default search action
BibTeX records: Nitesh Saxena
@article{DBLP:journals/popets/LiuIS24, author = {Zengrui Liu and Umar Iqbal and Nitesh Saxena}, title = {Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {280--299}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0016}, doi = {10.56553/POPETS-2024-0016}, timestamp = {Wed, 13 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/LiuIS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShresthaMS24, author = {Prakash Shrestha and Ahmed Tanvir Mahdad and Nitesh Saxena}, title = {Sound-based Two-factor Authentication: Vulnerabilities and Redesign}, journal = {{ACM} Trans. Priv. Secur.}, volume = {27}, number = {1}, pages = {5:1--5:27}, year = {2024}, url = {https://doi.org/10.1145/3632175}, doi = {10.1145/3632175}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShresthaMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AlatawiS24, author = {Mashari Alatawi and Nitesh Saxena}, editor = {Jo{\~{a}}o P. Vilela and Haya Schulmann and Ninghui Li}, title = {Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: {A} Case Study of Signal}, booktitle = {Proceedings of the Fourteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2024, Porto, Portugal, June 19-21, 2024}, pages = {277--288}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626232.3653251}, doi = {10.1145/3626232.3653251}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AlatawiS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiuS24, author = {Zengrui Liu and Nitesh Saxena}, title = {Dual Study of Canvas Fingerprinting Based Authentication: {A} Novel Spoofing Attack and the Countermeasure}, booktitle = {44th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2024, Jersey City, NJ, USA, July 23-26, 2024}, pages = {1354--1364}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICDCS60910.2024.00127}, doi = {10.1109/ICDCS60910.2024.00127}, timestamp = {Wed, 11 Sep 2024 11:31:56 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/LiuS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-05876, author = {Shalini Saini and Nitesh Saxena}, title = {Privacy and Security of Women's Reproductive Health Apps in a Changing Legal Landscape}, journal = {CoRR}, volume = {abs/2404.05876}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.05876}, doi = {10.48550/ARXIV.2404.05876}, eprinttype = {arXiv}, eprint = {2404.05876}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-05876.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-19683, author = {Jimmy Dani and Kalyan Nakka and Nitesh Saxena}, title = {Breaking Indistinguishability with Transfer Learning: {A} First Look at {SPECK32/64} Lightweight Block Ciphers}, journal = {CoRR}, volume = {abs/2405.19683}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.19683}, doi = {10.48550/ARXIV.2405.19683}, eprinttype = {arXiv}, eprint = {2405.19683}, timestamp = {Fri, 21 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-19683.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-05364, author = {Kalyan Nakka and Jimmy Dani and Nitesh Saxena}, title = {Is On-Device {AI} Broken and Exploitable? Assessing the Trust and Ethics in Small Language Models}, journal = {CoRR}, volume = {abs/2406.05364}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.05364}, doi = {10.48550/ARXIV.2406.05364}, eprinttype = {arXiv}, eprint = {2406.05364}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-05364.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-16964, author = {Jimmy Dani and Brandon McCulloh and Nitesh Saxena}, title = {When {AI} Defeats Password Deception! {A} Deep Learning Framework to Distinguish Passwords and Honeywords}, journal = {CoRR}, volume = {abs/2407.16964}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.16964}, doi = {10.48550/ARXIV.2407.16964}, eprinttype = {arXiv}, eprint = {2407.16964}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-16964.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaniNS24, author = {Jimmy Dani and Kalyan Nakka and Nitesh Saxena}, title = {Breaking Indistinguishability with Transfer Learning: {A} First Look at {SPECK32/64} Lightweight Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2024}, url = {https://eprint.iacr.org/2024/852}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaniNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SainiS23, author = {Shalini Saini and Nitesh Saxena}, title = {A Survey of Threats to Research Literature-dependent Medical {AI} Solutions}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {14s}, pages = {315:1--315:26}, year = {2023}, url = {https://doi.org/10.1145/3592597}, doi = {10.1145/3592597}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/SainiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/ShresthaTTSTN23, author = {Prakash Shrestha and Hien Thi Thu Truong and Pupu Toivonen and Nitesh Saxena and Sasu Tarkoma and Petteri Nurmi}, title = {Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures}, journal = {Pervasive Mob. Comput.}, volume = {88}, pages = {101720}, year = {2023}, url = {https://doi.org/10.1016/j.pmcj.2022.101720}, doi = {10.1016/J.PMCJ.2022.101720}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/ShresthaTTSTN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYMA00S023, author = {Tianfang Zhang and Zhengkun Ye and Ahmed Tanvir Mahdad and Md Mojibur Rahman Redoy Akanda and Cong Shi and Yan Wang and Nitesh Saxena and Yingying Chen}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via {AR/VR} Motion Sensors}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {446--459}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623102}, doi = {10.1145/3576915.3623102}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYMA00S023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SainiS23, author = {Shalini Saini and Nitesh Saxena}, title = {Speaker Anonymity and Voice Conversion Vulnerability: {A} Speaker Recognition Analysis}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289030}, doi = {10.1109/CNS59707.2023.10289030}, timestamp = {Mon, 13 Nov 2023 09:18:17 +0100}, biburl = {https://dblp.org/rec/conf/cns/SainiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/GuptaSSRGD23, author = {Neetu Gupta and Arjun Singh and Nitesh Saxena and G. Ravivarman and P. Gajendran and Pallavi Deshpande}, title = {Increasing Automotive Electrical Equipment Effectiveness with Enhanced Iron Loss Estimation Techniques}, booktitle = {6th International Conference on Contemporary Computing and Informatics, {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023}, pages = {2089--2092}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IC3I59117.2023.10398109}, doi = {10.1109/IC3I59117.2023.10398109}, timestamp = {Tue, 13 Feb 2024 08:24:21 +0100}, biburl = {https://dblp.org/rec/conf/ic3i/GuptaSSRGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/MahdadSYZWCS23, author = {Ahmed Tanvir Mahdad and Cong Shi and Zhengkun Ye and Tianming Zhao and Yan Wang and Yingying Chen and Nitesh Saxena}, title = {EmoLeak: Smartphone Motions Reveal Emotions}, booktitle = {43rd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2023, Hong Kong, July 18-21, 2023}, pages = {316--326}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDCS57875.2023.00052}, doi = {10.1109/ICDCS57875.2023.00052}, timestamp = {Tue, 24 Oct 2023 14:47:33 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/MahdadSYZWCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/ZhaoZSWR23, author = {Fei Zhao and Chengcui Zhang and Nitesh Saxena and Dan S. Wallach and AKM Shahariar Azad Rabby}, title = {Ballot Tabulation Using Deep Learning}, booktitle = {24th {IEEE} International Conference on Information Reuse and Integration for Data Science, {IRI} 2023, Bellevue, WA, USA, August 4-6, 2023}, pages = {107--114}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IRI58017.2023.00026}, doi = {10.1109/IRI58017.2023.00026}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/ZhaoZSWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/MahdadJS23, author = {Ahmed Tanvir Mahdad and Mohammed Jubur and Nitesh Saxena}, editor = {Xavier Costa{-}P{\'{e}}rez and Joerg Widmer and Diego Perino and Domenico Giustiniano and Haitham Al{-}Hassanieh and Arash Asadi and Landon P. Cox}, title = {Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices}, booktitle = {Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, {ACM} MobiCom 2023, Madrid, Spain, October 2-6, 2023}, pages = {59:1--59:15}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3570361.3613273}, doi = {10.1145/3570361.3613273}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/MahdadJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/ZhangYMA0SW023, author = {Tianfang Zhang and Zhengkun Ye and Ahmed Tanvir Mahdad and Md Mojibur Rahman Redoy Akanda and Cong Shi and Nitesh Saxena and Yan Wang and Yingying Chen}, editor = {Jie Wu and Suresh Subramaniam and Bo Ji and Carla{-}Fabiana Chiasserini}, title = {Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via {AR/VR} Motion Sensors}, booktitle = {Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, MobiHoc 2023, Washington, DC, USA, October 23-26, 2023}, pages = {308--309}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3565287.3623624}, doi = {10.1145/3565287.3623624}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/ZhangYMA0SW023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/Zhang0WYWS023, author = {Tianfang Zhang and Cong Shi and Payton Walker and Zhengkun Ye and Yan Wang and Nitesh Saxena and Yingying Chen}, editor = {Petteri Nurmi and Pan Hui and Ardalan Amiri Sani and Yunxin Liu}, title = {Passive Vital Sign Monitoring via Facial Vibrations Leveraging {AR/VR} Headsets}, booktitle = {Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services, MobiSys 2023, Helsinki, Finland, June 18-22, 2023}, pages = {96--109}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581791.3596848}, doi = {10.1145/3581791.3596848}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/Zhang0WYWS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WuSZWLSC23, author = {Yi Wu and Cong Shi and Tianfang Zhang and Payton Walker and Jian Liu and Nitesh Saxena and Yingying Chen}, title = {Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: {A} Study of Snooping Typed Input on Virtual Keyboards}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {3382--3398}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179301}, doi = {10.1109/SP46215.2023.10179301}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WuSZWLSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GopalSWS23, author = {Sindhu Reddy Kalathur Gopal and Diksha Shukla and James David Wheelock and Nitesh Saxena}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {859--876}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/gopal}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GopalSWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MahdadS23, author = {Ahmed Tanvir Mahdad and Nitesh Saxena}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {SoK: {A} Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {175--186}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590183}, doi = {10.1145/3558482.3590183}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MahdadS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AlatawiS23, author = {Mashari Alatawi and Nitesh Saxena}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {187--201}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581773}, doi = {10.1145/3558482.3581773}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AlatawiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WalkerZ0S023, author = {Payton Walker and Tianfang Zhang and Cong Shi and Nitesh Saxena and Yingying Chen}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {203--214}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581772}, doi = {10.1145/3558482.3581772}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WalkerZ0S023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-02042, author = {Payton Walker and Tianfang Zhang and Cong Shi and Nitesh Saxena and Yingying Chen}, title = {BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers}, journal = {CoRR}, volume = {abs/2302.02042}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.02042}, doi = {10.48550/ARXIV.2302.02042}, eprinttype = {arXiv}, eprint = {2302.02042}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-02042.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-03426, author = {Mashari Alatawi and Nitesh Saxena}, title = {Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems}, journal = {CoRR}, volume = {abs/2307.03426}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.03426}, doi = {10.48550/ARXIV.2307.03426}, eprinttype = {arXiv}, eprint = {2307.03426}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-03426.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-13894, author = {Mashari Alatawi and Nitesh Saxena}, title = {{VOICE-ZEUS:} Impersonating Zoom's E2EE-Protected Static Media and Textual Communications via Simple Voice Manipulations}, journal = {CoRR}, volume = {abs/2310.13894}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.13894}, doi = {10.48550/ARXIV.2310.13894}, eprinttype = {arXiv}, eprint = {2310.13894}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-13894.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/YangYLWCS22, author = {Xin Yang and Song Yang and Jian Liu and Chen Wang and Yingying Chen and Nitesh Saxena}, title = {Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {21}, number = {10}, pages = {3565--3580}, year = {2022}, url = {https://doi.org/10.1109/TMC.2021.3057083}, doi = {10.1109/TMC.2021.3057083}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/YangYLWCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ShresthaS22, author = {Prakash Shrestha and Nitesh Saxena}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {85--104}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_5}, doi = {10.1007/978-3-031-09234-3\_5}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/ShresthaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuSS22, author = {Zengrui Liu and Prakash Shrestha and Nitesh Saxena}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {147--169}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_8}, doi = {10.1007/978-3-031-09234-3\_8}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/WalkerSAHS22, author = {Payton Walker and Shalini Saini and S. Abhishek Anand and Tzipora Halevi and Nitesh Saxena}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {67--81}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517399}, doi = {10.1145/3488932.3517399}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/WalkerSAHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/WalkerS22, author = {Payton Walker and Nitesh Saxena}, title = {Laser Meager Listener: {A} Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {537--554}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00040}, doi = {10.1109/EUROSP53844.2022.00040}, timestamp = {Wed, 29 Jun 2022 16:03:24 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/WalkerS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ShiZZMYWSC22, author = {Cong Shi and Tianming Zhao and Wenjin Zhang and Ahmed Tanvir Mahdad and Zhengkun Ye and Yan Wang and Nitesh Saxena and Yingying Chen}, title = {Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds}, booktitle = {42nd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2022, Bologna, Italy, July 10-13, 2022}, pages = {680--690}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDCS54860.2022.00071}, doi = {10.1109/ICDCS54860.2022.00071}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/ShiZZMYWSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AlatawiS22, author = {Mashari Alatawi and Nitesh Saxena}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {100--123}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_6}, doi = {10.1007/978-3-031-29371-9\_6}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AlatawiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/Zhang00YWS0C22, author = {Tianfang Zhang and Cong Shi and Tianming Zhao and Zhengkun Ye and Payton Walker and Nitesh Saxena and Yan Wang and Yingying Chen}, editor = {Nirupama Bulusu and Ehsan Aryafar and Aruna Balasubramanian and Junehwa Song}, title = {Personalized health monitoring via vital sign measurements leveraging motion sensors on {AR/VR} headsets}, booktitle = {MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022 - 1 July 2022}, pages = {529--530}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3498361.3538768}, doi = {10.1145/3498361.3538768}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/Zhang00YWS0C22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/0001YZ0M0CS22, author = {Tianming Zhao and Zhengkun Ye and Tianfang Zhang and Cong Shi and Ahmed Tanvir Mahdad and Yan Wang and Yingying Chen and Nitesh Saxena}, editor = {Nirupama Bulusu and Ehsan Aryafar and Aruna Balasubramanian and Junehwa Song}, title = {Continuous blood pressure monitoring using low-cost motion sensors on {AR/VR} headsets}, booktitle = {MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022 - 1 July 2022}, pages = {589--590}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3498361.3538798}, doi = {10.1145/3498361.3538798}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/0001YZ0M0CS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ArisoyMS22, author = {Cagri Arisoy and Anuradha Mandal and Nitesh Saxena}, title = {Human Brains Can't Detect Fake News: {A} Neuro-Cognitive Study of Textual Disinformation Susceptibility}, booktitle = {19th Annual International Conference on Privacy, Security {\&} Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022}, pages = {1--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PST55820.2022.9851990}, doi = {10.1109/PST55820.2022.9851990}, timestamp = {Fri, 02 Sep 2022 18:51:56 +0200}, biburl = {https://dblp.org/rec/conf/pst/ArisoyMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SainiPS22, author = {Shalini Saini and Dhiral Panjwani and Nitesh Saxena}, title = {Mobile Mental Health Apps: Alternative Intervention or Intrusion?}, booktitle = {19th Annual International Conference on Privacy, Security {\&} Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022}, pages = {1--11}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PST55820.2022.9851975}, doi = {10.1109/PST55820.2022.9851975}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/SainiPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WalkerMZSG22, author = {Payton Walker and Nathan McClaran and Zihao Zheng and Nitesh Saxena and Guofei Gu}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {119--124}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528558}, doi = {10.1145/3507657.3528558}, timestamp = {Wed, 11 May 2022 08:49:13 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WalkerMZSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MandalS22, author = {Anuradha Mandal and Nitesh Saxena}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {175--187}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528541}, doi = {10.1145/3507657.3528541}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MandalS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-00885, author = {Zengrui Liu and Umar Iqbal and Nitesh Saxena}, title = {Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?}, journal = {CoRR}, volume = {abs/2202.00885}, year = {2022}, url = {https://arxiv.org/abs/2202.00885}, eprinttype = {arXiv}, eprint = {2202.00885}, timestamp = {Wed, 13 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-00885.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-06245, author = {Shalini Saini and Nitesh Saxena}, title = {Predatory Medicine: Exploring and Measuring the Vulnerability of Medical {AI} to Predatory Science}, journal = {CoRR}, volume = {abs/2203.06245}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.06245}, doi = {10.48550/ARXIV.2203.06245}, eprinttype = {arXiv}, eprint = {2203.06245}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-06245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-10728, author = {Shalini Saini and Dhiral Panjwani and Nitesh Saxena}, title = {Mobile Mental Health Apps: Alternative Intervention or Intrusion?}, journal = {CoRR}, volume = {abs/2206.10728}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.10728}, doi = {10.48550/ARXIV.2206.10728}, eprinttype = {arXiv}, eprint = {2206.10728}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-10728.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-08376, author = {Cagri Arisoy and Anuradha Mandal and Nitesh Saxena}, title = {Human Brains Can't Detect Fake News: {A} Neuro-Cognitive Study of Textual Disinformation Susceptibility}, journal = {CoRR}, volume = {abs/2207.08376}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.08376}, doi = {10.48550/ARXIV.2207.08376}, eprinttype = {arXiv}, eprint = {2207.08376}, timestamp = {Tue, 19 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-08376.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-12151, author = {Ahmed Tanvir Mahdad and Cong Shi and Zhengkun Ye and Tianming Zhao and Yan Wang and Yingying Chen and Nitesh Saxena}, title = {EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers}, journal = {CoRR}, volume = {abs/2212.12151}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.12151}, doi = {10.48550/ARXIV.2212.12151}, eprinttype = {arXiv}, eprint = {2212.12151}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-12151.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShiWCS21, author = {Cong Shi and Yan Wang and Yingying (Jennifer) Chen and Nitesh Saxena}, title = {Authentication of Voice Commands by Leveraging Vibrations in Wearables}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {83--92}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077205}, doi = {10.1109/MSEC.2021.3077205}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ShiWCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JareckiJKSS21, author = {Stanislaw Jarecki and Mohammed Jubur and Hugo Krawczyk and Nitesh Saxena and Maliheh Shirvanian}, title = {Two-factor Password-authenticated Key Exchange with End-to-end Security}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {17:1--17:37}, year = {2021}, url = {https://doi.org/10.1145/3446807}, doi = {10.1145/3446807}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JareckiJKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WalkerS21, author = {Payton Walker and Nitesh Saxena}, title = {Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {414--424}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485896}, doi = {10.1145/3485832.3485896}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WalkerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/Anand0WSS021, author = {S. Abhishek Anand and Jian Liu and Chen Wang and Maliheh Shirvanian and Nitesh Saxena and Yingying Chen}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {67--81}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437518}, doi = {10.1145/3433210.3437518}, timestamp = {Sat, 18 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/Anand0WSS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/WuXW0S0Y21, author = {Yi Wu and Xiangyu Xu and Payton R. Walker and Jian Liu and Nitesh Saxena and Yingying Chen and Jiadi Yu}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {{HVAC:} Evading Classifier-based Defenses in Hidden Voice Attacks}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {82--94}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437523}, doi = {10.1145/3433210.3437523}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/WuXW0S0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/JuburSSP21, author = {Mohammed Jubur and Prakash Shrestha and Nitesh Saxena and Jay Prakash}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {447--461}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453084}, doi = {10.1145/3433210.3453084}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/JuburSSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/PrakashYTBJSBZQ21, author = {Jay Prakash and Clarice Chua Qing Yu and Tanvi Ravindra Thombre and Andrei Bytes and Mohammed Jubur and Nitesh Saxena and Lucienne Blessing and Jianying Zhou and Tony Q. S. Quek}, title = {Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: {A} Redesign and Usability Evaluations}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {21--36}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00013}, doi = {10.1109/EUROSP51992.2021.00013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/PrakashYTBJSBZQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ShresthaSSP21, author = {Prakash Shrestha and Nitesh Saxena and Diksha Shukla and Vir V. Phoha}, title = {Press @{\textdollar}@{\textdollar} to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {71--87}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00016}, doi = {10.1109/EUROSP51992.2021.00016}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ShresthaSSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MahdadJS21, author = {Ahmed Tanvir Mahdad and Mohammed Jubur and Nitesh Saxena}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Analyzing the Security of {OTP} 2FA in the Face of Malicious Terminals}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12918}, pages = {97--115}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86890-1\_6}, doi = {10.1007/978-3-030-86890-1\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/MahdadJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/0004XZWWLS0Y21, author = {Cong Shi and Xiangyu Xu and Tianfang Zhang and Payton Walker and Yi Wu and Jian Liu and Nitesh Saxena and Yingying Chen and Jiadi Yu}, title = {Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by {AR/VR} motion sensors}, booktitle = {{ACM} MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, New Orleans, Louisiana, USA, October 25-29, 2021}, pages = {478--490}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3447993.3483272}, doi = {10.1145/3447993.3483272}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/0004XZWWLS0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ShirvanianPJSJK21, author = {Maliheh Shirvanian and Christopher Robert Price and Mohammed Jubur and Nitesh Saxena and Stanislaw Jarecki and Hugo Krawczyk}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {A hidden-password online password manager}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {1683--1686}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3442131}, doi = {10.1145/3412841.3442131}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ShirvanianPJSJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WalkerS21, author = {Payton Walker and Nitesh Saxena}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {273--287}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467825}, doi = {10.1145/3448300.3467825}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WalkerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AnandWLS021, author = {S. Abhishek Anand and Chen Wang and Jian Liu and Nitesh Saxena and Yingying Chen}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {288--299}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468499}, doi = {10.1145/3448300.3468499}, timestamp = {Sat, 18 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AnandWLS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-13607, author = {Kiavash Satvat and Maliheh Shirvanian and Nitesh Saxena}, title = {{PASSAT:} Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency}, journal = {CoRR}, volume = {abs/2102.13607}, year = {2021}, url = {https://arxiv.org/abs/2102.13607}, eprinttype = {arXiv}, eprint = {2102.13607}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-13607.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-10129, author = {Zengrui Liu and Prakash Shrestha and Nitesh Saxena}, title = {Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques}, journal = {CoRR}, volume = {abs/2110.10129}, year = {2021}, url = {https://arxiv.org/abs/2110.10129}, eprinttype = {arXiv}, eprint = {2110.10129}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-10129.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShresthaLS20, author = {Prakash Shrestha and Zengrui Liu and Nitesh Saxena}, title = {IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {706--716}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427279}, doi = {10.1145/3427228.3427279}, timestamp = {Tue, 15 Dec 2020 12:22:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShresthaLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShiW0SW20, author = {Cong Shi and Yan Wang and Yingying Chen and Nitesh Saxena and Chen Wang}, title = {WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {829--842}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427259}, doi = {10.1145/3427228.3427259}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShiW0SW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShirvanianMSA20, author = {Maliheh Shirvanian and Manar Mohamed and Nitesh Saxena and S. Abhishek Anand}, title = {Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {870--883}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427289}, doi = {10.1145/3427228.3427289}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShirvanianMSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SatvatSHS20, author = {Kiavash Satvat and Maliheh Shirvanian and Mahshid Hosseini and Nitesh Saxena}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {{CREPE:} {A} Privacy-Enhanced Crash Reporting System}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {295--306}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3375738}, doi = {10.1145/3374664.3375738}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/SatvatSHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShresthaS20, author = {Prakash Shrestha and Nitesh Saxena}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {13--24}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399366}, doi = {10.1145/3395351.3399366}, timestamp = {Tue, 29 Dec 2020 18:27:47 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShresthaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2020-1, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7}, doi = {10.1007/978-3-030-63086-7}, isbn = {978-3-030-63085-0}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2020-2, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {336}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63095-9}, doi = {10.1007/978-3-030-63095-9}, isbn = {978-3-030-63094-2}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-09083, author = {Chen Wang and Cong Shi and Yingying Chen and Yan Wang and Nitesh Saxena}, title = {WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity}, journal = {CoRR}, volume = {abs/2003.09083}, year = {2020}, url = {https://arxiv.org/abs/2003.09083}, eprinttype = {arXiv}, eprint = {2003.09083}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-09083.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AnandS19, author = {S. Abhishek Anand and Nitesh Saxena}, title = {Noisy Vibrational Pairing of IoT Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {530--545}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2873372}, doi = {10.1109/TDSC.2018.2873372}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AnandS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShirvanianSJK19, author = {Maliheh Shirvanian and Nitesh Saxena and Stanislaw Jarecki and Hugo Krawczyk}, title = {Building and Studying a Password Store that Perfectly Hides Passwords from Itself}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {770--782}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2902551}, doi = {10.1109/TDSC.2019.2902551}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShirvanianSJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0010MSZ19, author = {Song Gao and Manar Mohamed and Nitesh Saxena and Chengcui Zhang}, title = {Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {1040--1053}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2719031}, doi = {10.1109/TDSC.2017.2719031}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0010MSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ShresthaSTA19, author = {Babins Shrestha and Nitesh Saxena and Hien Thi Thu Truong and N. Asokan}, title = {Sensor-Based Proximity Detection in the Face of Active Adversaries}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {18}, number = {2}, pages = {444--457}, year = {2019}, url = {https://doi.org/10.1109/TMC.2018.2839604}, doi = {10.1109/TMC.2018.2839604}, timestamp = {Tue, 05 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/ShresthaSTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangALW0S19, author = {Chen Wang and S. Abhishek Anand and Jian Liu and Payton Walker and Yingying Chen and Nitesh Saxena}, editor = {David M. Balenson}, title = {Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {42--56}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359830}, doi = {10.1145/3359789.3359830}, timestamp = {Thu, 30 May 2024 10:08:27 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WangALW0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MohamedSS19, author = {Manar Mohamed and Prakash Shrestha and Nitesh Saxena}, editor = {David M. Balenson}, title = {Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {355--365}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359838}, doi = {10.1145/3359789.3359838}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MohamedSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShresthaSNS19, author = {Prakash Shrestha and Nitesh Saxena and Ajaya Neupane and Kiavash Satvat}, editor = {Swee{-}Huay Heng and Javier L{\'{o}}pez}, title = {{CATCHA:} When Cats Track Your Movements Online}, booktitle = {Information Security Practice and Experience - 15th International Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11879}, pages = {172--193}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34339-2\_10}, doi = {10.1007/978-3-030-34339-2\_10}, timestamp = {Tue, 19 Nov 2019 17:01:14 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ShresthaSNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NeupaneSHB19, author = {Ajaya Neupane and Nitesh Saxena and Leanne M. Hirshfield and Sarah E. Bratt}, title = {The Crux of Voice (In)Security: {A} Brain Study of Speaker Legitimacy Detection}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/the-crux-of-voice-insecurity-a-brain-study-of-speaker-legitimacy-detection/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NeupaneSHB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ShirvanianVS19, author = {Maliheh Shirvanian and Summer Vo and Nitesh Saxena}, title = {Quantifying the Breakability of Voice Assistants}, booktitle = {2019 {IEEE} International Conference on Pervasive Computing and Communications, PerCom, Kyoto, Japan, March 11-15, 2019}, pages = {1--11}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PERCOM.2019.8767399}, doi = {10.1109/PERCOM.2019.8767399}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/percom/ShirvanianVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AnandWS19, author = {S. Abhishek Anand and Payton Walker and Nitesh Saxena}, title = {Compromising Speech Privacy under Continuous Masking in Personal Spaces}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949053}, doi = {10.1109/PST47121.2019.8949053}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/AnandWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/NeupaneSHS19, author = {Ajaya Neupane and Kiavash Satvat and Mahshid Hosseini and Nitesh Saxena}, title = {Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949062}, doi = {10.1109/PST47121.2019.8949062}, timestamp = {Mon, 13 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/NeupaneSHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ShirvanianS19, author = {Maliheh Shirvanian and Nitesh Saxena}, title = {Stethoscope: Crypto Phones with Transparent {\&} Robust Fingerprint Comparisons using Inter Text-Speech Transformations}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949068}, doi = {10.1109/PST47121.2019.8949068}, timestamp = {Mon, 13 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ShirvanianS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ShresthaMS19, author = {Babins Shrestha and Manar Mohamed and Nitesh Saxena}, title = {{ZEMFA:} Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949032}, doi = {10.1109/PST47121.2019.8949032}, timestamp = {Mon, 13 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ShresthaMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-05972, author = {S. Abhishek Anand and Chen Wang and Jian Liu and Nitesh Saxena and Yingying Chen}, title = {Spearphone: {A} Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers}, journal = {CoRR}, volume = {abs/1907.05972}, year = {2019}, url = {http://arxiv.org/abs/1907.05972}, eprinttype = {arXiv}, eprint = {1907.05972}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-05972.