BibTeX records: Nitesh Saxena

download as .bib file

@article{DBLP:journals/popets/LiuIS24,
  author       = {Zengrui Liu and
                  Umar Iqbal and
                  Nitesh Saxena},
  title        = {Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {280--299},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0016},
  doi          = {10.56553/POPETS-2024-0016},
  timestamp    = {Wed, 13 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/LiuIS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShresthaMS24,
  author       = {Prakash Shrestha and
                  Ahmed Tanvir Mahdad and
                  Nitesh Saxena},
  title        = {Sound-based Two-factor Authentication: Vulnerabilities and Redesign},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {5:1--5:27},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632175},
  doi          = {10.1145/3632175},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShresthaMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlatawiS24,
  author       = {Mashari Alatawi and
                  Nitesh Saxena},
  editor       = {Jo{\~{a}}o P. Vilela and
                  Haya Schulmann and
                  Ninghui Li},
  title        = {Automating Key Fingerprint Comparisons in Secure Mobile Messaging
                  Apps: {A} Case Study of Signal},
  booktitle    = {Proceedings of the Fourteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2024, Porto, Portugal, June 19-21,
                  2024},
  pages        = {277--288},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626232.3653251},
  doi          = {10.1145/3626232.3653251},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AlatawiS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiuS24,
  author       = {Zengrui Liu and
                  Nitesh Saxena},
  title        = {Dual Study of Canvas Fingerprinting Based Authentication: {A} Novel
                  Spoofing Attack and the Countermeasure},
  booktitle    = {44th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2024, Jersey City, NJ, USA, July 23-26, 2024},
  pages        = {1354--1364},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICDCS60910.2024.00127},
  doi          = {10.1109/ICDCS60910.2024.00127},
  timestamp    = {Wed, 11 Sep 2024 11:31:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/LiuS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-05876,
  author       = {Shalini Saini and
                  Nitesh Saxena},
  title        = {Privacy and Security of Women's Reproductive Health Apps in a Changing
                  Legal Landscape},
  journal      = {CoRR},
  volume       = {abs/2404.05876},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.05876},
  doi          = {10.48550/ARXIV.2404.05876},
  eprinttype    = {arXiv},
  eprint       = {2404.05876},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-05876.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-19683,
  author       = {Jimmy Dani and
                  Kalyan Nakka and
                  Nitesh Saxena},
  title        = {Breaking Indistinguishability with Transfer Learning: {A} First Look
                  at {SPECK32/64} Lightweight Block Ciphers},
  journal      = {CoRR},
  volume       = {abs/2405.19683},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.19683},
  doi          = {10.48550/ARXIV.2405.19683},
  eprinttype    = {arXiv},
  eprint       = {2405.19683},
  timestamp    = {Fri, 21 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-19683.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-05364,
  author       = {Kalyan Nakka and
                  Jimmy Dani and
                  Nitesh Saxena},
  title        = {Is On-Device {AI} Broken and Exploitable? Assessing the Trust and
                  Ethics in Small Language Models},
  journal      = {CoRR},
  volume       = {abs/2406.05364},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.05364},
  doi          = {10.48550/ARXIV.2406.05364},
  eprinttype    = {arXiv},
  eprint       = {2406.05364},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-05364.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-16964,
  author       = {Jimmy Dani and
                  Brandon McCulloh and
                  Nitesh Saxena},
  title        = {When {AI} Defeats Password Deception! {A} Deep Learning Framework
                  to Distinguish Passwords and Honeywords},
  journal      = {CoRR},
  volume       = {abs/2407.16964},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.16964},
  doi          = {10.48550/ARXIV.2407.16964},
  eprinttype    = {arXiv},
  eprint       = {2407.16964},
  timestamp    = {Mon, 19 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-16964.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaniNS24,
  author       = {Jimmy Dani and
                  Kalyan Nakka and
                  Nitesh Saxena},
  title        = {Breaking Indistinguishability with Transfer Learning: {A} First Look
                  at {SPECK32/64} Lightweight Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/852},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaniNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/SainiS23,
  author       = {Shalini Saini and
                  Nitesh Saxena},
  title        = {A Survey of Threats to Research Literature-dependent Medical {AI}
                  Solutions},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {14s},
  pages        = {315:1--315:26},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592597},
  doi          = {10.1145/3592597},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/SainiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/ShresthaTTSTN23,
  author       = {Prakash Shrestha and
                  Hien Thi Thu Truong and
                  Pupu Toivonen and
                  Nitesh Saxena and
                  Sasu Tarkoma and
                  Petteri Nurmi},
  title        = {Chirp-Loc: Multi-factor authentication via acoustically-generated
                  location signatures},
  journal      = {Pervasive Mob. Comput.},
  volume       = {88},
  pages        = {101720},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.pmcj.2022.101720},
  doi          = {10.1016/J.PMCJ.2022.101720},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/ShresthaTTSTN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangYMA00S023,
  author       = {Tianfang Zhang and
                  Zhengkun Ye and
                  Ahmed Tanvir Mahdad and
                  Md Mojibur Rahman Redoy Akanda and
                  Cong Shi and
                  Yan Wang and
                  Nitesh Saxena and
                  Yingying Chen},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded
                  Sensitive Info via {AR/VR} Motion Sensors},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {446--459},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623102},
  doi          = {10.1145/3576915.3623102},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangYMA00S023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SainiS23,
  author       = {Shalini Saini and
                  Nitesh Saxena},
  title        = {Speaker Anonymity and Voice Conversion Vulnerability: {A} Speaker
                  Recognition Analysis},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289030},
  doi          = {10.1109/CNS59707.2023.10289030},
  timestamp    = {Mon, 13 Nov 2023 09:18:17 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SainiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/GuptaSSRGD23,
  author       = {Neetu Gupta and
                  Arjun Singh and
                  Nitesh Saxena and
                  G. Ravivarman and
                  P. Gajendran and
                  Pallavi Deshpande},
  title        = {Increasing Automotive Electrical Equipment Effectiveness with Enhanced
                  Iron Loss Estimation Techniques},
  booktitle    = {6th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023},
  pages        = {2089--2092},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IC3I59117.2023.10398109},
  doi          = {10.1109/IC3I59117.2023.10398109},
  timestamp    = {Tue, 13 Feb 2024 08:24:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ic3i/GuptaSSRGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/MahdadSYZWCS23,
  author       = {Ahmed Tanvir Mahdad and
                  Cong Shi and
                  Zhengkun Ye and
                  Tianming Zhao and
                  Yan Wang and
                  Yingying Chen and
                  Nitesh Saxena},
  title        = {EmoLeak: Smartphone Motions Reveal Emotions},
  booktitle    = {43rd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2023, Hong Kong, July 18-21, 2023},
  pages        = {316--326},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDCS57875.2023.00052},
  doi          = {10.1109/ICDCS57875.2023.00052},
  timestamp    = {Tue, 24 Oct 2023 14:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/MahdadSYZWCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ZhaoZSWR23,
  author       = {Fei Zhao and
                  Chengcui Zhang and
                  Nitesh Saxena and
                  Dan S. Wallach and
                  AKM Shahariar Azad Rabby},
  title        = {Ballot Tabulation Using Deep Learning},
  booktitle    = {24th {IEEE} International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2023, Bellevue, WA, USA, August 4-6, 2023},
  pages        = {107--114},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IRI58017.2023.00026},
  doi          = {10.1109/IRI58017.2023.00026},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/ZhaoZSWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/MahdadJS23,
  author       = {Ahmed Tanvir Mahdad and
                  Mohammed Jubur and
                  Nitesh Saxena},
  editor       = {Xavier Costa{-}P{\'{e}}rez and
                  Joerg Widmer and
                  Diego Perino and
                  Domenico Giustiniano and
                  Haitham Al{-}Hassanieh and
                  Arash Asadi and
                  Landon P. Cox},
  title        = {Breaking Mobile Notification-based Authentication with Concurrent
                  Attacks Outside of Mobile Devices},
  booktitle    = {Proceedings of the 29th Annual International Conference on Mobile
                  Computing and Networking, {ACM} MobiCom 2023, Madrid, Spain, October
                  2-6, 2023},
  pages        = {59:1--59:15},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3570361.3613273},
  doi          = {10.1145/3570361.3613273},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/MahdadJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/ZhangYMA0SW023,
  author       = {Tianfang Zhang and
                  Zhengkun Ye and
                  Ahmed Tanvir Mahdad and
                  Md Mojibur Rahman Redoy Akanda and
                  Cong Shi and
                  Nitesh Saxena and
                  Yan Wang and
                  Yingying Chen},
  editor       = {Jie Wu and
                  Suresh Subramaniam and
                  Bo Ji and
                  Carla{-}Fabiana Chiasserini},
  title        = {Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info
                  via {AR/VR} Motion Sensors},
  booktitle    = {Proceedings of the Twenty-fourth International Symposium on Theory,
                  Algorithmic Foundations, and Protocol Design for Mobile Networks and
                  Mobile Computing, MobiHoc 2023, Washington, DC, USA, October 23-26,
                  2023},
  pages        = {308--309},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3565287.3623624},
  doi          = {10.1145/3565287.3623624},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/ZhangYMA0SW023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/Zhang0WYWS023,
  author       = {Tianfang Zhang and
                  Cong Shi and
                  Payton Walker and
                  Zhengkun Ye and
                  Yan Wang and
                  Nitesh Saxena and
                  Yingying Chen},
  editor       = {Petteri Nurmi and
                  Pan Hui and
                  Ardalan Amiri Sani and
                  Yunxin Liu},
  title        = {Passive Vital Sign Monitoring via Facial Vibrations Leveraging {AR/VR}
                  Headsets},
  booktitle    = {Proceedings of the 21st Annual International Conference on Mobile
                  Systems, Applications and Services, MobiSys 2023, Helsinki, Finland,
                  June 18-22, 2023},
  pages        = {96--109},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581791.3596848},
  doi          = {10.1145/3581791.3596848},
  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/Zhang0WYWS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WuSZWLSC23,
  author       = {Yi Wu and
                  Cong Shi and
                  Tianfang Zhang and
                  Payton Walker and
                  Jian Liu and
                  Nitesh Saxena and
                  Yingying Chen},
  title        = {Privacy Leakage via Unrestricted Motion-Position Sensors in the Age
                  of Virtual Reality: {A} Study of Snooping Typed Input on Virtual Keyboards},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {3382--3398},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179301},
  doi          = {10.1109/SP46215.2023.10179301},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WuSZWLSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GopalSWS23,
  author       = {Sindhu Reddy Kalathur Gopal and
                  Diksha Shukla and
                  James David Wheelock and
                  Nitesh Saxena},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive
                  Virtual World are Visible to All!},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {859--876},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/gopal},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GopalSWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MahdadS23,
  author       = {Ahmed Tanvir Mahdad and
                  Nitesh Saxena},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {SoK: {A} Comprehensive Evaluation of 2FA-based Schemes in the Face
                  of Active Concurrent Attacks from User Terminal},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {175--186},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590183},
  doi          = {10.1145/3558482.3590183},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MahdadS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AlatawiS23,
  author       = {Mashari Alatawi and
                  Nitesh Saxena},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies
                  in Secure Messaging Systems},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {187--201},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581773},
  doi          = {10.1145/3558482.3581773},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AlatawiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WalkerZ0S023,
  author       = {Payton Walker and
                  Tianfang Zhang and
                  Cong Shi and
                  Nitesh Saxena and
                  Yingying Chen},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks
                  through Physical Barriers},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {203--214},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581772},
  doi          = {10.1145/3558482.3581772},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WalkerZ0S023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-02042,
  author       = {Payton Walker and
                  Tianfang Zhang and
                  Cong Shi and
                  Nitesh Saxena and
                  Yingying Chen},
  title        = {BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks
                  through Physical Barriers},
  journal      = {CoRR},
  volume       = {abs/2302.02042},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.02042},
  doi          = {10.48550/ARXIV.2302.02042},
  eprinttype    = {arXiv},
  eprint       = {2302.02042},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-02042.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-03426,
  author       = {Mashari Alatawi and
                  Nitesh Saxena},
  title        = {Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End
                  Encryption Systems},
  journal      = {CoRR},
  volume       = {abs/2307.03426},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.03426},
  doi          = {10.48550/ARXIV.2307.03426},
  eprinttype    = {arXiv},
  eprint       = {2307.03426},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-03426.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-13894,
  author       = {Mashari Alatawi and
                  Nitesh Saxena},
  title        = {{VOICE-ZEUS:} Impersonating Zoom's E2EE-Protected Static Media and
                  Textual Communications via Simple Voice Manipulations},
  journal      = {CoRR},
  volume       = {abs/2310.13894},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.13894},
  doi          = {10.48550/ARXIV.2310.13894},
  eprinttype    = {arXiv},
  eprint       = {2310.13894},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-13894.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/YangYLWCS22,
  author       = {Xin Yang and
                  Song Yang and
                  Jian Liu and
                  Chen Wang and
                  Yingying Chen and
                  Nitesh Saxena},
  title        = {Enabling Finger-Touch-Based Mobile User Authentication via Physical
                  Vibrations on IoT Devices},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {21},
  number       = {10},
  pages        = {3565--3580},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMC.2021.3057083},
  doi          = {10.1109/TMC.2021.3057083},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/YangYLWCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ShresthaS22,
  author       = {Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort
                  Deauthentication},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {85--104},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_5},
  doi          = {10.1007/978-3-031-09234-3\_5},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ShresthaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiuSS22,
  author       = {Zengrui Liu and
                  Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art
                  Fingerprinting Techniques},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {147--169},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_8},
  doi          = {10.1007/978-3-031-09234-3\_8},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiuSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/WalkerSAHS22,
  author       = {Payton Walker and
                  Shalini Saini and
                  S. Abhishek Anand and
                  Tzipora Halevi and
                  Nitesh Saxena},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential
                  for Hard Disk Drives to Eavesdrop Speech Vibrations},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {67--81},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517399},
  doi          = {10.1145/3488932.3517399},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/WalkerSAHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/WalkerS22,
  author       = {Payton Walker and
                  Nitesh Saxena},
  title        = {Laser Meager Listener: {A} Scientific Exploration of Laser-based Speech
                  Eavesdropping in Commercial User Space},
  booktitle    = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022, Genoa, Italy, June 6-10, 2022},
  pages        = {537--554},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSP53844.2022.00040},
  doi          = {10.1109/EUROSP53844.2022.00040},
  timestamp    = {Wed, 29 Jun 2022 16:03:24 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/WalkerS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ShiZZMYWSC22,
  author       = {Cong Shi and
                  Tianming Zhao and
                  Wenjin Zhang and
                  Ahmed Tanvir Mahdad and
                  Zhengkun Ye and
                  Yan Wang and
                  Nitesh Saxena and
                  Yingying Chen},
  title        = {Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain
                  Sensing on Phoneme Sounds},
  booktitle    = {42nd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2022, Bologna, Italy, July 10-13, 2022},
  pages        = {680--690},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDCS54860.2022.00071},
  doi          = {10.1109/ICDCS54860.2022.00071},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/ShiZZMYWSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AlatawiS22,
  author       = {Mashari Alatawi and
                  Nitesh Saxena},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End
                  Encryption Systems},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {100--123},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_6},
  doi          = {10.1007/978-3-031-29371-9\_6},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AlatawiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/Zhang00YWS0C22,
  author       = {Tianfang Zhang and
                  Cong Shi and
                  Tianming Zhao and
                  Zhengkun Ye and
                  Payton Walker and
                  Nitesh Saxena and
                  Yan Wang and
                  Yingying Chen},
  editor       = {Nirupama Bulusu and
                  Ehsan Aryafar and
                  Aruna Balasubramanian and
                  Junehwa Song},
  title        = {Personalized health monitoring via vital sign measurements leveraging
                  motion sensors on {AR/VR} headsets},
  booktitle    = {MobiSys '22: The 20th Annual International Conference on Mobile Systems,
                  Applications and Services, Portland, Oregon, 27 June 2022 - 1 July
                  2022},
  pages        = {529--530},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3498361.3538768},
  doi          = {10.1145/3498361.3538768},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/Zhang00YWS0C22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/0001YZ0M0CS22,
  author       = {Tianming Zhao and
                  Zhengkun Ye and
                  Tianfang Zhang and
                  Cong Shi and
                  Ahmed Tanvir Mahdad and
                  Yan Wang and
                  Yingying Chen and
                  Nitesh Saxena},
  editor       = {Nirupama Bulusu and
                  Ehsan Aryafar and
                  Aruna Balasubramanian and
                  Junehwa Song},
  title        = {Continuous blood pressure monitoring using low-cost motion sensors
                  on {AR/VR} headsets},
  booktitle    = {MobiSys '22: The 20th Annual International Conference on Mobile Systems,
                  Applications and Services, Portland, Oregon, 27 June 2022 - 1 July
                  2022},
  pages        = {589--590},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3498361.3538798},
  doi          = {10.1145/3498361.3538798},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/0001YZ0M0CS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ArisoyMS22,
  author       = {Cagri Arisoy and
                  Anuradha Mandal and
                  Nitesh Saxena},
  title        = {Human Brains Can't Detect Fake News: {A} Neuro-Cognitive Study of
                  Textual Disinformation Susceptibility},
  booktitle    = {19th Annual International Conference on Privacy, Security {\&}
                  Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PST55820.2022.9851990},
  doi          = {10.1109/PST55820.2022.9851990},
  timestamp    = {Fri, 02 Sep 2022 18:51:56 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/ArisoyMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SainiPS22,
  author       = {Shalini Saini and
                  Dhiral Panjwani and
                  Nitesh Saxena},
  title        = {Mobile Mental Health Apps: Alternative Intervention or Intrusion?},
  booktitle    = {19th Annual International Conference on Privacy, Security {\&}
                  Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PST55820.2022.9851975},
  doi          = {10.1109/PST55820.2022.9851975},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/SainiPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WalkerMZSG22,
  author       = {Payton Walker and
                  Nathan McClaran and
                  Zihao Zheng and
                  Nitesh Saxena and
                  Guofei Gu},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {BiasHacker: Voice Command Disruption by Exploiting Speaker Biases
                  in Automatic Speech Recognition},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528558},
  doi          = {10.1145/3507657.3528558},
  timestamp    = {Wed, 11 May 2022 08:49:13 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WalkerMZSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MandalS22,
  author       = {Anuradha Mandal and
                  Nitesh Saxena},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave
                  Devices},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {175--187},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528541},
  doi          = {10.1145/3507657.3528541},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MandalS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-00885,
  author       = {Zengrui Liu and
                  Umar Iqbal and
                  Nitesh Saxena},
  title        = {Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?},
  journal      = {CoRR},
  volume       = {abs/2202.00885},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.00885},
  eprinttype    = {arXiv},
  eprint       = {2202.00885},
  timestamp    = {Wed, 13 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-00885.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-06245,
  author       = {Shalini Saini and
                  Nitesh Saxena},
  title        = {Predatory Medicine: Exploring and Measuring the Vulnerability of Medical
                  {AI} to Predatory Science},
  journal      = {CoRR},
  volume       = {abs/2203.06245},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.06245},
  doi          = {10.48550/ARXIV.2203.06245},
  eprinttype    = {arXiv},
  eprint       = {2203.06245},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-06245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-10728,
  author       = {Shalini Saini and
                  Dhiral Panjwani and
                  Nitesh Saxena},
  title        = {Mobile Mental Health Apps: Alternative Intervention or Intrusion?},
  journal      = {CoRR},
  volume       = {abs/2206.10728},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.10728},
  doi          = {10.48550/ARXIV.2206.10728},
  eprinttype    = {arXiv},
  eprint       = {2206.10728},
  timestamp    = {Mon, 27 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-10728.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-08376,
  author       = {Cagri Arisoy and
                  Anuradha Mandal and
                  Nitesh Saxena},
  title        = {Human Brains Can't Detect Fake News: {A} Neuro-Cognitive Study of
                  Textual Disinformation Susceptibility},
  journal      = {CoRR},
  volume       = {abs/2207.08376},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.08376},
  doi          = {10.48550/ARXIV.2207.08376},
  eprinttype    = {arXiv},
  eprint       = {2207.08376},
  timestamp    = {Tue, 19 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-08376.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-12151,
  author       = {Ahmed Tanvir Mahdad and
                  Cong Shi and
                  Zhengkun Ye and
                  Tianming Zhao and
                  Yan Wang and
                  Yingying Chen and
                  Nitesh Saxena},
  title        = {EarSpy: Spying Caller Speech and Identity through Tiny Vibrations
                  of Smartphone Ear Speakers},
  journal      = {CoRR},
  volume       = {abs/2212.12151},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.12151},
  doi          = {10.48550/ARXIV.2212.12151},
  eprinttype    = {arXiv},
  eprint       = {2212.12151},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-12151.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShiWCS21,
  author       = {Cong Shi and
                  Yan Wang and
                  Yingying (Jennifer) Chen and
                  Nitesh Saxena},
  title        = {Authentication of Voice Commands by Leveraging Vibrations in Wearables},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {83--92},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077205},
  doi          = {10.1109/MSEC.2021.3077205},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShiWCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JareckiJKSS21,
  author       = {Stanislaw Jarecki and
                  Mohammed Jubur and
                  Hugo Krawczyk and
                  Nitesh Saxena and
                  Maliheh Shirvanian},
  title        = {Two-factor Password-authenticated Key Exchange with End-to-end Security},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {17:1--17:37},
  year         = {2021},
  url          = {https://doi.org/10.1145/3446807},
  doi          = {10.1145/3446807},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JareckiJKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WalkerS21,
  author       = {Payton Walker and
                  Nitesh Saxena},
  title        = {Evaluating the Effectiveness of Protection Jamming Devices in Mitigating
                  Smart Speaker Eavesdropping Attacks Using Gaussian White Noise},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {414--424},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485896},
  doi          = {10.1145/3485832.3485896},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WalkerS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/Anand0WSS021,
  author       = {S. Abhishek Anand and
                  Jian Liu and
                  Chen Wang and
                  Maliheh Shirvanian and
                  Nitesh Saxena and
                  Yingying Chen},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations
                  of Short Replayed Speech},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {67--81},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437518},
  doi          = {10.1145/3433210.3437518},
  timestamp    = {Sat, 18 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/Anand0WSS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/WuXW0S0Y21,
  author       = {Yi Wu and
                  Xiangyu Xu and
                  Payton R. Walker and
                  Jian Liu and
                  Nitesh Saxena and
                  Yingying Chen and
                  Jiadi Yu},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {{HVAC:} Evading Classifier-based Defenses in Hidden Voice Attacks},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {82--94},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437523},
  doi          = {10.1145/3433210.3437523},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/WuXW0S0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/JuburSSP21,
  author       = {Mohammed Jubur and
                  Prakash Shrestha and
                  Nitesh Saxena and
                  Jay Prakash},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Bypassing Push-based Second Factor and Passwordless Authentication
                  with Human-Indistinguishable Notifications},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {447--461},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453084},
  doi          = {10.1145/3433210.3453084},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/JuburSSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/PrakashYTBJSBZQ21,
  author       = {Jay Prakash and
                  Clarice Chua Qing Yu and
                  Tanvi Ravindra Thombre and
                  Andrei Bytes and
                  Mohammed Jubur and
                  Nitesh Saxena and
                  Lucienne Blessing and
                  Jianying Zhou and
                  Tony Q. S. Quek},
  title        = {Countering Concurrent Login Attacks in "Just Tap" Push-based
                  Authentication: {A} Redesign and Usability Evaluations},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {21--36},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00013},
  doi          = {10.1109/EUROSP51992.2021.00013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/PrakashYTBJSBZQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ShresthaSSP21,
  author       = {Prakash Shrestha and
                  Nitesh Saxena and
                  Diksha Shukla and
                  Vir V. Phoha},
  title        = {Press @{\textdollar}@{\textdollar} to Login: Strong Wearable Second
                  Factor Authentication via Short Memorywise Effortless Typing Gestures},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {71--87},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00016},
  doi          = {10.1109/EUROSP51992.2021.00016},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ShresthaSSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MahdadJS21,
  author       = {Ahmed Tanvir Mahdad and
                  Mohammed Jubur and
                  Nitesh Saxena},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Analyzing the Security of {OTP} 2FA in the Face of Malicious Terminals},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12918},
  pages        = {97--115},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86890-1\_6},
  doi          = {10.1007/978-3-030-86890-1\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/MahdadJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/0004XZWWLS0Y21,
  author       = {Cong Shi and
                  Xiangyu Xu and
                  Tianfang Zhang and
                  Payton Walker and
                  Yi Wu and
                  Jian Liu and
                  Nitesh Saxena and
                  Yingying Chen and
                  Jiadi Yu},
  title        = {Face-Mic: inferring live speech and speaker identity via subtle facial
                  dynamics captured by {AR/VR} motion sensors},
  booktitle    = {{ACM} MobiCom '21: The 27th Annual International Conference on Mobile
                  Computing and Networking, New Orleans, Louisiana, USA, October 25-29,
                  2021},
  pages        = {478--490},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447993.3483272},
  doi          = {10.1145/3447993.3483272},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/0004XZWWLS0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ShirvanianPJSJK21,
  author       = {Maliheh Shirvanian and
                  Christopher Robert Price and
                  Mohammed Jubur and
                  Nitesh Saxena and
                  Stanislaw Jarecki and
                  Hugo Krawczyk},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {A hidden-password online password manager},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {1683--1686},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3442131},
  doi          = {10.1145/3412841.3442131},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ShirvanianPJSJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WalkerS21,
  author       = {Payton Walker and
                  Nitesh Saxena},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {SoK: assessing the threat potential of vibration-based attacks against
                  live speech using mobile sensors},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {273--287},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467825},
  doi          = {10.1145/3448300.3467825},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WalkerS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AnandWLS021,
  author       = {S. Abhishek Anand and
                  Chen Wang and
                  Jian Liu and
                  Nitesh Saxena and
                  Yingying Chen},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Spearphone: a lightweight speech privacy exploit via accelerometer-sensed
                  reverberations from smartphone loudspeakers},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {288--299},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468499},
  doi          = {10.1145/3448300.3468499},
  timestamp    = {Sat, 18 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AnandWLS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-13607,
  author       = {Kiavash Satvat and
                  Maliheh Shirvanian and
                  Nitesh Saxena},
  title        = {{PASSAT:} Single Password Authenticated Secret-Shared Intrusion-Tolerant
                  Storage with Server Transparency},
  journal      = {CoRR},
  volume       = {abs/2102.13607},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.13607},
  eprinttype    = {arXiv},
  eprint       = {2102.13607},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-13607.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-10129,
  author       = {Zengrui Liu and
                  Prakash Shrestha and
                  Nitesh Saxena},
  title        = {Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art
                  Fingerprinting Techniques},
  journal      = {CoRR},
  volume       = {abs/2110.10129},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.10129},
  eprinttype    = {arXiv},
  eprint       = {2110.10129},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-10129.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShresthaLS20,
  author       = {Prakash Shrestha and
                  Zengrui Liu and
                  Nitesh Saxena},
  title        = {IvoriWatch: Exploring Transparent Integrity Verification of Remote
                  User Input Leveraging Wearables},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {706--716},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427279},
  doi          = {10.1145/3427228.3427279},
  timestamp    = {Tue, 15 Dec 2020 12:22:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShresthaLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShiW0SW20,
  author       = {Cong Shi and
                  Yan Wang and
                  Yingying Chen and
                  Nitesh Saxena and
                  Chen Wang},
  title        = {WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands
                  via Cross-Domain Comparison without Training},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {829--842},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427259},
  doi          = {10.1145/3427228.3427259},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShiW0SW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShirvanianMSA20,
  author       = {Maliheh Shirvanian and
                  Manar Mohamed and
                  Nitesh Saxena and
                  S. Abhishek Anand},
  title        = {Voicefox: Leveraging Inbuilt Transcription to Enhance the Security
                  of Machine-Human Speaker Verification against Voice Synthesis Attacks},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {870--883},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427289},
  doi          = {10.1145/3427228.3427289},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShirvanianMSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SatvatSHS20,
  author       = {Kiavash Satvat and
                  Maliheh Shirvanian and
                  Mahshid Hosseini and
                  Nitesh Saxena},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {{CREPE:} {A} Privacy-Enhanced Crash Reporting System},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {295--306},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3375738},
  doi          = {10.1145/3374664.3375738},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/SatvatSHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShresthaS20,
  author       = {Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Hacksaw: biometric-free non-stop web authentication in an emerging
                  world of wearables},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399366},
  doi          = {10.1145/3395351.3399366},
  timestamp    = {Tue, 29 Dec 2020 18:27:47 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShresthaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2020-1,
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7},
  doi          = {10.1007/978-3-030-63086-7},
  isbn         = {978-3-030-63085-0},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2020-2,
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {336},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63095-9},
  doi          = {10.1007/978-3-030-63095-9},
  isbn         = {978-3-030-63094-2},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-09083,
  author       = {Chen Wang and
                  Cong Shi and
                  Yingying Chen and
                  Yan Wang and
                  Nitesh Saxena},
  title        = {WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants
                  using Cross-Domain Speech Similarity},
  journal      = {CoRR},
  volume       = {abs/2003.09083},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.09083},
  eprinttype    = {arXiv},
  eprint       = {2003.09083},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-09083.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AnandS19,
  author       = {S. Abhishek Anand and
                  Nitesh Saxena},
  title        = {Noisy Vibrational Pairing of IoT Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {3},
  pages        = {530--545},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2018.2873372},
  doi          = {10.1109/TDSC.2018.2873372},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AnandS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShirvanianSJK19,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena and
                  Stanislaw Jarecki and
                  Hugo Krawczyk},
  title        = {Building and Studying a Password Store that Perfectly Hides Passwords
                  from Itself},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {770--782},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2019.2902551},
  doi          = {10.1109/TDSC.2019.2902551},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShirvanianSJK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0010MSZ19,
  author       = {Song Gao and
                  Manar Mohamed and
                  Nitesh Saxena and
                  Chengcui Zhang},
  title        = {Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs,
                  and Countermeasures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {1040--1053},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2719031},
  doi          = {10.1109/TDSC.2017.2719031},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/0010MSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ShresthaSTA19,
  author       = {Babins Shrestha and
                  Nitesh Saxena and
                  Hien Thi Thu Truong and
                  N. Asokan},
  title        = {Sensor-Based Proximity Detection in the Face of Active Adversaries},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {444--457},
  year         = {2019},
  url          = {https://doi.org/10.1109/TMC.2018.2839604},
  doi          = {10.1109/TMC.2018.2839604},
  timestamp    = {Tue, 05 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/ShresthaSTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangALW0S19,
  author       = {Chen Wang and
                  S. Abhishek Anand and
                  Jian Liu and
                  Payton Walker and
                  Yingying Chen and
                  Nitesh Saxena},
  editor       = {David M. Balenson},
  title        = {Defeating hidden audio channel attacks on voice assistants via audio-induced
                  surface vibrations},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {42--56},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359830},
  doi          = {10.1145/3359789.3359830},
  timestamp    = {Thu, 30 May 2024 10:08:27 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WangALW0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MohamedSS19,
