Gasti, Alessio Merlo, Shunt-Hsi Yu:
FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization. AsiaCCS 2016: 389-400 - 2015
- [j4]Jaroslav Sedenka, Sathya Govindarajan, Paolo Gasti, Kiran S. Balagani:
Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones. IEEE Trans. Inf. Forensics Secur. 10(2): 384-396 (2015) - [c29]Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik:
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. ACNS 2015: 243-262 - [c28]Paolo Gasti, Kasper Bonne Rasmussen:
Privacy-preserving User Matching. WPES@CCS 2015: 111-120 - [i13]Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, Kiran S. Balagani:
HMOG: A New Biometric Modality for Continuous Authentication of Smartphone Users. CoRR abs/1501.01199 (2015) - 2014
- [j3]Mishari Al Mishari, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Optimizing bi-directional low-latency communication in named data networking. Comput. Commun. Rev. 44(1): 13-19 (2014) - [j2]Carlo Blundo, Emiliano De Cristofaro, Paolo Gasti:
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity. J. Comput. Secur. 22(3): 355-381 (2014) - [c27]Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik:
Covert ephemeral communication in named data networking. AsiaCCS 2014: 15-26 - [c26]Jaroslav Sedenka, Paolo Gasti:
Privacy-preserving distance computation and proximity testing on earth, done right. AsiaCCS 2014: 99-110 - [c25]Rui Wang, Zdenka Sitova, Xiaoqing Jia, Xiang He, Tobi Abramson, Paolo Gasti, Kiran S. Balagani, Aydin Farajidavar:
Automatic identification of solid-phase medication intake using wireless wearable accelerometers. EMBC 2014: 4168-4171 - [c24]Hilbert Locklear, Sathya Govindarajan, Zdenka Sitova, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Paolo Gasti, Kiran S. Balagani:
Continuous authentication with cognition-centric text production and revision features. IJCB 2014: 1-8 - [c23]Jaroslav Sedenka, Kiran S. Balagani, Vir V. Phoha, Paolo Gasti:
Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics. IJCB 2014: 1-8 - [c22]Jeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Secure Sensing over Named Data Networking. NCA 2014: 175-180 - [c21]Qing Yang, Ge Peng, David T. Nguyen, Xin Qi, Gang Zhou, Zdenka Sitova, Paolo Gasti, Kiran S. Balagani:
A multimodal data set for evaluating continuous authentication performance in smartphones. SenSys 2014: 358-359 - [i12]Jaroslav Sedenka, Kiran S. Balagani, Vir V. Phoha, Paolo Gasti:
Privacy-Preserving Population-Enhanced Biometric Key Generation from Free-Text Keystroke Dynamics. CoRR abs/1407.4179 (2014) - 2013
- [j1]Mauro Conti, Paolo Gasti, Marco Teoli:
A lightweight mechanism for detection of cache pollution attacks in Named Data Networking. Comput. Networks 57(16): 3178-3191 (2013) - [c20]Sathya Govindarajan, Paolo Gasti, Kiran S. Balagani:
Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data. BTAS 2013: 1-8 - [c19]Mishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz:
Privacy-Preserving Matching of Community-Contributed Content. ESORICS 2013: 443-462 - [c18]Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:
DoS and DDoS in Named Data Networking. ICCCN 2013: 1-7 - [c17]Gergely Ács, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik:
Cache Privacy in Named-Data Networking. ICDCS 2013: 41-51 - [c16]Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik:
Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking. LCN 2013: 630-638 - [i11]Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik:
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking. CoRR abs/1303.4823 (2013) - [i10]Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik:
Covert Ephemeral Communication in Named Data Networking. CoRR abs/1311.2517 (2013) - 2012
- [c15]Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Fast and Private Computation of Cardinality of Set Intersection and Union. CANS 2012: 218-231 - [c14]Carlo Blundo, Emiliano De Cristofaro, Paolo Gasti:
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity. DPM/SETOP 2012: 89-103 - [c13]Paolo Gasti, Kasper Bonne Rasmussen:
On the Security of Password Manager Database Formats. ESORICS 2012: 770-787 - [c12]Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun:
ANDaNA: Anonymous Named Data Networking Application. NDSS 2012 - [c11]Emiliano De Cristofaro, Sky Faber, Paolo Gasti, Gene Tsudik:
Genodroid: are privacy-preserving genomic tests ready for prime time? WPES 2012: 97-108 - [i9]Mishari Al Mishari, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Optimizing Bi-directional Low-Latency Communication in Named Data Networking. CoRR abs/1207.7085 (2012) - [i8]Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:
DoS and DDoS in Named-Data Networking. CoRR abs/1208.0952 (2012) - [i7]Jeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control. CoRR abs/1208.1336 (2012) - 2011
- [c10]Zhenkai Zhu, Jeff Burke, Lixia Zhang, Paolo Gasti, Yanbin Lu, Van Jacobson:
A new approach to securing audio conference tools. AINTEC 2011: 120-123 - [c9]Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes. CCS 2011: 691-702 - [c8]Marina Blanton, Paolo Gasti:
Secure and Efficient Protocols for Iris and Fingerprint Identification. ESORICS 2011: 190-209 - [c7]Paolo Gasti, Alessio Merlo:
On Re-use of randomness in broadcast encryption. PST 2011: 36-43 - [i6]Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes. CoRR abs/1110.2478 (2011) - [i5]Carlo Blundo, Emiliano De Cristofaro, Paolo Gasti:
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity. CoRR abs/1111.5062 (2011) - [i4]Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun:
ANDaNA: Anonymous Named Data Networking Application. CoRR abs/1112.2205 (2011) - [i3]Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Fast and Private Computation of Set Intersection Cardinality. IACR Cryptol. ePrint Arch. 2011: 141 (2011) - 2010
- [c6]Paolo Gasti, Alessio Merlo, Giuseppe Ciaccio, Giovanni Chiola:
On the Integrity of Network Coding-Based Anonymous P2P File Sharing Networks. NCA 2010: 192-197 - [c5]Paolo Gasti, Yu Chen:
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices. PDP 2010: 624-630 - [c4]Paolo Gasti, Giuseppe Ateniese, Marina Blanton:
Deniable cloud storage: sharing files via public-key deniability. WPES 2010: 31-42 - [i2]Marina Blanton, Paolo Gasti:
Secure and Efficient Protocols for Iris and Fingerprint Identification. IACR Cryptol. ePrint Arch. 2010: 627 (2010)
2000 – 2009
- 2009
- [c3]Giovanni Chiola, Paolo Gasti:
StemCerts-2: Pairs of X.509 v3 Certificates for Greater Security, Flexibility and Convenience. CCNC 2009: 1-7 - [c2]Giuseppe Ateniese, Paolo Gasti:
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. CT-RSA 2009: 32-47 - [c1]Vishwas Patil, Paolo Gasti, Luigi V. Mancini, Giovanni Chiola:
Resource Management with X.509 Inter-domain Authorization Certificates (InterAC). EuroPKI 2009: 34-50 - [i1]Giuseppe Ateniese, Paolo Gasti:
Universally Anonymous IBE based on the Quadratic Residuosity Assumption. IACR Cryptol. ePrint Arch. 2009: 280 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint