Seguir
Paolo Gasti
Paolo Gasti
Associate Professor at New York Institute of Technology
Dirección de correo verificada de nyit.edu - Página principal
Título
Citado por
Citado por
Año
DoS and DDoS in Named Data Networking
P Gasti, G Tsudik, E Uzun, L Zhang
Computer Communications and Networks (ICCCN), 2013 22nd International …, 2013
6282013
HMOG: New behavioral biometric features for continuous authentication of smartphone users
Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015
4482015
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
4322013
Countering gattaca: efficient and secure testing of fully-sequenced human genomes
P Baldi, R Baronio, E De Cristofaro, P Gasti, G Tsudik
Proceedings of the 18th ACM conference on Computer and communications …, 2011
3162011
Passgan: A deep learning approach for password guessing
B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
Applied Cryptography and Network Security: 17th International Conference …, 2019
2912019
Secure and efficient protocols for iris and fingerprint identification
M Blanton, P Gasti
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
2542011
Fast and private computation of cardinality of set intersection and union
E De Cristofaro, P Gasti, G Tsudik
Cryptology and Network Security, 218-231, 2012
2492012
A lightweight mechanism for detection of cache pollution attacks in named data networking
M Conti, P Gasti, M Teoli
Computer Networks 57 (16), 3178-3191, 2013
1722013
ANDaNA: Anonymous named data networking application
S DiBenedetto, P Gasti, G Tsudik, E Uzun
arXiv preprint arXiv:1112.2205, 2011
1672011
Cache privacy in named-data networking
G Acs, M Conti, P Gasti, C Ghali, G Tsudik
2013 IEEE 33rd International Conference on Distributed Computing Systems, 41-51, 2013
1362013
Securing instrumented environments over content-centric networking: The case of lighting control and NDN
J Burke, P Gasti, N Nathan, G Tsudik
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013
1362013
On the security of password manager database formats
P Gasti, KB Rasmussen
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1062012
EsPRESSo: efficient privacy-preserving evaluation of sample set similarity
C Blundo, E De Cristofaro, P Gasti
International Workshop on Data Privacy Management, 89-103, 2012
902012
On inferring browsing activity on smartphones via USB power analysis side-channel
Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani
IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016
822016
Genodroid: are privacy-preserving genomic tests ready for prime time?
E De Cristofaro, S Faber, P Gasti, G Tsudik
Proceedings of the 2012 ACM workshop on Privacy in the electronic society …, 2012
732012
Privacy-preserving distance computation and proximity testing on earth, done right
J Šeděnka, P Gasti
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
682014
Deniable cloud storage: sharing files via public-key deniability
P Gasti, G Ateniese, M Blanton
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
612010
Secure sensing over named data networking
J Burke, P Gasti, N Nathan, G Tsudik
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
602014
Secure outsourced biometric authentication with performance evaluation on smartphones
J Šeděnka, S Govindarajan, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 10 (2), 384-396, 2014
562014
A multimodal data set for evaluating continuous authentication performance in smartphones
Q Yang, G Peng, DT Nguyen, X Qi, G Zhou, Z Sitová, P Gasti, KS Balagani
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
542014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20