  author       = {Manar Mohamed and
                  Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {David M. Balenson},
  title        = {Challenge-response behavioral mobile authentication: a comparative
                  study of graphical patterns and cognitive games},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {355--365},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359838},
  doi          = {10.1145/3359789.3359838},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MohamedSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShresthaSNS19,
  author       = {Prakash Shrestha and
                  Nitesh Saxena and
                  Ajaya Neupane and
                  Kiavash Satvat},
  editor       = {Swee{-}Huay Heng and
                  Javier L{\'{o}}pez},
  title        = {{CATCHA:} When Cats Track Your Movements Online},
  booktitle    = {Information Security Practice and Experience - 15th International
                  Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28,
                  2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11879},
  pages        = {172--193},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34339-2\_10},
  doi          = {10.1007/978-3-030-34339-2\_10},
  timestamp    = {Tue, 19 Nov 2019 17:01:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ShresthaSNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NeupaneSHB19,
  author       = {Ajaya Neupane and
                  Nitesh Saxena and
                  Leanne M. Hirshfield and
                  Sarah E. Bratt},
  title        = {The Crux of Voice (In)Security: {A} Brain Study of Speaker Legitimacy
                  Detection},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/the-crux-of-voice-insecurity-a-brain-study-of-speaker-legitimacy-detection/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NeupaneSHB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ShirvanianVS19,
  author       = {Maliheh Shirvanian and
                  Summer Vo and
                  Nitesh Saxena},
  title        = {Quantifying the Breakability of Voice Assistants},
  booktitle    = {2019 {IEEE} International Conference on Pervasive Computing and Communications,
                  PerCom, Kyoto, Japan, March 11-15, 2019},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PERCOM.2019.8767399},
  doi          = {10.1109/PERCOM.2019.8767399},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/ShirvanianVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AnandWS19,
  author       = {S. Abhishek Anand and
                  Payton Walker and
                  Nitesh Saxena},
  title        = {Compromising Speech Privacy under Continuous Masking in Personal Spaces},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949053},
  doi          = {10.1109/PST47121.2019.8949053},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/AnandWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/NeupaneSHS19,
  author       = {Ajaya Neupane and
                  Kiavash Satvat and
                  Mahshid Hosseini and
                  Nitesh Saxena},
  title        = {Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions
                  and Personal Information},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949062},
  doi          = {10.1109/PST47121.2019.8949062},
  timestamp    = {Mon, 13 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/NeupaneSHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ShirvanianS19,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena},
  title        = {Stethoscope: Crypto Phones with Transparent {\&} Robust Fingerprint
                  Comparisons using Inter Text-Speech Transformations},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949068},
  doi          = {10.1109/PST47121.2019.8949068},
  timestamp    = {Mon, 13 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ShirvanianS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ShresthaMS19,
  author       = {Babins Shrestha and
                  Manar Mohamed and
                  Nitesh Saxena},
  title        = {{ZEMFA:} Zero-Effort Multi-Factor Authentication based on Multi-Modal
                  Gait Biometrics},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949032},
  doi          = {10.1109/PST47121.2019.8949032},
  timestamp    = {Mon, 13 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ShresthaMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-05972,
  author       = {S. Abhishek Anand and
                  Chen Wang and
                  Jian Liu and
                  Nitesh Saxena and
                  Yingying Chen},
  title        = {Spearphone: {A} Speech Privacy Exploit via Accelerometer-Sensed Reverberations
                  from Smartphone Loudspeakers},
  journal      = {CoRR},
  volume       = {abs/1907.05972},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.05972},
  eprinttype    = {arXiv},
  eprint       = {1907.05972},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-05972.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ShresthaS17,
  author       = {Prakash Shrestha and
                  Nitesh Saxena},
  title        = {An Offensive and Defensive Exposition of Wearable Computing},
  journal      = {{ACM} Comput. Surv.},
  volume       = {50},
  number       = {6},
  pages        = {92:1--92:39},
  year         = {2018},
  url          = {https://doi.org/10.1145/3133837},
  doi          = {10.1145/3133837},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ShresthaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ShirvanianSM18,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena and
                  Dibya Mukhopadhyay},
  title        = {Short voice imitation man-in-the-middle attacks on Crypto Phones:
                  Defeating humans and machines},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {311--333},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-17970},
  doi          = {10.3233/JCS-17970},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ShirvanianSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NeupaneSSSB18,
  author       = {Ajaya Neupane and
                  Kiavash Satvat and
                  Nitesh Saxena and
                  Despina Stavrinos and
                  Haley Johnson Bishop},
  title        = {Do Social Disorders Facilitate Social Engineering?: {A} Case Study
                  of Autism and Phishing Attacks},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {467--477},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274730},
  doi          = {10.1145/3274694.3274730},
  timestamp    = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NeupaneSSSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShresthaSS18,
  author       = {Prakash Shrestha and
                  Babins Shrestha and
                  Nitesh Saxena},
  title        = {Home Alone: The Insider Threat of Unattended Wearables and {A} Defense
                  using Audio Proximity},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433216},
  doi          = {10.1109/CNS.2018.8433216},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShresthaSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AnandS18,
  author       = {S. Abhishek Anand and
                  Nitesh Saxena},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less)
                  Masking Defenses},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {103--110},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176341},
  doi          = {10.1145/3176258.3176341},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/AnandS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JareckiKSS18,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Maliheh Shirvanian and
                  Nitesh Saxena},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Two-Factor Authentication with End-to-End Password Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {431--461},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_15},
  doi          = {10.1007/978-3-319-76581-5\_15},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JareckiKSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AnandS18,
  author       = {S. Abhishek Anand and
                  Nitesh Saxena},
  title        = {Speechless: Analyzing the Threat to Speech Privacy from Smartphone
                  Motion Sensors},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {1000--1017},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00004},
  doi          = {10.1109/SP.2018.00004},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AnandS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShresthaS18,
  author       = {Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Listening Watch: Wearable Two-Factor Authentication using Speech Signals
                  Resilient to Near-Far Attacks},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212501},
  doi          = {10.1145/3212480.3212501},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ShresthaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-01718,
  author       = {Kiavash Satvat and
                  Nitesh Saxena},
  title        = {Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports},
  journal      = {CoRR},
  volume       = {abs/1808.01718},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.01718},
  eprinttype    = {arXiv},
  eprint       = {1808.01718},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-01718.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKSS18,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Maliheh Shirvanian and
                  Nitesh Saxena},
  title        = {Two-Factor Authentication with End-to-End Password Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShirvanianJKS18,
  author       = {Maliheh Shirvanian and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Nitesh Saxena},
  title        = {{SPHINX:} {A} Password Store that Perfectly Hides Passwords from Itself},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShirvanianJKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MohamedGSSZKO17,
  author       = {Manar Mohamed and
                  Song Gao and
                  Niharika Sachdeva and
                  Nitesh Saxena and
                  Chengcui Zhang and
                  Ponnurangam Kumaraguru and
                  Paul C. van Oorschot},
  title        = {On the security and usability of dynamic cognitive game CAPTCHAs},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {205--230},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-16847},
  doi          = {10.3233/JCS-16847},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MohamedGSSZKO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MohamedSS17,
  author       = {Manar Mohamed and
                  Babins Shrestha and
                  Nitesh Saxena},
  title        = {SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive
                  Purposes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {901--913},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2620278},
  doi          = {10.1109/TIFS.2016.2620278},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MohamedSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShirvanianSG17,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena and
                  Jesvin James George},
  title        = {On the Pitfalls of End-to-End Encrypted Communications: {A} Study
                  of Remote Key-Fingerprint Verification},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {499--511},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134610},
  doi          = {10.1145/3134600.3134610},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShirvanianSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuWCS17,
  author       = {Jian Liu and
                  Chen Wang and
                  Yingying Chen and
                  Nitesh Saxena},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces
                  via Physical Vibration},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {73--87},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133964},
  doi          = {10.1145/3133956.3133964},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuWCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShirvanianS17,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{CCCP:} Closed Caption Crypto Phones to Resist {MITM} Attacks, Human
                  Errors and Click-Through},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1329--1342},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134013},
  doi          = {10.1145/3133956.3134013},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShirvanianS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NeupaneRS17,
  author       = {Ajaya Neupane and
                  Md. Lutfor Rahman and
                  Nitesh Saxena},
  editor       = {Aggelos Kiayias},
  title        = {{PEEP:} Passively Eavesdropping Private Input via Brainwave Signals},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {227--246},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_12},
  doi          = {10.1007/978-3-319-70972-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/NeupaneRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ShirvanianJKS17,
  author       = {Maliheh Shirvanian and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Nitesh Saxena},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {{SPHINX:} {A} Password Store that Perfectly Hides Passwords from Itself},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {1094--1104},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.64},
  doi          = {10.1109/ICDCS.2017.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ShirvanianJKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AnandS17,
  author       = {S. Abhishek Anand and
                  Nitesh Saxena},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Coresident evil: noisy vibrational pairing in the face of co-located
                  acoustic eavesdropping},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {173--183},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098256},
  doi          = {10.1145/3098243.3098256},
  timestamp    = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AnandS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShresthaAS17,
  author       = {Prakash Shrestha and
                  S. Abhishek Anand and
                  Nitesh Saxena},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {{YELP:} masking sound-based opportunistic attacks in zero-effort deauthentication},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098259},
  doi          = {10.1145/3098243.3098259},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShresthaAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NeupaneSH17,
