Italo Dacosta

According to our database1, Italo Dacosta authored at least 24 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
HideMyApp: Hiding the Presence of Sensitive Apps on Android.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins.
IEEE Trans. Mob. Comput., 2018

Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
PrivateRide: A Privacy-Enhanced Ride-Hailing Service.
PoPETs, 2017

PriFi: A Low-Latency Local-Area Anonymous Communication Network.
CoRR, 2017

ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service.
Proceedings of the 26th USENIX Security Symposium, 2017

SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
SecureRun: Cheat-Proof and Private Summaries for Location-Based Activities.
IEEE Trans. Mob. Comput., 2016

PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

2015
uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
For your phone only: custom protocols for efficient secure function evaluation on mobile devices.
Security and Communication Networks, 2014

inShopnito: An Advanced yet Privacy-Friendly Mobile Shopping Application.
Proceedings of the 2014 IEEE World Congress on Services, 2014

PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

EmailCloak: A Practical and Flexible Approach to Improve Email Privacy.
Proceedings of the Ninth International Conference on Availability, 2014

2013
An Advanced, Privacy-Friendly Loyalty System.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

2012
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens.
ACM Trans. Internet Techn., 2012

Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
HTTP Digest Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Improving Authentication Performance of Distributed SIP Proxies.
IEEE Trans. Parallel Distrib. Syst., 2011

"Mix-in-Place" anonymous networking using secure function evaluation.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

2009
Improving authentication performance of distributed SIP proxies.
Proceedings of the Principles, 2009

2008
Security Analysis of an IP Phone: Cisco 7960G.
Proceedings of the Principles, 2008

SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008


  Loading...