Babins Shrestha

Orcid: 0000-0002-1579-2325

According to our database1, Babins Shrestha authored at least 15 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Sensor-Based Proximity Detection in the Face of Active Adversaries.
IEEE Trans. Mob. Comput., 2019

ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

2018
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes.
IEEE Trans. Inf. Forensics Secur., 2017

2016
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics.
CoRR, 2016

SMASheD: Sniffing and Manipulating Android Sensor Data.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Inf. Forensics Secur., 2015

Contextual Proximity Detection in the Face of Context-Manipulating Adversaries.
CoRR, 2015

Curbing mobile malware based on user-transparent hand movements.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

2014
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013


  Loading...