Mauro Conti
353 records found
1
Authored
Acoustic Side-Channel Attacks on a Computer Mouse
Predicting Mouse Movements through Emitted Audio
Mitigating IoT data management security concerns through blockchain and machine learning based solutions
Study and Conceptual Design
BLUFADER
Blurred face detection & recognition for privacy-friendly continuous authentication
Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to we ...
Astraea
Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure a ...
Privacy-Preserving Verifiable Double Auctions
An application for electricity trading
Nereus
Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts
Security and privacy issues have become a major hindrance to the broad adoption of Ride-Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the Ride-Hailing Service Provider (RHSP) and a driver that could easily link the real riders and t ...
CovertSYS
A systematic covert communication approach for providing secure end-to-end conversation via social networks
For your voice only
Exploiting side channels in voice messaging for environment detection
Secure Proximity Detection and Verification
Addressing vulnerabilities in IEEE 802.15.4z UWB
SPARK
Secure Pseudorandom Key-based Encryption for Deduplicated Storage
Deduplication is a widely used technology to reduce the storage and communication cost for cloud storage services. For any cloud infrastructure, data confidentiality is one of the primary concerns. Data confidentiality can be achieved via user-side encryption. However, convent ...