Search Results - "Pagnin, Elena"
-
1
Progressive and efficient verification for digital signatures: extensions and experimental results
Published in Journal of cryptographic engineering (2024)“…Digital signatures are widely deployed to authenticate the source of incoming information, or to certify data integrity. Common signature verification…”
Get full text
Journal Article -
2
Privacy-Preserving Biometric Authentication: Challenges and Directions
Published in Security and communication networks (01-01-2017)“…An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as…”
Get full text
Journal Article -
3
Yggdrasil: Privacy-Aware Dual Deduplication in Multi Client Settings
Published in ICC 2021 - IEEE International Conference on Communications (01-06-2021)“…This paper proposes Yggdrasil, a protocol for privacy-aware dual data deduplication in multi-client settings. Yggdrasil is designed to reduce cloud storage…”
Get full text
Conference Proceeding -
4
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours
Published in IEEE communications letters (01-07-2015)“…Distance-bounding protocols allow devices to cryptographically verify the physical proximity of two parties and is a prominent secure neighbour detection…”
Get full text
Journal Article -
5
HB+DB: Distance bounding meets human based authentication
Published in Future generation computer systems (01-03-2018)“…Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB+ protocol by Juels…”
Get full text
Journal Article -
6
Be More and Be Merry: Enhancing Data and User Authentication in Collaborative Settings
Published 01-01-2018“…Cryptography is the science and art of keeping information secret to unintended parties. But, how can we determine who is an intended party and who is not?…”
Get full text
Dissertation -
7
Authentication under Constraints
Published 01-01-2016“…Authentication has become a critical step to gain access to services such as on-line banking, e-commerce, transport systems and cars (contact-less keys). In…”
Get full text
Dissertation -
8
Metadata Privacy Beyond Tunneling for Instant Messaging
Published in 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P) (08-07-2024)“…Transport layer data leaks metadata unintentionally - such as who communicates with whom. While tools for strong transport layer privacy exist, they have…”
Get full text
Conference Proceeding -
9
Metadata Privacy Beyond Tunneling for Instant Messaging
Published 23-10-2022“…Transport layer data leaks metadata unintentionally -- such as who communicates with whom. While tools for strong transport layer privacy exist, they have…”
Get full text
Journal Article -
10
Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication
Published 26-01-2022“…We consider the problem of sharing sensitive or valuable files across users while partially relying on a common, untrusted third-party, e.g., a Cloud Storage…”
Get full text
Journal Article -
11
Bifrost: A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication
Published in 2022 IEEE 11th International Conference on Cloud Networking (CloudNet) (07-11-2022)“…We consider the problem of sharing sensitive files across users while relying on a common, untrusted third-party, e.g., a Cloud Storage Provider (CSP)…”
Get full text
Conference Proceeding -
12
Outsourcing MPC Precomputation for Location Privacy
Published in 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01-06-2022)“…Proximity testing is at the core of sev-eral Location-Based Services (LBS) offered by, e.g., Uber, Facebook, and BlaBlaCar, as it determines closeness to a…”
Get full text
Conference Proceeding -
13
Yggdrasil: Privacy-aware Dual Deduplication in Multi Client Settings
Published 22-07-2020“…This paper proposes Yggdrasil, a protocol for privacy-aware dual data deduplication in multi client settings. Yggdrasil is designed to reduce the cloud storage…”
Get full text
Journal Article -
14
Secure Cloud Storage with Joint Deduplication and Erasure Protection
Published in 2022 IEEE 15th International Conference on Cloud Computing (CLOUD) (01-07-2022)“…This work proposes a novel design for secure cloud storage systems using a third party to meet three seemingly opposing demands: reduce storage requirements on…”
Get full text
Conference Proceeding -
15
Bonsai: A Generalized Look at Dual Deduplication
Published 28-02-2022“…Cloud Service Providers (CSPs) offer a vast amount of storage space at competitive prices to cope with the growing demand for digital data storage. Dual…”
Get full text
Journal Article -
16
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
Published in 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (01-06-2019)“…As messaging applications are becoming increasingly popular, it is of utmost importance to analyze their security and mitigate existing weaknesses. This paper…”
Get full text
Conference Proceeding -
17
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close
Published in IEEE transactions on mobile computing (01-07-2018)“…Authentication in wireless communications often depends on the physical proximity to a location. Distance-bounding (DB) protocols are cross-layer…”
Get full text
Magazine Article