Italo Dacosta
Italo Dacosta
Post-doctoral researcher, EPFL
Verified email at epfl.ch
Title
Cited by
Cited by
Year
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
I Dacosta, S Chakradeo, M Ahamad, P Traynor
ACM Transactions on Internet Technology (TOIT) 12 (1), 1, 2012
1002012
Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties
I Dacosta, M Ahamad, P Traynor
European Symposium on Research in Computer Security, 199-216, 2012
732012
SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices
K Olejnik, II Dacosta Petrocelli, JC Soares Machado, K Huguenin, ...
Proceedings of the 38th IEEE Symposium on Security and Privacy (SP), 2017
712017
PrivateRide: A Privacy-Enhanced Ride-Hailing Service
A Pham, I Dacosta, B Jacot-Guillarmod, K Huguenin, T Hajar, F Tramèr, ...
Proceedings on Privacy Enhancing Technologies 2017 (2), 38-56, 2017
462017
ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service
TVA Pham, II Dacosta Petrocelli, GFM Endignoux, JR Troncoso-Pastoriza, ...
Proceedings of the 26th USENIX Security Symposium, 2017
452017
For your phone only: custom protocols for efficient secure function evaluation on mobile devices
H Carter, C Amrutkar, I Dacosta, P Traynor
Security and Communication Networks 7 (7), 1165-1176, 2014
322014
One-time cookies: Preventing session hijacking attacks with disposable credentials
I Dacosta, S Chakradeo, M Ahamad, P Traynor
Georgia Institute of Technology, 2011
232011
Securerun: Cheat-proof and private summaries for location-based activities
A Pham, K Huguenin, I Bilogrevic, I Dacosta, JP Hubaux
IEEE Transactions on Mobile Computing 15 (8), 2109-2123, 2016
212016
Servartuka: Dynamic distribution of state to improve sip server scalability
VA Balasubramaniyan, A Acharya, M Ahamad, M Srivatsa, I Dacosta, ...
Distributed Computing Systems, 2008. ICDCS'08. The 28th International …, 2008
212008
A Predictive Model for User Motivation and Utility Implications of Privacy Protection Mechanisms in Location Check-Ins
K Huguenin, I Bilogrevic, JS Machado, S Mihaila, R Shokri, I Dacosta, ...
IEEE Transactions on Mobile Computing, 2017
202017
Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks.
I Dacosta, P Traynor
USENIX Annual Technical Conference, 2010
192010
Improving authentication performance of distributed SIP proxies
I Dacosta, V Balasubramaniyan, M Ahamad, P Traynor
Proceedings of the 3rd International Conference on Principles, Systems and …, 2009
162009
ucentive: An efficient, anonymous and unlinkable incentives scheme
M Milutinovic, I Dacosta, A Put, B De Decker
Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 588-595, 2015
122015
Mix-in-place anonymous networking using secure function evaluation
N Nipane, I Dacosta, P Traynor
Proceedings of the 27th Annual Computer Security Applications Conference, 63-72, 2011
112011
Improving authentication performance of distributed SIP proxies
I Dacosta, V Balasubramaniyan, M Ahamad, P Traynor
IEEE Transactions on Parallel and Distributed Systems 22 (11), 1804-1812, 2011
102011
inshopnito: An advanced yet privacy-friendly mobile shopping application
A Put, I Dacosta, M Milutinovic, B De Decker, S Seys, F Boukayoua, ...
Services (SERVICES), 2014 IEEE World Congress on, 129-136, 2014
72014
An efficient and unlinkable incentives scheme
M Milutinovic, I Dacosta, A Put, B De Decker
Department of Computer Science, KU Leuven, 2014
62014
Efficient oblivious computation techniques for privacy-preserving mobile applications
H Carter, C Amrutkar, I Dacosta, P Traynor
Georgia Institute of Technology, 2011
62011
Security analysis of an ip phone: Cisco 7960g
I Dacosta, N Mehta, E Metrock, J Giffin
Principles, Systems and Applications of IP Telecommunications. Services and …, 2008
62008
Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data
AM Olteanu, K Huguenin, I Dacosta, JP Hubaux
25th Network and Distributed System Security Symposium (NDSS), 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20