Saurabh Panjwani

According to our database1, Saurabh Panjwani authored at least 18 papers between 2005 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Crowdsourcing Attacks on Biometric Systems.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

2013
Do not embarrass: re-examining user concerns for online tracking and advertising.
Proceedings of the Symposium On Usable Privacy and Security, 2013

The paper slip should be there!: perceptions of transaction receipts in branchless banking.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Practical receipt authentication for branchless banking.
Proceedings of the Annual Symposium on Computing for Development, 2013

Understanding the privacy-personalization dilemma for web search: a user perspective.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2011
Towards end-to-end security in branchless banking.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Hyke: a low-cost remote attendance tracking system for developing regions.
Proceedings of the 5th ACM workshop on Networked systems for developing regions, 2011

Computing security in the developing world: a case for multidisciplinary research.
Proceedings of the 5th ACM workshop on Networked systems for developing regions, 2011

Script-agnostic reflow of text in document images.
Proceedings of the 13th Conference on Human-Computer Interaction with Mobile Devices and Services, 2011

2010
Usably secure, low-cost authentication for mobile banking.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Collage: a presentation tool for school teachers.
Proceedings of the 4th ACM/IEEE International Conference on Information and Communication Technologies and Development, 2010

2008
Optimal communication complexity of generic multicast key distribution.
IEEE/ACM Trans. Netw., 2008

2007
Private group communication : two perspectives and a unifying solution.
PhD thesis, 2007

Analysis of the SPV secure routing protocol: weaknesses and lessons.
Comput. Commun. Rev., 2007

Tackling Adaptive Corruptions in Multicast Encryption Protocols.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

2006
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

2005
Append-Only Signatures.
IACR Cryptol. ePrint Arch., 2005

Adaptive Security of Symbolic Encryption.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005


  Loading...