  author       = {Ajaya Neupane and
                  Nitesh Saxena and
                  Leanne M. Hirshfield},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {Neural Underpinnings of Website Legitimacy and Familiarity Detection:
                  An fNIRS Study},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {1571--1580},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052702},
  doi          = {10.1145/3038912.3052702},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/NeupaneSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShirvanianSG17,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena and
                  Jesvin James George},
  title        = {On the Pitfalls of End-to-End Encrypted Communications: {A} Study
                  of Remote Key-Fingerprint Verification},
  journal      = {CoRR},
  volume       = {abs/1707.05285},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.05285},
  eprinttype    = {arXiv},
  eprint       = {1707.05285},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShirvanianSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/brain/MaximoNSJK16,
  author       = {Jose Omar Maximo and
                  Ajaya Neupane and
                  Nitesh Saxena and
                  Robert M. Joseph and
                  Rajesh K. Kana},
  title        = {Task-Dependent Changes in Frontal-Parietal Activation and Connectivity
                  During Visual Search},
  journal      = {Brain Connect.},
  volume       = {6},
  number       = {4},
  pages        = {335--344},
  year         = {2016},
  url          = {https://doi.org/10.1089/brain.2015.0343},
  doi          = {10.1089/BRAIN.2015.0343},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/brain/MaximoNSJK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NeupaneSMK16,
  author       = {Ajaya Neupane and
                  Nitesh Saxena and
                  Jose Omar Maximo and
                  Rajesh K. Kana},
  title        = {Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware
                  Warnings},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1970--1983},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2566265},
  doi          = {10.1109/TIFS.2016.2566265},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NeupaneSMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShresthaMTS16,
  author       = {Babins Shrestha and
                  Manar Mohamed and
                  Sandeep Tamrakar and
                  Nitesh Saxena},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Theft-resilient mobile wallets: transparently authenticating {NFC}
                  users with tapping gesture biometrics},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {265--276},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991097},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShresthaMTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MohamedS16,
  author       = {Manar Mohamed and
                  Nitesh Saxena},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Gametrics: towards attack-resilient behavioral authentication with
                  simple cognitive games},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {277--288},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991096},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MohamedS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JareckiKSS16,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Maliheh Shirvanian and
                  Nitesh Saxena},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Device-Enhanced Password Protocols with Optimal Online-Offline Protection},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {177--188},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897880},
  doi          = {10.1145/2897845.2897880},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JareckiKSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShresthaSSS16,
  author       = {Babins Shrestha and
                  Maliheh Shirvanian and
                  Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login
                  based on Ambient Audio},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {908--919},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978328},
  doi          = {10.1145/2976749.2978328},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShresthaSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MohamedSS16,
  author       = {Manar Mohamed and
                  Babins Shrestha and
                  Nitesh Saxena},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {SMASheD: Sniffing and Manipulating Android Sensor Data},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {152--159},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857749},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MohamedSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AnandS16,
  author       = {S. Abhishek Anand and
                  Nitesh Saxena},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password
                  Keystrokes with Active Sounds},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {346--364},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_21},
  doi          = {10.1007/978-3-662-54970-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AnandS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HuhtaUJSSA16,
  author       = {Otto Huhta and
                  Swapnil Udar and
                  Mika Juuti and
                  Prakash Shrestha and
                  Nitesh Saxena and
                  N. Asokan},
  title        = {Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic
                  Human Observation Attacks},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/pitfalls-designing-zero-effort-deauthentication-opportunistic-human-observation-attacks.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/HuhtaUJSSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShresthaMS16,
  author       = {Prakash Shrestha and
                  Manar Mohamed and
                  Nitesh Saxena},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Slogger: Smashing Motion-based Touchstroke Logging with Transparent
                  System Noise},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {67--77},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939924},
  doi          = {10.1145/2939918.2939924},
  timestamp    = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShresthaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AnandS16,
  author       = {S. Abhishek Anand and
                  Nitesh Saxena},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {103--108},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939934},
  doi          = {10.1145/2939918.2939934},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AnandS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShresthaMS16,
  author       = {Babins Shrestha and
                  Manar Mohamed and
                  Nitesh Saxena},
  title        = {Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal
                  Gait Biometrics},
  journal      = {CoRR},
  volume       = {abs/1605.00766},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.00766},
  eprinttype    = {arXiv},
  eprint       = {1605.00766},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShresthaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HaleviS15,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  title        = {Keyboard acoustic side channel attacks: exploring realistic and security-sensitive
                  scenarios},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {5},
  pages        = {443--456},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0264-7},
  doi          = {10.1007/S10207-014-0264-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HaleviS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShresthaM0LS15,
  author       = {Babins Shrestha and
                  Di Ma and
                  Yan Zhu and
                  Haoyu Li and
                  Nitesh Saxena},
  title        = {Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging
                  Smartphone Malware},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2270--2283},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2436364},
  doi          = {10.1109/TIFS.2015.2436364},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ShresthaM0LS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaoMSZ15,
  author       = {Song Gao and
                  Manar Mohamed and
                  Nitesh Saxena and
                  Chengcui Zhang},
  title        = {Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver
                  Relay Attacks},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818006},
  doi          = {10.1145/2818000.2818006},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaoMSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShirvanianS15,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena},
  title        = {On the Security and Usability of Crypto Phones},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818007},
  doi          = {10.1145/2818000.2818007},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShirvanianS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AnandSS15,
  author       = {S. Abhishek Anand and
                  Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic
                  Passwords Using Acoustic Signals},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_7},
  doi          = {10.1007/978-3-319-26823-1\_7},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/AnandSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NeupaneRSH15,
  author       = {Ajaya Neupane and
                  Md. Lutfor Rahman and
                  Nitesh Saxena and
                  Leanne M. Hirshfield},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {A Multi-Modal Neuro-Physiological Study of Phishing Detection and
                  Malware Warnings},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {479--491},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813660},
  doi          = {10.1145/2810103.2813660},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NeupaneRSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MukhopadhyaySS15,
  author       = {Dibya Mukhopadhyay and
                  Maliheh Shirvanian and
                  Nitesh Saxena},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {All Your Voices are Belong to Us: Stealing Voices to Fool Humans and
                  Machines},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {599--621},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_30},
  doi          = {10.1007/978-3-319-24177-7\_30},
  timestamp    = {Sat, 19 Oct 2019 20:00:24 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MukhopadhyaySS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ShresthaMBST15,
  author       = {Babins Shrestha and
                  Manar Mohamed and
                  Anders Borg and
                  Nitesh Saxena and
                  Sandeep Tamrakar},
  title        = {Curbing mobile malware based on user-transparent hand movements},
  booktitle    = {2015 {IEEE} International Conference on Pervasive Computing and Communications,
                  PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015},
  pages        = {221--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PERCOM.2015.7146532},
  doi          = {10.1109/PERCOM.2015.7146532},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/ShresthaMBST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HuhtaSUSA15,
  author       = {Otto Huhta and
                  Prakash Shrestha and
                  Swapnil Udar and
                  Nitesh Saxena and
                  N. Asokan},
  title        = {Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort
                  Deauthentication},
  journal      = {CoRR},
  volume       = {abs/1505.05779},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.05779},
  eprinttype    = {arXiv},
  eprint       = {1505.05779},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HuhtaSUSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShresthaSTA15,
  author       = {Babins Shrestha and
                  Nitesh Saxena and
                  Hien Thi Thu Truong and
                  N. Asokan},
  title        = {Contextual Proximity Detection in the Face of Context-Manipulating
                  Adversaries},
  journal      = {CoRR},
  volume       = {abs/1511.00905},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.00905},
  eprinttype    = {arXiv},
  eprint       = {1511.00905},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShresthaSTA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKSS15,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Maliheh Shirvanian and
                  Nitesh Saxena},
  title        = {Device-Enhanced Password Protocols with Optimal Online-Offline Protection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1099},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PeddintiS14,
  author       = {Sai Teja Peddinti and
                  Nitesh Saxena},
  title        = {Web search query privacy: Evaluating query obfuscation and anonymizing
                  networks},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {155--199},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130491},
  doi          = {10.3233/JCS-130491},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PeddintiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaS14,
  author       = {Di Ma and
                  Nitesh Saxena},
  title        = {A context-aware approach to defend against unauthorized reading and
                  relay attacks in {RFID} systems},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2684--2695},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.404},
  doi          = {10.1002/SEC.404},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohamedSGGSZKOC14,
  author       = {Manar Mohamed and
                  Niharika Sachdeva and
                  Michael Georgescu and
                  Song Gao and
                  Nitesh Saxena and
                  Chengcui Zhang and
                  Ponnurangam Kumaraguru and
                  Paul C. van Oorschot and
                  Wei{-}bang Chen},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {A three-way investigation of a game-CAPTCHA: automated attacks, relay
                  attacks and usability},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590298},
  doi          = {10.1145/2590296.2590298},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MohamedSGGSZKOC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShirvanianS14,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks
