Nitesh Saxena

Orcid: 0000-0001-6083-104X

According to our database1, Nitesh Saxena authored at least 185 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?
Proc. Priv. Enhancing Technol., January, 2024

Sound-based Two-factor Authentication: Vulnerabilities and Redesign.
ACM Trans. Priv. Secur., 2024

2023
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures.
Pervasive Mob. Comput., January, 2023

A Survey of Threats to Research Literature-dependent Medical AI Solutions.
ACM Comput. Surv., 2023

VOICE-ZEUS: Impersonating Zoom's E2EE-Protected Static Media and Textual Communications via Simple Voice Manipulations.
CoRR, 2023

BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!
Proceedings of the 32nd USENIX Security Symposium, 2023

Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Ballot Tabulation Using Deep Learning.
Proceedings of the 24th IEEE International Conference on Information Reuse and Integration for Data Science, 2023

EmoLeak: Smartphone Motions Reveal Emotions.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Increasing Automotive Electrical Equipment Effectiveness with Enhanced Iron Loss Estimation Techniques.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

Speaker Anonymity and Voice Conversion Vulnerability: A Speaker Recognition Analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices.
IEEE Trans. Mob. Comput., 2022

EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers.
CoRR, 2022

Predatory Medicine: Exploring and Measuring the Vulnerability of Medical AI to Predatory Science.
CoRR, 2022

BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Mobile Mental Health Apps: Alternative Intervention or Intrusion?
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Personalized health monitoring via vital sign measurements leveraging motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication.
Proceedings of the Applied Cryptography and Network Security, 2022

Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Two-factor Password-authenticated Key Exchange with End-to-end Security.
ACM Trans. Priv. Secur., 2021

Authentication of Voice Commands by Leveraging Vibrations in Wearables.
IEEE Secur. Priv., 2021

PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency.
CoRR, 2021

SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

A hidden-password online password manager.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Analyzing the Security of OTP 2FA in the Face of Malicious Terminals.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity.
CoRR, 2020

Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

CREPE: A Privacy-Enhanced Crash Reporting System.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Sensor-Based Proximity Detection in the Face of Active Adversaries.
IEEE Trans. Mob. Comput., 2019

Building and Studying a Password Store that Perfectly Hides Passwords from Itself.
IEEE Trans. Dependable Secur. Comput., 2019

Noisy Vibrational Pairing of IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2019

Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2019

Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers.
CoRR, 2019

ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Compromising Speech Privacy under Continuous Masking in Personal Spaces.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Quantifying the Breakability of Voice Assistants.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

CATCHA: When Cats Track Your Movements Online.
Proceedings of the Information Security Practice and Experience, 2019

Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines.
J. Comput. Secur., 2018

SPHINX: A Password Store that Perfectly Hides Passwords from Itself.
IACR Cryptol. ePrint Arch., 2018

Two-Factor Authentication with End-to-End Password Security.
IACR Cryptol. ePrint Arch., 2018

An Offensive and Defensive Exposition of Wearable Computing.
ACM Comput. Surv., 2018

Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports.
CoRR, 2018

Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes.
IEEE Trans. Inf. Forensics Secur., 2017

On the security and usability of dynamic cognitive game CAPTCHAs.
J. Comput. Secur., 2017

Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study.
Proceedings of the 26th International Conference on World Wide Web, 2017

YELP: masking sound-based opportunistic attacks in zero-effort deauthentication.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

PEEP: Passively Eavesdropping Private Input via Brainwave Signals.
Proceedings of the Financial Cryptography and Data Security, 2017

CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings.
IEEE Trans. Inf. Forensics Secur., 2016

Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics.
CoRR, 2016

Task-Dependent Changes in Frontal-Parietal Activation and Connectivity During Visual Search.
Brain Connect., 2016

Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds.
Proceedings of the Financial Cryptography and Data Security, 2016

SMASheD: Sniffing and Manipulating Android Sensor Data.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Gametrics: towards attack-resilient behavioral authentication with simple cognitive games.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Inf. Forensics Secur., 2015

Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios.
Int. J. Inf. Sec., 2015

Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
IACR Cryptol. ePrint Arch., 2015

Contextual Proximity Detection in the Face of Context-Manipulating Adversaries.
CoRR, 2015

Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication.
CoRR, 2015

Curbing mobile malware based on user-transparent hand movements.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines.
Proceedings of the Computer Security - ESORICS 2015, 2015

A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

On the Security and Usability of Crypto Phones.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems.
Secur. Commun. Networks, 2014

Web search query privacy: Evaluating query obfuscation and anonymizing networks.
J. Comput. Secur., 2014

Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Gaming the game: Defeating a game captcha with efficient and robust hybrid attacks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing.
Proceedings of the Financial Cryptography and Data Security, 2014

Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing.
IEEE Trans. Inf. Forensics Secur., 2013

Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks.
IEEE Trans. Emerg. Top. Comput., 2013

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing.
IEEE Trans. Dependable Secur. Comput., 2013

Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
CoRR, 2013

Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing.
Proceedings of the Financial Cryptography and Data Security, 2013

Sensing-enabled channels for hard-to-detect command and control of mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

On the viability of CAPTCHAs for use in telephony systems: a usability field study.
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013

2012
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User.
IEEE Trans. Mob. Comput., 2012

Location-aware and safer cards: enhancing RFID security and privacy via location sensing.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

Estimating age privacy leakage in online social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exploring Mobile Proxies for Better Password Authentication.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data.
Proceedings of the Computer Security - ESORICS 2012, 2012

A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Secure Device Pairing Based on a Visual Channel: Design and Usability Study.
IEEE Trans. Inf. Forensics Secur., 2011

Tree-based HB protocols for privacy-preserving authentication of RFID tags.
J. Comput. Secur., 2011

Data remanence effects on memory-based entropy collection for RFID systems.
Int. J. Inf. Sec., 2011

Cover locations: availing location-based services without revealing the location.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Accelerometers and randomness: perfect together.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

On the limitations of query obfuscation techniques for location privacy.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook.
Proceedings of the Database Systems for Adanced Applications, 2011

Pairing devices for social interactions: a comparative usability evaluation.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Playful security: A computer game for secure wireless device pairing.
Proceedings of the 16th International Conference on Computer Games, 2011

On the effectiveness of anonymizing networks for web search privacy.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol.
IEEE Trans. Inf. Forensics Secur., 2010

Password-Protected Secret Sharing.
IACR Cryptol. ePrint Arch., 2010

Eavesdropping over Random Passwords via Keyboard Acoustic Emanations.
IACR Cryptol. ePrint Arch., 2010

Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
CoRR, 2010

Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

On the Privacy of Peer-Assisted Distribution of Security Patches.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

A Comparative Usability Evaluation of Traditional Password Managers.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Groupthink: usability of secure group association for wireless devices.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Shoulder-Surfing Safe Login in a Partially Observable Attacker Model.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
IEEE Trans. Parallel Distributed Syst., 2009

Noninteractive self-certification for long-lived mobile ad hoc networks.
IEEE Trans. Inf. Forensics Secur., 2009

A comparative study of secure device pairing methods.
Pervasive Mob. Comput., 2009

Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting
CoRR, 2009

We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
CoRR, 2009

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
CoRR, 2009

Treat 'em like other devices: user authentication of multiple personal RFID tags.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Caveat Emptor: A Comparative Study of Secure Device Pairing Methods.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison.
Proceedings of the NBiS 2009, 2009

Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

On the Usability of Secure Association of Wireless Devices Based on Distance Bounding.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes
CoRR, 2008

Universal device pairing using an auxiliary device.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Automated Device Pairing for Asymmetric Pairing Scenarios.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Pairing Devices with Good Quality Output Interfaces.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Threshold cryptography in P2P and MANETs: The case of access control.
Comput. Networks, 2007

Robust self-keying mobile ad hoc networks.
Comput. Networks, 2007

2006
Secure Device Pairing based on a Visual Channel.
IACR Cryptol. ePrint Arch., 2006

Secure Device Pairing based on a Visual Channel (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Public Key Cryptography Sans Certificates in Ad Hoc Networks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Further Simplifications in Proactive RSA Signatures.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Efficient Node Admission for Short-lived Mobile Ad Hoc Networks.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

2004
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Identity-Based Access Control for Ad Hoc Groups.
Proceedings of the Information Security and Cryptology, 2004

Access control in ad hoc groups.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

2003
Admission control in Peer-to-Peer: design and performance evaluation.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003


  Loading...