125 results on '"Gasti, Paolo"'
Search Results
2. Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage
3. PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos
4. PassGAN: A Deep Learning Approach for Password Guessing
5. Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage
6. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
7. PassGAN: A Deep Learning Approach for Password Guessing
8. Posture and Body Movement Effects on Behavioral Biometrics for Continuous Smartphone Authentication
9. SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication
10. Privacy-Preserving Population-Enhanced Biometric Key Generation from Free-Text Keystroke Dynamics
11. Covert Ephemeral Communication in Named Data Networking
12. Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking
13. SILK-TV : Secret Information Leakage from Keystroke Timing Videos
14. Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control
15. DoS and DDoS in Named-Data Networking
16. Optimizing Bi-directional Low-Latency Communication in Named Data Networking
17. ANDaNA: Anonymous Named Data Networking Application
18. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
19. Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes (Full Version)
20. Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage
21. USB side-channel attack on Tor
22. PassGAN: A Deep Learning Approach for Password Guessing
23. Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking
24. SILK-TV: Secret Information Leakage from Keystroke Timing Videos
25. Smartcope: Smartphone Change of Possession Evaluation for Continuous Authentication
26. Privacy-Preserving Matching of Community-Contributed Content
27. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
28. Fast and Private Computation of Cardinality of Set Intersection and Union
29. On the Security of Password Manager Database Formats
30. Secure and Efficient Protocols for Iris and Fingerprint Identification
31. Resource Management with X.509 Inter-domain Authorization Certificates (InterAC)
32. Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
33. A lightweight mechanism for detection of cache pollution attacks in Named Data Networking
34. Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking
35. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
36. On the Security of Password Manager Database Formats
37. Fast and Private Computation of Cardinality of Set Intersection and Union
38. Resource Management with X.509 Inter-domain Authorization Certificates (InterAC)
39. Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
40. DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures
41. PILOT: Password and PIN information leakage from obfuscated typing videos1
42. MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones
43. Privacy-Aware Caching in Information-Centric Networking
44. Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications
45. The impact of application context on privacy and performance of keystroke authentication systems
46. Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest
47. On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel
48. PILOT: Password and PIN information leakage from obfuscated typing videos1.
49. Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones
50. FLEX
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.