                  on Crypto Phones},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {868--879},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660274},
  doi          = {10.1145/2660267.2660274},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShirvanianS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ShresthaSTA14,
  author       = {Babins Shrestha and
                  Nitesh Saxena and
                  Hien Thi Thu Truong and
                  N. Asokan},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Drone to the Rescue: Relay-Resilient Authentication using Ambient
                  Multi-sensing},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {349--364},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_23},
  doi          = {10.1007/978-3-662-45472-5\_23},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ShresthaSTA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/GaoMSZ14,
  author       = {Song Gao and
                  Manar Mohamed and
                  Nitesh Saxena and
                  Chengcui Zhang},
  title        = {Gaming the game: Defeating a game captcha with efficient and robust
                  hybrid attacks},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2014,
                  Chengdu, China, July 14-18, 2014},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICME.2014.6890287},
  doi          = {10.1109/ICME.2014.6890287},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/GaoMSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NeupaneSKGK14,
  author       = {Ajaya Neupane and
                  Nitesh Saxena and
                  Keya Kuruvilla and
                  Michael Georgescu and
                  Rajesh K. Kana},
  title        = {Neural Signatures of User-Centered Security: An fMRI Study of Phishing,
                  and Malware Warnings},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/neural-signatures-user-centered-security-fmri-study-phishing-and-malware-warnings},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NeupaneSKGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShirvanianJSN14,
  author       = {Maliheh Shirvanian and
                  Stanislaw Jarecki and
                  Nitesh Saxena and
                  Naveen Nathan},
  title        = {Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth
                  Devices},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/two-factor-authentication-resilient-server-compromise-using-mix-bandwidth-devices},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ShirvanianJSN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/TruongGSSAN14,
  author       = {Hien Thi Thu Truong and
                  Xiang Gao and
                  Babins Shrestha and
                  Nitesh Saxena and
                  N. Asokan and
                  Petteri Nurmi},
  title        = {Comparing and fusing different sensor modalities for relay attack
                  resistance in Zero-Interaction Authentication},
  booktitle    = {{IEEE} International Conference on Pervasive Computing and Communications,
                  PerCom 2014, Budapest, Hungary, March 24-28, 2014},
  pages        = {163--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PerCom.2014.6813957},
  doi          = {10.1109/PERCOM.2014.6813957},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/TruongGSSAN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2014,
  editor       = {Nitesh Saxena and
                  Ahmad{-}Reza Sadeghi},
  title        = {Radio Frequency Identification: Security and Privacy Issues - 10th
                  International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8651},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13066-8},
  doi          = {10.1007/978-3-319-13066-8},
  isbn         = {978-3-319-13065-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaSXZ13,
  author       = {Di Ma and
                  Nitesh Saxena and
                  Tuo Xiang and
                  Yan Zhu},
  title        = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy
                  via Location Sensing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {57--69},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.89},
  doi          = {10.1109/TDSC.2012.89},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/HaleviLMSVX13,
  author       = {Tzipora Halevi and
                  Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Jonathan Voris and
                  Tuo Xiang},
  title        = {Context-Aware Defenses to {RFID} Unauthorized Reading and Relay Attacks},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {1},
  number       = {2},
  pages        = {307--318},
  year         = {2013},
  url          = {https://doi.org/10.1109/TETC.2013.2290537},
  doi          = {10.1109/TETC.2013.2290537},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/HaleviLMSVX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaleviS13,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  title        = {Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {3},
  pages        = {563--577},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2247758},
  doi          = {10.1109/TIFS.2013.2247758},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HaleviS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apchi/SachdevaSK13,
  author       = {Niharika Sachdeva and
                  Nitesh Saxena and
                  Ponnurangam Kumaraguru},
  editor       = {Sanjay Tripathi and
                  Anirudha N. Joshi},
  title        = {On the viability of CAPTCHAs for use in telephony systems: a usability
                  field study},
  booktitle    = {11th Asia Pacific Conference on Computer Human Interaction, {APCHI}
                  '13, Bangalore, India - September 24 - 27, 2013},
  pages        = {178--182},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2525194.2525265},
  doi          = {10.1145/2525194.2525265},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apchi/SachdevaSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ShresthaSH13,
  author       = {Babins Shrestha and
                  Nitesh Saxena and
                  Justin Harrison},
  editor       = {Michel Abdalla and
                  Cristina Nita{-}Rotaru and
                  Ricardo Dahab},
  title        = {Wave-to-Access: Protecting Sensitive Mobile Device Services via a
                  Hand Waving Gesture},
  booktitle    = {Cryptology and Network Security - 12th International Conference, {CANS}
                  2013, Paraty, Brazil, November 20-22. 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8257},
  pages        = {199--217},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02937-5\_11},
  doi          = {10.1007/978-3-319-02937-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ShresthaSH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HasanSHZR13,
  author       = {Ragib Hasan and
                  Nitesh Saxena and
                  Tzipora Halevi and
                  Shams Zawoad and
                  Dustin Rinehart},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Sensing-enabled channels for hard-to-detect command and control of
                  mobile devices},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {469--480},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484373},
  doi          = {10.1145/2484313.2484373},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HasanSHZR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GallegoSV13,
  author       = {Alexander Gallego and
                  Nitesh Saxena and
                  Jonathan Voris},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Exploring Extrinsic Motivation for Better Security: {A} Usability
                  Study of Scoring-Enhanced Device Pairing},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_6},
  doi          = {10.1007/978-3-642-39884-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GallegoSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SachdevaSK13,
  author       = {Niharika Sachdeva and
                  Nitesh Saxena and
                  Ponnurangam Kumaraguru},
  editor       = {Yvo Desmedt},
  title        = {On the Viability of CAPTCHAs for use in Telephony Systems: {A} Usability
                  Field Study},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {261--279},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_19},
  doi          = {10.1007/978-3-319-27659-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/SachdevaSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiMSSZ13,
  author       = {Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Babins Shrestha and
                  Yan Zhu},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Tap-Wave-Rub: lightweight malware prevention for smartphones using
                  intuitive human gestures},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462101},
  doi          = {10.1145/2462096.2462101},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiMSSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-4010,
  author       = {Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Babins Shrestha and
                  Yan Zhu},
  title        = {Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using
                  Intuitive Human Gestures},
  journal      = {CoRR},
  volume       = {abs/1302.4010},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.4010},
  eprinttype    = {arXiv},
  eprint       = {1302.4010},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-4010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MohamedSGGSZKOC13,
  author       = {Manar Mohamed and
                  Niharika Sachdeva and
                  Michael Georgescu and
                  Song Gao and
                  Nitesh Saxena and
                  Chengcui Zhang and
                  Ponnurangam Kumaraguru and
                  Paul C. van Oorschot and
                  Wei{-}bang Chen},
  title        = {Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks,
                  and Usability},
  journal      = {CoRR},
  volume       = {abs/1310.1540},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.1540},
  eprinttype    = {arXiv},
  eprint       = {1310.1540},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MohamedSGGSZKOC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/PerkovicCMSB12,
  author       = {Toni Perkovic and
                  Mario Cagalj and
                  Toni Mastelic and
                  Nitesh Saxena and
                  Dinko Begusic},
  title        = {Secure Initialization of Multiple Constrained Wireless Devices for
                  an Unaided User},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {337--351},
  year         = {2012},
  url          = {https://doi.org/10.1109/TMC.2011.35},
  doi          = {10.1109/TMC.2011.35},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/PerkovicCMSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaleviS12,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {A closer look at keyboard acoustic emanations: random passwords, typing
                  styles and decoding techniques},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {89--90},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414509},
  doi          = {10.1145/2414456.2414509},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaleviS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HaleviMSX12,
  author       = {Tzipora Halevi and
                  Di Ma and
                  Nitesh Saxena and
                  Tuo Xiang},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Secure Proximity Detection for {NFC} Devices Based on Ambient Sensor
                  Data},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {379--396},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_22},
  doi          = {10.1007/978-3-642-33167-1\_22},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HaleviMSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SaxenaV12,
  author       = {Nitesh Saxena and
                  Jonathan Voris},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Exploring Mobile Proxies for Better Password Authentication},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {293--302},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_26},
  doi          = {10.1007/978-3-642-34129-8\_26},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SaxenaV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DeyTRS12,
  author       = {Ratan Dey and
                  Cong Tang and
                  Keith W. Ross and
                  Nitesh Saxena},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Estimating age privacy leakage in online social networks},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2836--2840},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195711},
  doi          = {10.1109/INFCOM.2012.6195711},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/DeyTRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/HaleviLMPSVX12,
  author       = {Tzipora Halevi and
                  Sein Lin and
                  Di Ma and
                  Anudath K. Prasad and
                  Nitesh Saxena and
                  Jonathan Voris and
                  Tuo Xiang},
  editor       = {Silvia Giordano and
                  Marc Langheinrich and
                  Albrecht Schmidt},
  title        = {Sensing-enabled defenses to {RFID} unauthorized reading and relay
                  attacks without changing the usage model},
  booktitle    = {2012 {IEEE} International Conference on Pervasive Computing and Communications,
                  Lugano, Switzerland, March 19-23, 2012},
  pages        = {227--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerCom.2012.6199835},
  doi          = {10.1109/PERCOM.2012.6199835},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/HaleviLMPSVX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MaPSX12,
  author       = {Di Ma and
                  Anudath K. Prasad and
                  Nitesh Saxena and
                  Tuo Xiang},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Location-aware and safer cards: enhancing {RFID} security and privacy
                  via location sensing},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185457},
  doi          = {10.1145/2185448.2185457},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MaPSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SaxenaV11,
  author       = {Nitesh Saxena and
                  Jonathan Voris},
  title        = {Data remanence effects on memory-based entropy collection for {RFID}
                  systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {4},
  pages        = {213--222},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0139-0},
