Tzipora Halevi

Orcid: 0000-0003-3988-0239

According to our database1, Tzipora Halevi authored at least 34 papers between 2009 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 




Improving Mobile Device Security by Embodying and Co-adapting a Behavioral Biometric Interface.
Frontiers Comput. Sci., 2022

A Survey on Phishing Website Detection Using Deep Neural Networks.
Proceedings of the HCI International 2022 - Late Breaking Posters, 2022

Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
IACR Cryptol. ePrint Arch., 2021

Foundations for Esports Curricula in Higher Education.
Proceedings of the 2021 Working Group Reports on Innovation and Technology in Computer Science Education, 2021

Towards a Framework to Support the Design of Esports Curricula in Higher Education.
Proceedings of the ITiCSE '21: Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V.2, Virtual Event, Germany, June 26, 2021

Supporting private data on Hyperledger Fabric with secure multiparty computation.
IBM J. Res. Dev., 2019

Homomorphic Training of 30, 000 Logistic Regression Models.
IACR Cryptol. ePrint Arch., 2019

Feasibility Assessment of Cloud SaaS Enabled Collaboration and Information Confidentiality for the Public Accounting Industry.
Proceedings of the HCI International 2019 - Late Breaking Papers, 2019

Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation.
Proceedings of the IEEE International Conference on Blockchain, 2019

Cultural and Psychological Factors in Cyber-Security.
J. Mobile Multimedia, 2017

Implementing BP-Obfuscation Using Graph-Induced Encoding.
IACR Cryptol. ePrint Arch., 2017

Cultural and psychological factors in cyber-security.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios.
Int. J. Inf. Sec., 2015

Cybersecurity Competitions: The Human Angle.
IEEE Secur. Priv., 2015

An HMM-based multi-sensor approach for continuous mobile authentication.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Investigating users' readiness to trade-off biometric fingerprint data.
Proceedings of the IEEE International Conference on Identity, 2015

Leap Motion Controller for Authentication via Hand Geometry and Gestures.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Glass OTP: Secure and Convenient User Authentication on Google Glass.
Proceedings of the Financial Cryptography and Data Security, 2015

An HMM-based behavior modeling approach for continuous mobile authentication.
Proceedings of the IEEE International Conference on Acoustics, 2014

Touchpad Input for Continuous Biometric Authentication.
Proceedings of the Communications and Multimedia Security, 2014

Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing.
IEEE Trans. Inf. Forensics Secur., 2013

Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks.
IEEE Trans. Emerg. Top. Comput., 2013

Phishing, Personality Traits and Facebook
CoRR, 2013

A pilot study of cyber security and privacy related behavior and personality traits.
Proceedings of the 22nd International World Wide Web Conference, 2013

Sensing-enabled channels for hard-to-detect command and control of mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data.
Proceedings of the Computer Security - ESORICS 2012, 2012

A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Tree-based HB protocols for privacy-preserving authentication of RFID tags.
J. Comput. Secur., 2011

Accelerometers and randomness: perfect together.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Eavesdropping over Random Passwords via Keyboard Acoustic Emanations.
IACR Cryptol. ePrint Arch., 2010

On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
CoRR, 2009