Paolo Gasti
TitleCited byYear
DoS and DDoS in Named Data Networking
P Gasti, G Tsudik, E Uzun, L Zhang
Computer Communications and Networks (ICCCN), 2013 22nd International …, 2013
4882013
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
3722013
Countering gattaca: efficient and secure testing of fully-sequenced human genomes
P Baldi, R Baronio, E De Cristofaro, P Gasti, G Tsudik
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1962011
Secure and efficient protocols for iris and fingerprint identification
M Blanton, P Gasti
European Symposium on Research in Computer Security, 190-209, 2011
1742011
HMOG: New behavioral biometric features for continuous authentication of smartphone users
Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015
1462015
ANDaNA: Anonymous named data networking application
S DiBenedetto, P Gasti, G Tsudik, E Uzun
arXiv preprint arXiv:1112.2205, 2011
1292011
Fast and private computation of cardinality of set intersection and union
E De Cristofaro, P Gasti, G Tsudik
Cryptology and Network Security, 218-231, 2012
1242012
Securing instrumented environments over content-centric networking: the case of lighting control and NDN
J Burke, P Gasti, N Nathan, G Tsudik
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013
1072013
A lightweight mechanism for detection of cache pollution attacks in named data networking
M Conti, P Gasti, M Teoli
Computer Networks 57 (16), 3178-3191, 2013
1062013
Cache privacy in named-data networking
G Acs, M Conti, P Gasti, C Ghali, G Tsudik
2013 IEEE 33rd International Conference on Distributed Computing Systems, 41-51, 2013
972013
Genodroid: are privacy-preserving genomic tests ready for prime time?
E De Cristofaro, S Faber, P Gasti, G Tsudik
Proceedings of the 2012 ACM workshop on Privacy in the electronic society …, 2012
612012
EsPRESSo: efficient privacy-preserving evaluation of sample set similarity
C Blundo, E De Cristofaro, P Gasti
Data Privacy Management and Autonomous Spontaneous Security, 89-103, 2012
592012
On the security of password manager database formats
P Gasti, KB Rasmussen
European Symposium on Research in Computer Security, 770-787, 2012
592012
Secure sensing over named data networking
J Burke, P Gasti, N Nathan, G Tsudik
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
432014
Privacy-preserving distance computation and proximity testing on earth, done right
J Šeděnka, P Gasti
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
392014
Deniable cloud storage: sharing files via public-key deniability
P Gasti, G Ateniese, M Blanton
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
392010
Passgan: A deep learning approach for password guessing
B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
International Conference on Applied Cryptography and Network Security, 217-237, 2019
382019
Universally anonymous IBE based on the quadratic residuosity assumption
G Ateniese, P Gasti
Cryptographers’ Track at the RSA Conference, 32-47, 2009
332009
Secure outsourced biometric authentication with performance evaluation on smartphones
J Šeděnka, S Govindarajan, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 10 (2), 384-396, 2014
282014
A new approach to securing audio conference tools
Z Zhu, J Burke, L Zhang, P Gasti, Y Lu, V Jacobson
Proceedings of the 7th Asian Internet Engineering Conference, 120-123, 2011
272011
The system can't perform the operation now. Try again later.
Articles 1–20