Maliheh Shirvanian

Orcid: 0000-0001-9735-3723

According to our database1, Maliheh Shirvanian authored at least 31 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Compact: Approximating Complex Activation Functions for Secure Computation.
CoRR, 2023

"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality.
CoRR, 2023

2022
CoRA: Collaborative Risk-Aware Authentication.
IACR Cryptol. ePrint Arch., 2022

Oblivious Extractors and Improved Security in Biometric-based Authentication Systems.
IACR Cryptol. ePrint Arch., 2022

Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures.
IACR Cryptol. ePrint Arch., 2022

"Tell me, how do you know it's me?" Expectations of security and personalization measures for smart speaker applications.
CoRR, 2022

Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors.
CoRR, 2022

2021
Two-factor Password-authenticated Key Exchange with End-to-end Security.
ACM Trans. Priv. Secur., 2021

PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency.
CoRR, 2021

A hidden-password online password manager.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Practical Speech Re-use Prevention in Voice-driven Services.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2D-2FA: A New Dimension in Two-Factor Authentication.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
CREPE: A Privacy-Enhanced Crash Reporting System.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Building and Studying a Password Store that Perfectly Hides Passwords from Itself.
IEEE Trans. Dependable Secur. Comput., 2019

Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Quantifying the Breakability of Voice Assistants.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

2018
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines.
J. Comput. Secur., 2018

SPHINX: A Password Store that Perfectly Hides Passwords from Itself.
IACR Cryptol. ePrint Arch., 2018

Two-Factor Authentication with End-to-End Password Security.
IACR Cryptol. ePrint Arch., 2018

Camouflaged with Size: A Case Study of Espionage using Acquirable Single-Board Computers.
CoRR, 2018

2017
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
IACR Cryptol. ePrint Arch., 2015

All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines.
Proceedings of the Computer Security - ESORICS 2015, 2015

On the Security and Usability of Crypto Phones.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2008
Adaptive SVD-Based Digital Image Watermarking.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008


  Loading...