  doi          = {10.1007/S10207-011-0139-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SaxenaV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HaleviSH11,
  author       = {Tzipora Halevi and
                  Nitesh Saxena and
                  Shai Halevi},
  title        = {Tree-based {HB} protocols for privacy-preserving authentication of
                  {RFID} tags},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {343--363},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2010-0404},
  doi          = {10.3233/JCS-2010-0404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HaleviSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaxenaEKA11,
  author       = {Nitesh Saxena and
                  Jan{-}Erik Ekberg and
                  Kari Kostiainen and
                  N. Asokan},
  title        = {Secure Device Pairing Based on a Visual Channel: Design and Usability
                  Study},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {1},
  pages        = {28--38},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2010.2096217},
  doi          = {10.1109/TIFS.2010.2096217},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SaxenaEKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BagherzandiJSL11,
  author       = {Ali Bagherzandi and
                  Stanislaw Jarecki and
                  Nitesh Saxena and
                  Yanbin Lu},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Password-protected secret sharing},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {433--444},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046758},
  doi          = {10.1145/2046707.2046758},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BagherzandiJSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PeddintiS11,
  author       = {Sai Teja Peddinti and
                  Nitesh Saxena},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {On the effectiveness of anonymizing networks for web search privacy},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {483--489},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966984},
  doi          = {10.1145/1966913.1966984},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PeddintiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgames/GallegoSV11,
  author       = {Alexander Gallego and
                  Nitesh Saxena and
                  Jonathan Voris},
  editor       = {Quasim H. Mehdi and
                  Adel Said Elmaghraby and
                  Robert Moreton and
                  Roman V. Yampolskiy and
                  Julia Chariker},
  title        = {Playful security: {A} computer game for secure wireless device pairing},
  booktitle    = {16th International Conference on Computer Games, {CGAMES} 2011, Louisville,
                  KY, USA, 27-30 July, 2011},
  pages        = {177--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CGAMES.2011.6000336},
  doi          = {10.1109/CGAMES.2011.6000336},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cgames/GallegoSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/UzunSK11,
  author       = {Ersin Uzun and
                  Nitesh Saxena and
                  Arun Kumar},
  editor       = {Desney S. Tan and
                  Saleema Amershi and
                  Bo Begole and
                  Wendy A. Kellogg and
                  Manas Tungare},
  title        = {Pairing devices for social interactions: a comparative usability evaluation},
  booktitle    = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  pages        = {2315--2324},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978942.1979282},
  doi          = {10.1145/1978942.1979282},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/UzunSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasfaa/TangRSC11,
  author       = {Cong Tang and
                  Keith W. Ross and
                  Nitesh Saxena and
                  Ruichuan Chen},
  editor       = {Jianliang Xu and
                  Ge Yu and
                  Shuigeng Zhou and
                  Rainer Unland},
  title        = {What's in a Name: {A} Study of Names, Gender Inference, and Gender
                  Behavior in Facebook},
  booktitle    = {Database Systems for Adanced Applications - 16th International Conference,
                  {DASFAA} 2011, International Workshops: GDB, SIM3, FlashDB, SNSMW,
                  DaMEN, DQIS, Hong Kong, China, April 22-25, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6637},
  pages        = {344--356},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20244-5\_33},
  doi          = {10.1007/978-3-642-20244-5\_33},
  timestamp    = {Sun, 05 Jan 2020 16:37:46 +0100},
  biburl       = {https://dblp.org/rec/conf/dasfaa/TangRSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/PeddintiS11,
  author       = {Sai Teja Peddinti and
                  Nitesh Saxena},
  editor       = {James A. Landay and
                  Yuanchun Shi and
                  Donald J. Patterson and
                  Yvonne Rogers and
                  Xing Xie},
  title        = {On the limitations of query obfuscation techniques for location privacy},
  booktitle    = {UbiComp 2011: Ubiquitous Computing, 13th International Conference,
                  UbiComp 2011, Beijing, China, September 17-21, 2011, Proceedings},
  pages        = {187--196},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2030112.2030139},
  doi          = {10.1145/2030112.2030139},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/PeddintiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/SaxenaUVA11,
  author       = {Nitesh Saxena and
                  Md. Borhan Uddin and
                  Jonathan Voris and
                  N. Asokan},
  title        = {Vibrate-to-unlock: Mobile phone assisted user authentication to multiple
                  personal {RFID} tags},
  booktitle    = {Ninth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2011, 21-25 March 2011, Seattle, WA, USA,
                  Proceedings},
  pages        = {181--188},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PERCOM.2011.5767583},
  doi          = {10.1109/PERCOM.2011.5767583},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/SaxenaUVA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/VorisSH11,
  author       = {Jonathan Voris and
                  Nitesh Saxena and
                  Tzipora Halevi},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Accelerometers and randomness: perfect together},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {115--126},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998433},
  doi          = {10.1145/1998412.1998433},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/VorisSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/PeddintiDS11,
  author       = {Sai Teja Peddinti and
                  Avis Dsouza and
                  Nitesh Saxena},
  editor       = {Yan Chen and
                  Jaideep Vaidya},
  title        = {Cover locations: availing location-based services without revealing
                  the location},
  booktitle    = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
                  society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  pages        = {143--152},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046556.2046576},
  doi          = {10.1145/2046556.2046576},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/PeddintiDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JareckiS10,
  author       = {Stanislaw Jarecki and
                  Nitesh Saxena},
  title        = {On the Insecurity of Proactive {RSA} in the {URSA} Mobile Ad Hoc Network
                  Access Control Protocol},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {4},
  pages        = {739--749},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2058104},
  doi          = {10.1109/TIFS.2010.2058104},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JareckiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaleviS10,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {On pairing constrained wireless devices based on secrecy of auxiliary
                  channels: the case of acoustic eavesdropping},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866319},
  doi          = {10.1145/1866307.1866319},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaleviS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/PerkovicCS10,
  author       = {Toni Perkovic and
                  Mario Cagalj and
                  Nitesh Saxena},
  editor       = {Radu Sion},
  title        = {Shoulder-Surfing Safe Login in a Partially Observable Attacker Model},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {351--358},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_29},
  doi          = {10.1007/978-3-642-14577-3\_29},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/PerkovicCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/NithyanandSTU10,
  author       = {Rishab Nithyanand and
                  Nitesh Saxena and
                  Gene Tsudik and
                  Ersin Uzun},
  editor       = {Jakob E. Bardram and
                  Marc Langheinrich and
                  Khai N. Truong and
                  Paddy Nixon},
  title        = {Groupthink: usability of secure group association for wireless devices},
  booktitle    = {UbiComp 2010: Ubiquitous Computing, 12th International Conference,
                  UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {331--340},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1864349.1864399},
  doi          = {10.1145/1864349.1864399},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/NithyanandSTU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KaroleSC10,
  author       = {Ambarish Karole and
                  Nitesh Saxena and
                  Nicolas Christin},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {A Comparative Usability Evaluation of Traditional Password Managers},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {233--251},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_16},
  doi          = {10.1007/978-3-642-24209-0\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KaroleSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/WuTDSR10,
  author       = {Di Wu and
                  Cong Tang and
                  Prithula Dhungel and
                  Nitesh Saxena and
                  Keith W. Ross},
  title        = {On the Privacy of Peer-Assisted Distribution of Security Patches},
  booktitle    = {{IEEE} Tenth International Conference on Peer-to-Peer Computing, {P2P}
                  2010, Delft, The Netherlands, 25-27 August 2010},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/P2P.2010.5569988},
  doi          = {10.1109/P2P.2010.5569988},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/WuTDSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/PeddintiS10,
  author       = {Sai Teja Peddinti and
                  Nitesh Saxena},
  editor       = {Mikhail J. Atallah and
                  Nicholas J. Hopper},
  title        = {On the Privacy of Web Search Based on Query Obfuscation: {A} Case
                  Study of TrackMeNot},
  booktitle    = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
                  2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6205},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14527-8\_2},
  doi          = {10.1007/978-3-642-14527-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/PeddintiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/SaxenaV10,
  author       = {Nitesh Saxena and
                  Jonathan Voris},
  editor       = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title        = {Still and Silent: Motion Detection for Enhanced {RFID} Security and
                  Privacy without Changing the Usage Model},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th
                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6370},
  pages        = {2--21},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16822-2\_2},
  doi          = {10.1007/978-3-642-16822-2\_2},
  timestamp    = {Fri, 03 Sep 2021 17:40:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/SaxenaV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/JareckiS10,
  author       = {Stanislaw Jarecki and
                  Nitesh Saxena},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Authenticated Key Agreement with Key Re-use in the Short Authenticated
                  Strings Model},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {253--270},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_17},
  doi          = {10.1007/978-3-642-15317-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/JareckiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1005-0657,
  author       = {Alexander Gallego and
                  Nitesh Saxena and
                  Jonathan Voris},
  title        = {Security Through Entertainment: Experiences Using a Memory Game for
                  Secure Device Pairing},
  journal      = {CoRR},
  volume       = {abs/1005.0657},
  year         = {2010},
  url          = {http://arxiv.org/abs/1005.0657},
  eprinttype    = {arXiv},
  eprint       = {1005.0657},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1005-0657.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiBSL10,
  author       = {Stanislaw Jarecki and
                  Ali Bagherzandi and
                  Nitesh Saxena and
                  Yanbin Lu},
  title        = {Password-Protected Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiBSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviS10,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  title        = {Eavesdropping over Random Passwords via Keyboard Acoustic Emanations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/KumarSTU09,
  author       = {Arun Kumar and
                  Nitesh Saxena and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {A comparative study of secure device pairing methods},
  journal      = {Pervasive Mob. Comput.},
  volume       = {5},
  number       = {6},
  pages        = {734--749},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.pmcj.2009.07.008},
  doi          = {10.1016/J.PMCJ.2009.07.008},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/KumarSTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaxenaY09,
  author       = {Nitesh Saxena and
                  Jeong Hyun Yi},
  title        = {Noninteractive self-certification for long-lived mobile ad hoc networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {946--955},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2031946},
  doi          = {10.1109/TIFS.2009.2031946},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SaxenaY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/SaxenaTY09,
  author       = {Nitesh Saxena and
                  Gene Tsudik and
