Privacy‐Preserving Biometric Authentication: Challenges and Directions E Pagnin, A Mitrokotsa Security and Communication Networks 2017 (1), 7129505, 2017 | 73 | 2017 |
Multi-key homomorphic authenticators D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin International conference on the theory and application of cryptology and …, 2016 | 67 | 2016 |
On the leakage of information in biometric authentication E Pagnin, C Dimitrakakis, A Abidin, A Mitrokotsa International Conference on Cryptology in India, 265-280, 2014 | 42 | 2014 |
TOPPool: Time-aware optimized privacy-preserving ridesharing E Pagnin, G Gunnarsson, P Talebi, C Orlandi, A Sabelfeld Cryptology ePrint Archive, 2021 | 26 | 2021 |
Two-hop distance-bounding protocols: Keep your friends close A Yang, E Pagnin, A Mitrokotsa, GP Hancke, DS Wong IEEE Transactions on Mobile Computing 17 (7), 1723-1736, 2017 | 22 | 2017 |
HB+ DB: Distance bounding meets human based authentication E Pagnin, A Yang, Q Hu, G Hancke, A Mitrokotsa Future Generation Computer Systems 80, 627-639, 2018 | 19 | 2018 |
LOVE a pairing DF Aranha, E Pagnin, F Rodríguez-Henríquez Progress in Cryptology–LATINCRYPT 2021: 7th International Conference on …, 2021 | 18 | 2021 |
SAID: reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting O Blazy, A Bossuat, X Bultel, PA Fouque, C Onete, E Pagnin 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 294-309, 2019 | 17 | 2019 |
Multi‐key homomorphic authenticators D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin IET Information Security 13 (6), 618-638, 2019 | 16 | 2019 |
The simplest multi-key linearly homomorphic signature scheme DF Aranha, E Pagnin International Conference on Cryptology and Information Security in Latin …, 2019 | 16 | 2019 |
Using distance-bounding protocols to securely verify the proximity of two-hop neighbours E Pagnin, G Hancke, A Mitrokotsa IEEE Communications Letters 19 (7), 1173-1176, 2015 | 16 | 2015 |
Papr: Publicly auditable privacy revocation for anonymous credentials J Brorsson, B David, L Gentile, E Pagnin, PS Wagner Cryptographers’ Track at the RSA Conference, 163-190, 2023 | 14 | 2023 |
Count me in! extendability for threshold ring signatures DF Aranha, M Hall-Andersen, A Nitulescu, E Pagnin, S Yakoubov IACR International Conference on Public-Key Cryptography, 379-406, 2022 | 13 | 2022 |
Secure generalized deduplication via multi-key revealing encryption DE Lucani, L Nielsen, C Orlandi, E Pagnin, R Vestergaard International Conference on Security and Cryptography for Networks, 298-318, 2020 | 12 | 2020 |
Where are you bob? privacy-preserving proximity testing with a napping party I Oleynikov, E Pagnin, A Sabelfeld Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 12 | 2020 |
Matrioska: a compiler for multi-key homomorphic signatures D Fiore, E Pagnin International Conference on Security and Cryptography for Networks, 43-62, 2018 | 11 | 2018 |
HB+ DB, mitigating man-in-the-middle attacks against hb+ with distance bounding E Pagnin, A Yang, G Hancke, A Mitrokotsa Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 11 | 2015 |
Yggdrasil: Privacy-aware dual deduplication in multi client settings H Sehat, E Pagnin, DE Lucani ICC 2021-IEEE International Conference on Communications, 1-6, 2021 | 10 | 2021 |
Attacks on privacy-preserving biometric authentication A Abidin, E Pagnin, A Mitrokotsa Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014 …, 2014 | 10 | 2014 |
: Walking the Privacy Trail E Pagnin, C Brunetta, P Picazo-Sanchez International Conference on Cryptology and Network Security, 43-66, 2018 | 8 | 2018 |