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ShresthaS17, author = {Prakash Shrestha and Nitesh Saxena}, title = {An Offensive and Defensive Exposition of Wearable Computing}, journal = {{ACM} Comput. Surv.}, volume = {50}, number = {6}, pages = {92:1--92:39}, year = {2018}, url = {https://doi.org/10.1145/3133837}, doi = {10.1145/3133837}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ShresthaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ShirvanianSM18, author = {Maliheh Shirvanian and Nitesh Saxena and Dibya Mukhopadhyay}, title = {Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines}, journal = {J. Comput. Secur.}, volume = {26}, number = {3}, pages = {311--333}, year = {2018}, url = {https://doi.org/10.3233/JCS-17970}, doi = {10.3233/JCS-17970}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ShirvanianSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NeupaneSSSB18, author = {Ajaya Neupane and Kiavash Satvat and Nitesh Saxena and Despina Stavrinos and Haley Johnson Bishop}, title = {Do Social Disorders Facilitate Social Engineering?: {A} Case Study of Autism and Phishing Attacks}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {467--477}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274730}, doi = {10.1145/3274694.3274730}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NeupaneSSSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShresthaSS18, author = {Prakash Shrestha and Babins Shrestha and Nitesh Saxena}, title = {Home Alone: The Insider Threat of Unattended Wearables and {A} Defense using Audio Proximity}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433216}, doi = {10.1109/CNS.2018.8433216}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShresthaSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AnandS18, author = {S. Abhishek Anand and Nitesh Saxena}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {103--110}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176341}, doi = {10.1145/3176258.3176341}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/AnandS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JareckiKSS18, author = {Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Two-Factor Authentication with End-to-End Password Security}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {431--461}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_15}, doi = {10.1007/978-3-319-76581-5\_15}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JareckiKSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AnandS18, author = {S. Abhishek Anand and Nitesh Saxena}, title = {Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {1000--1017}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00004}, doi = {10.1109/SP.2018.00004}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AnandS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShresthaS18, author = {Prakash Shrestha and Nitesh Saxena}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {99--110}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212501}, doi = {10.1145/3212480.3212501}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ShresthaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-01718, author = {Kiavash Satvat and Nitesh Saxena}, title = {Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports}, journal = {CoRR}, volume = {abs/1808.01718}, year = {2018}, url = {http://arxiv.org/abs/1808.01718}, eprinttype = {arXiv}, eprint = {1808.01718}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-01718.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKSS18, author = {Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena}, title = {Two-Factor Authentication with End-to-End Password Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2018}, url = {http://eprint.iacr.org/2018/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShirvanianJKS18, author = {Maliheh Shirvanian and Stanislaw Jarecki and Hugo Krawczyk and Nitesh Saxena}, title = {{SPHINX:} {A} Password Store that Perfectly Hides Passwords from Itself}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2018}, url = {https://eprint.iacr.org/2018/695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShirvanianJKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MohamedGSSZKO17, author = {Manar Mohamed and Song Gao and Niharika Sachdeva and Nitesh Saxena and Chengcui Zhang and Ponnurangam Kumaraguru and Paul C. van Oorschot}, title = {On the security and usability of dynamic cognitive game CAPTCHAs}, journal = {J. Comput. Secur.}, volume = {25}, number = {3}, pages = {205--230}, year = {2017}, url = {https://doi.org/10.3233/JCS-16847}, doi = {10.3233/JCS-16847}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MohamedGSSZKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MohamedSS17, author = {Manar Mohamed and Babins Shrestha and Nitesh Saxena}, title = {SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {901--913}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2620278}, doi = {10.1109/TIFS.2016.2620278}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MohamedSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShirvanianSG17, author = {Maliheh Shirvanian and Nitesh Saxena and Jesvin James George}, title = {On the Pitfalls of End-to-End Encrypted Communications: {A} Study of Remote Key-Fingerprint Verification}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {499--511}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134610}, doi = {10.1145/3134600.3134610}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShirvanianSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuWCS17, author = {Jian Liu and Chen Wang and Yingying Chen and Nitesh Saxena}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {73--87}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133964}, doi = {10.1145/3133956.3133964}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuWCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShirvanianS17, author = {Maliheh Shirvanian and Nitesh Saxena}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{CCCP:} Closed Caption Crypto Phones to Resist {MITM} Attacks, Human Errors and Click-Through}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1329--1342}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134013}, doi = {10.1145/3133956.3134013}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShirvanianS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NeupaneRS17, author = {Ajaya Neupane and Md. Lutfor Rahman and Nitesh Saxena}, editor = {Aggelos Kiayias}, title = {{PEEP:} Passively Eavesdropping Private Input via Brainwave Signals}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {227--246}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_12}, doi = {10.1007/978-3-319-70972-7\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/NeupaneRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ShirvanianJKS17, author = {Maliheh Shirvanian and Stanislaw Jarecki and Hugo Krawczyk and Nitesh Saxena}, editor = {Kisung Lee and Ling Liu}, title = {{SPHINX:} {A} Password Store that Perfectly Hides Passwords from Itself}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {1094--1104}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.64}, doi = {10.1109/ICDCS.2017.