                  Jeong Hyun Yi},
  title        = {Efficient Node Admission and Certificateless Secure Communication
                  in Short-Lived MANETs},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {20},
  number       = {2},
  pages        = {158--170},
  year         = {2009},
  url          = {https://doi.org/10.1109/TPDS.2008.77},
  doi          = {10.1109/TPDS.2008.77},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/SaxenaTY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SaxenaU09,
  author       = {Nitesh Saxena and
                  Md. Borhan Uddin},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Secure Pairing of "Interface-Constrained" Devices Resistant
                  against Rushing User Behavior},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {34--52},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_3},
  doi          = {10.1007/978-3-642-01957-9\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SaxenaU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SaxenaU09,
  author       = {Nitesh Saxena and
                  Md. Borhan Uddin},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Blink 'Em All: Scalable, User-Friendly and Secure Initialization of
                  Wireless Sensor Nodes},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {154--173},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_11},
  doi          = {10.1007/978-3-642-10433-6\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SaxenaU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CagaljSU09,
  author       = {Mario Cagalj and
                  Nitesh Saxena and
                  Ersin Uzun},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {On the Usability of Secure Association of Wireless Devices Based on
                  Distance Bounding},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {443--462},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_30},
  doi          = {10.1007/978-3-642-10433-6\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/CagaljSU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/KaroleS09,
  author       = {Ambarish Karole and
                  Nitesh Saxena},
  editor       = {Arjan Durresi and
                  Leonard Barolli and
                  Tomoya Enokido and
                  Minoru Uehara and
                  Elhadi M. Shakshuki and
                  Makoto Takizawa},
  title        = {Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited
                  Numeric Comparison},
  booktitle    = {NBiS 2009, 12th International Conference on Network-Based Information
                  Systems, Indianapolis, Indiana, USA, 19-21 August 2009},
  pages        = {273--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NBiS.2009.57},
  doi          = {10.1109/NBIS.2009.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/KaroleS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KumarSTU09,
  author       = {Arun Kumar and
                  Nitesh Saxena and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Caveat Emptor: {A} Comparative Study of Secure Device Pairing Methods},
  booktitle    = {Seventh Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/PERCOM.2009.4912753},
  doi          = {10.1109/PERCOM.2009.4912753},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/KumarSTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/SaxenaUV09,
  author       = {Nitesh Saxena and
                  Md. Borhan Uddin and
                  Jonathan Voris},
  editor       = {Lorrie Faith Cranor},
  title        = {Treat 'em like other devices: user authentication of multiple personal
                  {RFID} tags},
  booktitle    = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572532.1572573},
  doi          = {10.1145/1572532.1572573},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/SaxenaUV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-1227,
  author       = {Tzipora Halevi and
                  Nitesh Saxena and
                  Shai Halevi},
  title        = {Using {HB} Family of Protocols for Privacy-Preserving Authentication
                  of {RFID} Tags in a Population},
  journal      = {CoRR},
  volume       = {abs/0907.1227},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.1227},
  eprinttype    = {arXiv},
  eprint       = {0907.1227},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-1227.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-1256,
  author       = {Nitesh Saxena and
                  Jonathan Voris},
  title        = {We Can Remember It for You Wholesale: Implications of Data Remanence
                  on the Use of {RAM} for True Random Number Generation on {RFID} Tags
                  (RFIDSec 2009)},
  journal      = {CoRR},
  volume       = {abs/0907.1256},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.1256},
  eprinttype    = {arXiv},
  eprint       = {0907.1256},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-1256.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-4743,
  author       = {Arun Kumar and
                  Nitesh Saxena and
                  Ersin Uzun},
  title        = {Alice Meets Bob: {A} Comparative Usability Study of Wireless Device
                  Pairing Methods for a "Two-User" Setting},
  journal      = {CoRR},
  volume       = {abs/0907.4743},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.4743},
  eprinttype    = {arXiv},
  eprint       = {0907.4743},
  timestamp    = {Thu, 01 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-4743.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PrasadS08,
  author       = {Ramnath Prasad and
                  Nitesh Saxena},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Device Pairing Using "Human-Comparable" Synchronized
                  Audiovisual Patterns},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {328--345},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_20},
  doi          = {10.1007/978-3-540-68914-0\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PrasadS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/SaxenaV08,
  author       = {Nitesh Saxena and
                  Jonathan Voris},
  title        = {Pairing Devices with Good Quality Output Interfaces},
  booktitle    = {28th {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2008 Workshops), 17-20 June 2008, Beijing, China},
  pages        = {382--387},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDCS.Workshops.2008.87},
  doi          = {10.1109/ICDCS.WORKSHOPS.2008.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/SaxenaV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SaxenaU08,
  author       = {Nitesh Saxena and
                  Md. Borhan Uddin},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Automated Device Pairing for Asymmetric Pairing Scenarios},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {311--327},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_21},
  doi          = {10.1007/978-3-540-88625-9\_21},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SaxenaU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/SaxenaUV08,
  author       = {Nitesh Saxena and
                  Md. Borhan Uddin and
                  Jonathan Voris},
  editor       = {Lorrie Faith Cranor},
  title        = {Universal device pairing using an auxiliary device},
  booktitle    = {Proceedings of the 4th Symposium on Usable Privacy and Security, {SOUPS}
                  2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {56--67},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1408664.1408672},
  doi          = {10.1145/1408664.1408672},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/SaxenaUV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0812-4983,
  author       = {Nitesh Saxena and
                  Md. Borhan Uddin},
  title        = {Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly
                  Initialization of Sensor Nodes},
  journal      = {CoRR},
  volume       = {abs/0812.4983},
  year         = {2008},
  url          = {http://arxiv.org/abs/0812.4983},
  eprinttype    = {arXiv},
  eprint       = {0812.4983},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0812-4983.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CastellucciaSY07,
  author       = {Claude Castelluccia and
                  Nitesh Saxena and
                  Jeong Hyun Yi},
  title        = {Robust self-keying mobile ad hoc networks},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {4},
  pages        = {1169--1182},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2006.07.009},
  doi          = {10.1016/J.COMNET.2006.07.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/CastellucciaSY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SaxenaTY07,
  author       = {Nitesh Saxena and
                  Gene Tsudik and
                  Jeong Hyun Yi},
  title        = {Threshold cryptography in {P2P} and MANETs: The case of access control},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {12},
  pages        = {3632--3649},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2007.03.001},
  doi          = {10.1016/J.COMNET.2007.03.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SaxenaTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Saxena06,
  author       = {Nitesh Saxena},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Public Key Cryptography Sans Certificates in Ad Hoc Networks},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {375--389},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_26},
  doi          = {10.1007/11767480\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Saxena06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SaxenaEKA06,
  author       = {Nitesh Saxena and
                  Jan{-}Erik Ekberg and
                  Kari Kostiainen and
                  N. Asokan},
  title        = {Secure Device Pairing based on a Visual Channel (Short Paper)},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {306--313},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.35},
  doi          = {10.1109/SP.2006.35},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SaxenaEKA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaxenaEKA06,
  author       = {Nitesh Saxena and
                  Jan{-}Erik Ekberg and
                  Kari Kostiainen and
                  N. Asokan},
  title        = {Secure Device Pairing based on a Visual Channel},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaxenaEKA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/SaxenaTY05,
  author       = {Nitesh Saxena and
                  Gene Tsudik and
                  Jeong Hyun Yi},
  title        = {Efficient Node Admission for Short-lived Mobile Ad Hoc Networks},
  booktitle    = {13th {IEEE} International Conference on Network Protocols {(ICNP}
                  2005), 6-9 November 2005, Boston, MA, {USA}},
  pages        = {269--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICNP.2005.14},
  doi          = {10.1109/ICNP.2005.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/SaxenaTY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/CastellucciaSY05,
  author       = {Claude Castelluccia and
                  Nitesh Saxena and
                  Jeong Hyun Yi},
  editor       = {Raouf Boutaba and
                  Kevin C. Almeroth and
                  Ram{\'{o}}n Puigjaner and
                  Sherman X. Shen and
                  James P. Black},
  title        = {Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks},
  booktitle    = {{NETWORKING} 2005: Networking Technologies, Services, and Protocols;
                  Performance of Computer and Communication Networks; Mobile and Wireless
                  Communication Systems, 4th International {IFIP-TC6} Networking Conference,
                  Waterloo, Canada, May 2-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3462},
  pages        = {1083--1095},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11422778\_87},
  doi          = {10.1007/11422778\_87},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/CastellucciaSY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JareckiS05,
  author       = {Stanislaw Jarecki and
                  Nitesh Saxena},
  editor       = {Joe Kilian},
  title        = {Further Simplifications in Proactive {RSA} Signatures},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {510--528},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_28},
  doi          = {10.1007/978-3-540-30576-7\_28},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JareckiS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotp2p/SaxenaTY04,
  author       = {Nitesh Saxena and
                  Gene Tsudik and
                  Jeong Hyun Yi},
  title        = {Access control in ad hoc groups},
  booktitle    = {International Workshop on Hot Topics in Peer-to-Peer Systems, {HOT-P2P}
                  2004, Volendam, The Netherlands, October 8, 2004},
  pages        = {2--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/PTPSYS.2004.2},
  doi          = {10.1109/PTPSYS.2004.2},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotp2p/SaxenaTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SaxenaTY04,
  author       = {Nitesh Saxena and
                  Gene Tsudik and
                  Jeong Hyun Yi},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Identity-Based Access Control for Ad Hoc Groups},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {362--379},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_27},
  doi          = {10.1007/11496618\_27},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SaxenaTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/JareckiSY04,
  author       = {Stanislaw Jarecki and
                  Nitesh Saxena and
                  Jeong Hyun Yi},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {An attack on the proactive {RSA} signature scheme in the {URSA} ad
                  hoc network access control protocol},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2004, Washington, DC, USA, October 25, 2004},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029102.1029105},
  doi          = {10.1145/1029102.1029105},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/JareckiSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/SaxenaTY03,
  author       = {Nitesh Saxena and
                  Gene Tsudik and
                  Jeong Hyun Yi},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {Admission control in Peer-to-Peer: design and performance evaluation},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003},
  pages        = {104--113},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986858.986873},
  doi          = {10.1145/986858.986873},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/SaxenaTY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}