Maliheh Shirvanian
Orcid: 0000-0001-9735-3723
According to our database1,
Maliheh Shirvanian
authored at least 31 papers
between 2008 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
CoRR, 2023
"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality.
CoRR, 2023
2022
Oblivious Extractors and Improved Security in Biometric-based Authentication Systems.
IACR Cryptol. ePrint Arch., 2022
Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures.
IACR Cryptol. ePrint Arch., 2022
"Tell me, how do you know it's me?" Expectations of security and personalization measures for smart speaker applications.
CoRR, 2022
Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors.
CoRR, 2022
2021
ACM Trans. Priv. Secur., 2021
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency.
CoRR, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019
2018
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines.
J. Comput. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Camouflaged with Size: A Case Study of Espionage using Acquirable Single-Board Computers.
CoRR, 2018
2017
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008