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ShirvanianJKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AnandS17, author = {S. Abhishek Anand and Nitesh Saxena}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {173--183}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098256}, doi = {10.1145/3098243.3098256}, timestamp = {Tue, 06 Nov 2018 16:59:31 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AnandS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShresthaAS17, author = {Prakash Shrestha and S. Abhishek Anand and Nitesh Saxena}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {{YELP:} masking sound-based opportunistic attacks in zero-effort deauthentication}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {195--206}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098259}, doi = {10.1145/3098243.3098259}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShresthaAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NeupaneSH17, author = {Ajaya Neupane and Nitesh Saxena and Leanne M. Hirshfield}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {1571--1580}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052702}, doi = {10.1145/3038912.3052702}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/NeupaneSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShirvanianSG17, author = {Maliheh Shirvanian and Nitesh Saxena and Jesvin James George}, title = {On the Pitfalls of End-to-End Encrypted Communications: {A} Study of Remote Key-Fingerprint Verification}, journal = {CoRR}, volume = {abs/1707.05285}, year = {2017}, url = {http://arxiv.org/abs/1707.05285}, eprinttype = {arXiv}, eprint = {1707.05285}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShirvanianSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/brain/MaximoNSJK16, author = {Jose Omar Maximo and Ajaya Neupane and Nitesh Saxena and Robert M. Joseph and Rajesh K. Kana}, title = {Task-Dependent Changes in Frontal-Parietal Activation and Connectivity During Visual Search}, journal = {Brain Connect.}, volume = {6}, number = {4}, pages = {335--344}, year = {2016}, url = {https://doi.org/10.1089/brain.2015.0343}, doi = {10.1089/BRAIN.2015.0343}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/brain/MaximoNSJK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NeupaneSMK16, author = {Ajaya Neupane and Nitesh Saxena and Jose Omar Maximo and Rajesh K. Kana}, title = {Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1970--1983}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2566265}, doi = {10.1109/TIFS.2016.2566265}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NeupaneSMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShresthaMTS16, author = {Babins Shrestha and Manar Mohamed and Sandeep Tamrakar and Nitesh Saxena}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Theft-resilient mobile wallets: transparently authenticating {NFC} users with tapping gesture biometrics}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {265--276}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991097}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShresthaMTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MohamedS16, author = {Manar Mohamed and Nitesh Saxena}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Gametrics: towards attack-resilient behavioral authentication with simple cognitive games}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {277--288}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991096}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MohamedS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JareckiKSS16, author = {Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Device-Enhanced Password Protocols with Optimal Online-Offline Protection}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {177--188}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897880}, doi = {10.1145/2897845.2897880}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JareckiKSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShresthaSSS16, author = {Babins Shrestha and Maliheh Shirvanian and Prakash Shrestha and Nitesh Saxena}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {908--919}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978328}, doi = {10.1145/2976749.2978328}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShresthaSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MohamedSS16, author = {Manar Mohamed and Babins Shrestha and Nitesh Saxena}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {SMASheD: Sniffing and Manipulating Android Sensor Data}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {152--159}, publisher = {{ACM}}, year = {2016}, url = {https://dl.acm.org/citation.cfm?id=2857749}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MohamedSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AnandS16, author = {S. Abhishek Anand and Nitesh Saxena}, editor = {Jens Grossklags and Bart Preneel}, title = {A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {346--364}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_21}, doi = {10.1007/978-3-662-54970-4\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AnandS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HuhtaUJSSA16, author = {Otto Huhta and Swapnil Udar and Mika Juuti and Prakash Shrestha and Nitesh Saxena and N. Asokan}, title = {Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/pitfalls-designing-zero-effort-deauthentication-opportunistic-human-observation-attacks.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/HuhtaUJSSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShresthaMS16, author = {Prakash Shrestha and Manar Mohamed and Nitesh Saxena}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {67--77}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939924}, doi = {10.1145/2939918.2939924}, timestamp = {Tue, 06 Nov 2018 16:59:31 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShresthaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AnandS16, author = {S. Abhishek Anand and Nitesh Saxena}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {103--108}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939934}, doi = {10.1145/2939918.2939934}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AnandS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShresthaMS16, author = {Babins Shrestha and Manar Mohamed and Nitesh Saxena}, title = {Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics}, journal = {CoRR}, volume = {abs/1605.00766}, year = {2016}, url = {http://arxiv.org/abs/1605.00766}, eprinttype = {arXiv}, eprint = {1605.00766}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShresthaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HaleviS15, author = {Tzipora Halevi and Nitesh Saxena}, title = {Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {443--456}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0264-7}, doi = {10.1007/S10207-014-0264-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HaleviS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShresthaM0LS15, author = {Babins Shrestha