Follow
Paolo Gasti
Title
Cited by
Cited by
Year
DoS and DDoS in Named Data Networking
P Gasti, G Tsudik, E Uzun, L Zhang
Computer Communications and Networks (ICCCN), 2013 22nd International …, 2013
6362013
HMOG: New behavioral biometric features for continuous authentication of smartphone users
Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015
4862015
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
4372013
Passgan: A deep learning approach for password guessing
B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
Applied Cryptography and Network Security: 17th International Conference …, 2019
3522019
Countering gattaca: efficient and secure testing of fully-sequenced human genomes
P Baldi, R Baronio, E De Cristofaro, P Gasti, G Tsudik
Proceedings of the 18th ACM conference on Computer and communications …, 2011
3342011
Fast and private computation of cardinality of set intersection and union
E De Cristofaro, P Gasti, G Tsudik
Cryptology and Network Security, 218-231, 2012
2642012
Secure and efficient protocols for iris and fingerprint identification
M Blanton, P Gasti
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
2642011
A lightweight mechanism for detection of cache pollution attacks in named data networking
M Conti, P Gasti, M Teoli
Computer Networks 57 (16), 3178-3191, 2013
1772013
ANDaNA: Anonymous named data networking application
S DiBenedetto, P Gasti, G Tsudik, E Uzun
arXiv preprint arXiv:1112.2205, 2011
1682011
Cache privacy in named-data networking
G Acs, M Conti, P Gasti, C Ghali, G Tsudik
2013 IEEE 33rd International Conference on Distributed Computing Systems, 41-51, 2013
1392013
Securing instrumented environments over content-centric networking: The case of lighting control and NDN
J Burke, P Gasti, N Nathan, G Tsudik
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013
1392013
On the security of password manager database formats
P Gasti, KB Rasmussen
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1122012
EsPRESSo: efficient privacy-preserving evaluation of sample set similarity
C Blundo, E De Cristofaro, P Gasti
International Workshop on Data Privacy Management, 89-103, 2012
962012
On inferring browsing activity on smartphones via USB power analysis side-channel
Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani
IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016
922016
Genodroid: are privacy-preserving genomic tests ready for prime time?
E De Cristofaro, S Faber, P Gasti, G Tsudik
Proceedings of the 2012 ACM workshop on Privacy in the electronic society …, 2012
752012
Privacy-preserving distance computation and proximity testing on earth, done right
J Šeděnka, P Gasti
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
672014
Secure sensing over named data networking
J Burke, P Gasti, N Nathan, G Tsudik
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
622014
Deniable cloud storage: sharing files via public-key deniability
P Gasti, G Ateniese, M Blanton
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
622010
A multimodal data set for evaluating continuous authentication performance in smartphones
Q Yang, G Peng, DT Nguyen, X Qi, G Zhou, Z Sitová, P Gasti, KS Balagani
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
602014
Secure outsourced biometric authentication with performance evaluation on smartphones
J Šeděnka, S Govindarajan, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 10 (2), 384-396, 2014
572014
The system can't perform the operation now. Try again later.
Articles 1–20