Italo Dacosta, Ph.D. - Publications

Affiliations: 
2012 Georgia Institute of Technology, Atlanta, GA 
Area:
Computer Science

11 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Huguenin K, Bilogrevic I, Machado JS, Mihaila S, Shokri R, Dacosta I, Hubaux J. A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins Ieee Transactions On Mobile Computing. 17: 760-774. DOI: 10.1109/Tmc.2017.2741958  0.366
2016 Pham A, Huguenin K, Bilogrevic I, Dacosta I, Hubaux JP. SecureRun: Cheat-Proof and Private Summaries for Location-Based Activities Ieee Transactions On Mobile Computing. 15: 2109-2123. DOI: 10.1109/Tmc.2015.2483498  0.424
2015 Milutinovic M, Dacosta I, Put A, De Decker B. UCentive: An efficient, anonymous and unlinkable incentives scheme Proceedings - 14th Ieee International Conference On Trust, Security and Privacy in Computing and Communications, Trustcom 2015. 1: 588-595. DOI: 10.1109/Trustcom.2015.423  0.306
2014 Dacosta I, Put A, De Decker B. EmailCloak: A practical and flexible approach to improve email privacy Proceedings - 9th International Conference On Availability, Reliability and Security, Ares 2014. 242-250. DOI: 10.1109/ARES.2014.39  0.345
2014 Carter H, Amrutkar C, Dacosta I, Traynor P. For your phone only: Custom protocols for efficient secure function evaluation on mobile devices Security and Communication Networks. 7: 1165-1176. DOI: 10.1002/Sec.851  0.501
2012 Dacosta I, Chakradeo S, Ahamad M, Traynor P. One-time cookies: Preventing session hijacking attacks with stateless authentication tokens Acm Transactions On Internet Technology. 12. DOI: 10.1145/2220352.2220353  0.687
2012 Dacosta I, Ahamad M, Traynor P. Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 199-216. DOI: 10.1007/978-3-642-33167-1_12  0.636
2011 Dacosta I, Balasubramaniyan V, Ahamad M, Traynor P. Improving aquthentication performance of distributed SIP proxies Ieee Transactions On Parallel and Distributed Systems. 22: 1804-1812. DOI: 10.1109/Tpds.2011.62  0.53
2009 Dacosta I, Balasubramaniyan V, Ahamad M, Traynor P. Improving authentication performance of distributed SIP proxies Iptcomm 2009: Services and Security For Next Generation Networks - Proceedings of the 3rd International Conference On Principles, Systems and Applications of Ip Telecommunications. DOI: 10.1145/1595637.1595639  0.754
2008 Balasubramaniyan VA, Acharya A, Ahamad M, Srivatsa M, Dacosta I, Wright CP. SERvartuka: Dynamic distribution of state to improve SIP server scalability Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 562-572. DOI: 10.1109/ICDCS.2008.42  0.527
2008 Dacosta I, Mehta N, Metrock E, Giffin J. Security analysis of an IP phone: Cisco 7960G Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5310: 236-255. DOI: 10.1007/978-3-540-89054-6-12  0.337
Show low-probability matches.