Gasti, Paolo
13  results:
Search for persons X
?
1

Your PIN Sounds Good! Augmentation of PIN Guessing Strategi..:

, In: Computer Security – ESORICS 2020; Lecture Notes in Computer Science,
 
?
2

PassGAN: A Deep Learning Approach for Password Guessing:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
3

SILK-TV: Secret Information Leakage from Keystroke Timing V..:

, In: Computer Security; Lecture Notes in Computer Science,
Balagani, Kiran S. ; Conti, Mauro ; Gasti, Paolo... - p. 263-280 , 2018
 
?
4

FLEX : A Flexible Code Authentication Framework for Dele..:

, In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security,
Costa, Gabriele ; Gasti, Paolo ; Merlo, Alessio. - p. 389-400 , 2016
 
?
5

Privacy-preserving User Matching:

, In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society,
Gasti, Paolo ; Rasmussen, Kasper B. - p. 111-120 , 2015
 
?
6

A multimodal data set for evaluating continuous authenticat..:

, In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems,
Yang, Qing ; Peng, Ge ; Nguyen, David T.... - p. 358-359 , 2014
 
?
7

Covert ephemeral communication in named data networking:

, In: Proceedings of the 9th ACM symposium on Information, computer and communications security,
Ambrosin, Moreno ; Conti, Mauro ; Gasti, Paolo. - p. 15-26 , 2014
 
?
8

Privacy-preserving population-enhanced biometric key genera..:

, In: IEEE International Joint Conference on Biometrics,
 
?
9

Privacy-preserving distance computation and proximity testi..:

, In: Proceedings of the 9th ACM symposium on Information, computer and communications security,
Šeděnka, Jaroslav ; Gasti, Paolo - p. 99-110 , 2014
 
?
10

Genodroid : are privacy-preserving genomic tests ready f..:

, In: Proceedings of the 2012 ACM workshop on Privacy in the electronic society,
 
?
11

A new approach to securing audio conference tools:

, In: Proceedings of the 7th Asian Internet Engineering Conference,
Zhu, Zhenkai ; Burke, Jeffery ; Zhang, Lixia... - p. 120-123 , 2011
 
?
12

Countering GATTACA : efficient and secure testing of ful..:

, In: Proceedings of the 18th ACM conference on Computer and communications security,
 
?
13

Deniable cloud storage : sharing files via public-key de..:

, In: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society,
 
1-13