DoS and DDoS in Named Data Networking P Gasti, G Tsudik, E Uzun, L Zhang Computer Communications and Networks (ICCCN), 2013 22nd International …, 2013 | 629 | 2013 |
HMOG: New behavioral biometric features for continuous authentication of smartphone users Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015 | 461 | 2015 |
Poseidon: Mitigating interest flooding DDoS attacks in named data networking A Compagno, M Conti, P Gasti, G Tsudik 38th annual IEEE conference on local computer networks, 630-638, 2013 | 434 | 2013 |
Countering gattaca: efficient and secure testing of fully-sequenced human genomes P Baldi, R Baronio, E De Cristofaro, P Gasti, G Tsudik Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 316 | 2011 |
Passgan: A deep learning approach for password guessing B Hitaj, P Gasti, G Ateniese, F Perez-Cruz Applied Cryptography and Network Security: 17th International Conference …, 2019 | 304 | 2019 |
Secure and efficient protocols for iris and fingerprint identification M Blanton, P Gasti Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 259 | 2011 |
Fast and private computation of cardinality of set intersection and union E De Cristofaro, P Gasti, G Tsudik Cryptology and Network Security, 218-231, 2012 | 251 | 2012 |
A lightweight mechanism for detection of cache pollution attacks in named data networking M Conti, P Gasti, M Teoli Computer Networks 57 (16), 3178-3191, 2013 | 172 | 2013 |
ANDaNA: Anonymous named data networking application S DiBenedetto, P Gasti, G Tsudik, E Uzun arXiv preprint arXiv:1112.2205, 2011 | 168 | 2011 |
Securing instrumented environments over content-centric networking: The case of lighting control and NDN J Burke, P Gasti, N Nathan, G Tsudik 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013 | 137 | 2013 |
Cache privacy in named-data networking G Acs, M Conti, P Gasti, C Ghali, G Tsudik 2013 IEEE 33rd International Conference on Distributed Computing Systems, 41-51, 2013 | 136 | 2013 |
On the security of password manager database formats P Gasti, KB Rasmussen Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 106 | 2012 |
EsPRESSo: efficient privacy-preserving evaluation of sample set similarity C Blundo, E De Cristofaro, P Gasti International Workshop on Data Privacy Management, 89-103, 2012 | 91 | 2012 |
On inferring browsing activity on smartphones via USB power analysis side-channel Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016 | 85 | 2016 |
Genodroid: are privacy-preserving genomic tests ready for prime time? E De Cristofaro, S Faber, P Gasti, G Tsudik Proceedings of the 2012 ACM workshop on Privacy in the electronic society …, 2012 | 74 | 2012 |
Privacy-preserving distance computation and proximity testing on earth, done right J Šeděnka, P Gasti Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 69 | 2014 |
Secure sensing over named data networking J Burke, P Gasti, N Nathan, G Tsudik 2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014 | 61 | 2014 |
Deniable cloud storage: sharing files via public-key deniability P Gasti, G Ateniese, M Blanton Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010 | 61 | 2010 |
Secure outsourced biometric authentication with performance evaluation on smartphones J Šeděnka, S Govindarajan, P Gasti, KS Balagani IEEE Transactions on Information Forensics and Security 10 (2), 384-396, 2014 | 57 | 2014 |
A multimodal data set for evaluating continuous authentication performance in smartphones Q Yang, G Peng, DT Nguyen, X Qi, G Zhou, Z Sitová, P Gasti, KS Balagani Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014 | 54 | 2014 |