Search

Your search keyword '"Gasti, Paolo"' showing total 125 results

Search Constraints

Start Over You searched for: Author "Gasti, Paolo" Remove constraint Author: "Gasti, Paolo"
125 results on '"Gasti, Paolo"'

Search Results

2. Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage

3. PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos

4. PassGAN: A Deep Learning Approach for Password Guessing

5. Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage

6. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users

7. PassGAN: A Deep Learning Approach for Password Guessing

10. Privacy-Preserving Population-Enhanced Biometric Key Generation from Free-Text Keystroke Dynamics

11. Covert Ephemeral Communication in Named Data Networking

12. Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking

13. SILK-TV : Secret Information Leakage from Keystroke Timing Videos

14. Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control

15. DoS and DDoS in Named-Data Networking

16. Optimizing Bi-directional Low-Latency Communication in Named Data Networking

17. ANDaNA: Anonymous Named Data Networking Application

18. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

19. Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes (Full Version)

23. Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking

24. SILK-TV: Secret Information Leakage from Keystroke Timing Videos

26. Privacy-Preserving Matching of Community-Contributed Content

27. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

28. Fast and Private Computation of Cardinality of Set Intersection and Union

29. On the Security of Password Manager Database Formats

30. Secure and Efficient Protocols for Iris and Fingerprint Identification

31. Resource Management with X.509 Inter-domain Authorization Certificates (InterAC)

32. Universally Anonymous IBE Based on the Quadratic Residuosity Assumption

41. PILOT: Password and PIN information leakage from obfuscated typing videos1

48. PILOT: Password and PIN information leakage from obfuscated typing videos1.

50. FLEX

Catalog

Books, media, physical & digital resources