Payas Gupta

According to our database1, Payas Gupta authored at least 20 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks.
Proceedings of the 10th ACM Conference on Web Science, 2018

Towards Measuring the Effectiveness of Telephony Blacklists.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Mind your SMSes: Mitigating social engineering in second factor authentication.
Comput. Secur., 2017

SoK: Fraud in Telephony Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution.
Proceedings of the Computer Security - ESORICS 2016, 2016

Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

MobiPot: Understanding Mobile Telephony Threats with Honeycards.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks.
CoRR, 2015

Phoneypot: Data-driven Understanding of Telephony Threats.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Keystroke biometrics: the user perspective.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
I can be You: Questioning the use of Keystroke Dynamics as Biometrics.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Your love is public now: questioning the use of personal information in authentication.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Keystroke Timing Analysis of on-the-fly Web Apps.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
HuMan: Creating memorable fingerprints of mobile users.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

OTO: online trust oracle for user-centric trust establishment.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Coercion resistance in authentication responsibility shifting.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2010
Fighting Coercion Attacks in Key Generation using Skin Conductance.
Proceedings of the 19th USENIX Security Symposium, 2010

2009
SS-IDS: Statistical Signature Based IDS.
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009


  Loading...