Search Results - "Pagnin, Elena"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Progressive and efficient verification for digital signatures: extensions and experimental results by Boschini, Cecilia, Fiore, Dario, Pagnin, Elena, Torresetti, Luca, Visconti, Andrea

    “…Digital signatures are widely deployed to authenticate the source of incoming information, or to certify data integrity. Common signature verification…”
    Get full text
    Journal Article
  2. 2

    Privacy-Preserving Biometric Authentication: Challenges and Directions by Pagnin, Elena, Mitrokotsa, Aikaterini

    Published in Security and communication networks (01-01-2017)
    “…An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as…”
    Get full text
    Journal Article
  3. 3

    Yggdrasil: Privacy-Aware Dual Deduplication in Multi Client Settings by Sehat, Hadi, Pagnin, Elena, Lucani, Daniel E.

    “…This paper proposes Yggdrasil, a protocol for privacy-aware dual data deduplication in multi-client settings. Yggdrasil is designed to reduce cloud storage…”
    Get full text
    Conference Proceeding
  4. 4

    Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours by Pagnin, Elena, Hancke, Gerhard, Mitrokotsa, Aikaterini

    Published in IEEE communications letters (01-07-2015)
    “…Distance-bounding protocols allow devices to cryptographically verify the physical proximity of two parties and is a prominent secure neighbour detection…”
    Get full text
    Journal Article
  5. 5

    HB+DB: Distance bounding meets human based authentication by Pagnin, Elena, Yang, Anjia, Hu, Qiao, Hancke, Gerhard, Mitrokotsa, Aikaterini

    Published in Future generation computer systems (01-03-2018)
    “…Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB+  protocol by Juels…”
    Get full text
    Journal Article
  6. 6

    Be More and Be Merry: Enhancing Data and User Authentication in Collaborative Settings by Pagnin, Elena

    Published 01-01-2018
    “…Cryptography is the science and art of keeping information secret to unintended parties. But, how can we determine who is an intended party and who is not?…”
    Get full text
    Dissertation
  7. 7

    Authentication under Constraints by Pagnin, Elena

    Published 01-01-2016
    “…Authentication has become a critical step to gain access to services such as on-line banking, e-commerce, transport systems and cars (contact-less keys). In…”
    Get full text
    Dissertation
  8. 8

    Metadata Privacy Beyond Tunneling for Instant Messaging by Nelson, Boel, Pagnin, Elena, Askarov, Aslan

    “…Transport layer data leaks metadata unintentionally - such as who communicates with whom. While tools for strong transport layer privacy exist, they have…”
    Get full text
    Conference Proceeding
  9. 9

    Metadata Privacy Beyond Tunneling for Instant Messaging by Nelson, Boel, Pagnin, Elena, Askarov, Aslan

    Published 23-10-2022
    “…Transport layer data leaks metadata unintentionally -- such as who communicates with whom. While tools for strong transport layer privacy exist, they have…”
    Get full text
    Journal Article
  10. 10

    Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication by Sehat, Hadi, Pagnin, Elena, Lucani, Daniel E

    Published 26-01-2022
    “…We consider the problem of sharing sensitive or valuable files across users while partially relying on a common, untrusted third-party, e.g., a Cloud Storage…”
    Get full text
    Journal Article
  11. 11

    Bifrost: A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication by Sehat, Hadi, Lucani, Daniel E., Pagnin, Elena

    “…We consider the problem of sharing sensitive files across users while relying on a common, untrusted third-party, e.g., a Cloud Storage Provider (CSP)…”
    Get full text
    Conference Proceeding
  12. 12

    Outsourcing MPC Precomputation for Location Privacy by Oleynikov, Ivan, Pagnin, Elena, Sabelfeld, Andrei

    “…Proximity testing is at the core of sev-eral Location-Based Services (LBS) offered by, e.g., Uber, Facebook, and BlaBlaCar, as it determines closeness to a…”
    Get full text
    Conference Proceeding
  13. 13

    Yggdrasil: Privacy-aware Dual Deduplication in Multi Client Settings by Sehat, Hadi, Pagnin, Elena, Lucani, Daniel E

    Published 22-07-2020
    “…This paper proposes Yggdrasil, a protocol for privacy-aware dual data deduplication in multi client settings. Yggdrasil is designed to reduce the cloud storage…”
    Get full text
    Journal Article
  14. 14

    Secure Cloud Storage with Joint Deduplication and Erasure Protection by Vestergaard, Rasmus, Pagnin, Elena, Kundu, Rohon, Lucani, Daniel E.

    “…This work proposes a novel design for secure cloud storage systems using a third party to meet three seemingly opposing demands: reduce storage requirements on…”
    Get full text
    Conference Proceeding
  15. 15

    Bonsai: A Generalized Look at Dual Deduplication by Sehat, Hadi, Kloborg, Anders Lindskov, Mørup, Christian, Pagnin, Elena, Lucani, Daniel E

    Published 28-02-2022
    “…Cloud Service Providers (CSPs) offer a vast amount of storage space at competitive prices to cope with the growing demand for digital data storage. Dual…”
    Get full text
    Journal Article
  16. 16

    SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting by Blazy, Olivier, Bossuat, Angele, Bultel, Xavier, Fouque, Pierre-Alain, Onete, Cristina, Pagnin, Elena

    “…As messaging applications are becoming increasingly popular, it is of utmost importance to analyze their security and mitigate existing weaknesses. This paper…”
    Get full text
    Conference Proceeding
  17. 17

    Two-Hop Distance-Bounding Protocols: Keep Your Friends Close by Anjia Yang, Pagnin, Elena, Mitrokotsa, Aikaterini, Hancke, Gerhard P., Wong, Duncan S.

    Published in IEEE transactions on mobile computing (01-07-2018)
    “…Authentication in wireless communications often depends on the physical proximity to a location. Distance-bounding (DB) protocols are cross-layer…”
    Get full text
    Magazine Article