and Di Ma and Yan Zhu and Haoyu Li and Nitesh Saxena}, title = {Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2270--2283}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2436364}, doi = {10.1109/TIFS.2015.2436364}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ShresthaM0LS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaoMSZ15, author = {Song Gao and Manar Mohamed and Nitesh Saxena and Chengcui Zhang}, title = {Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {11--20}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818006}, doi = {10.1145/2818000.2818006}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GaoMSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShirvanianS15, author = {Maliheh Shirvanian and Nitesh Saxena}, title = {On the Security and Usability of Crypto Phones}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {21--30}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818007}, doi = {10.1145/2818000.2818007}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShirvanianS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AnandSS15, author = {S. Abhishek Anand and Prakash Shrestha and Nitesh Saxena}, editor = {Michael K. Reiter and David Naccache}, title = {Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {95--110}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_7}, doi = {10.1007/978-3-319-26823-1\_7}, timestamp = {Mon, 02 Jan 2023 08:05:35 +0100}, biburl = {https://dblp.org/rec/conf/cans/AnandSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NeupaneRSH15, author = {Ajaya Neupane and Md. Lutfor Rahman and Nitesh Saxena and Leanne M. Hirshfield}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {479--491}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813660}, doi = {10.1145/2810103.2813660}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NeupaneRSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MukhopadhyaySS15, author = {Dibya Mukhopadhyay and Maliheh Shirvanian and Nitesh Saxena}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {599--621}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_30}, doi = {10.1007/978-3-319-24177-7\_30}, timestamp = {Sat, 19 Oct 2019 20:00:24 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MukhopadhyaySS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ShresthaMBST15, author = {Babins Shrestha and Manar Mohamed and Anders Borg and Nitesh Saxena and Sandeep Tamrakar}, title = {Curbing mobile malware based on user-transparent hand movements}, booktitle = {2015 {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015}, pages = {221--229}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PERCOM.2015.7146532}, doi = {10.1109/PERCOM.2015.7146532}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/ShresthaMBST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HuhtaSUSA15, author = {Otto Huhta and Prakash Shrestha and Swapnil Udar and Nitesh Saxena and N. Asokan}, title = {Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication}, journal = {CoRR}, volume = {abs/1505.05779}, year = {2015}, url = {http://arxiv.org/abs/1505.05779}, eprinttype = {arXiv}, eprint = {1505.05779}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HuhtaSUSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShresthaSTA15, author = {Babins Shrestha and Nitesh Saxena and Hien Thi Thu Truong and N. Asokan}, title = {Contextual Proximity Detection in the Face of Context-Manipulating Adversaries}, journal = {CoRR}, volume = {abs/1511.00905}, year = {2015}, url = {http://arxiv.org/abs/1511.00905}, eprinttype = {arXiv}, eprint = {1511.00905}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShresthaSTA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKSS15, author = {Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena}, title = {Device-Enhanced Password Protocols with Optimal Online-Offline Protection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1099}, year = {2015}, url = {http://eprint.iacr.org/2015/1099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PeddintiS14, author = {Sai Teja Peddinti and Nitesh Saxena}, title = {Web search query privacy: Evaluating query obfuscation and anonymizing networks}, journal = {J. Comput. Secur.}, volume = {22}, number = {1}, pages = {155--199}, year = {2014}, url = {https://doi.org/10.3233/JCS-130491}, doi = {10.3233/JCS-130491}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PeddintiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaS14, author = {Di Ma and Nitesh Saxena}, title = {A context-aware approach to defend against unauthorized reading and relay attacks in {RFID} systems}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2684--2695}, year = {2014}, url = {https://doi.org/10.1002/sec.404}, doi = {10.1002/SEC.404}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohamedSGGSZKOC14, author = {Manar Mohamed and Niharika Sachdeva and Michael Georgescu and Song Gao and Nitesh Saxena and Chengcui Zhang and Ponnurangam Kumaraguru and Paul C. van Oorschot and Wei{-}bang Chen}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {195--206}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590298}, doi = {10.1145/2590296.2590298}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MohamedSGGSZKOC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShirvanianS14, author = {Maliheh Shirvanian and Nitesh Saxena}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {868--879}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660274}, doi = {10.1145/2660267.2660274}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShirvanianS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ShresthaSTA14, author = {Babins Shrestha and Nitesh Saxena and Hien Thi Thu Truong and N. Asokan}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {349--364}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_23}, doi = {10.1007/978-3-662-45472-5\_23}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/ShresthaSTA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/GaoMSZ14, author = {Song Gao and Manar Mohamed and Nitesh Saxena and Chengcui Zhang}, title = {Gaming the game: Defeating a game captcha with efficient and robust hybrid attacks}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2014, Chengdu, China, July 14-18, 2014}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICME.2014.6890287}, doi = {10.1109/ICME.2014.6890287}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/GaoMSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NeupaneSKGK14, author = {Ajaya Neupane and Nitesh Saxena and Keya Kuruvilla and Michael Georgescu and Rajesh K. Kana}, title = {Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/neural-signatures-user-centered-security-fmri-study-phishing-and-malware-warnings}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NeupaneSKGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShirvanianJSN14, author = {Maliheh Shirvanian and Stanislaw Jarecki and Nitesh Saxena and Naveen Nathan}, title = {Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/two-factor-authentication-resilient-server-compromise-using-mix-bandwidth-devices}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ShirvanianJSN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/TruongGSSAN14, author = {Hien Thi Thu Truong and Xiang Gao and Babins Shrestha and Nitesh Saxena and N. Asokan and Petteri Nurmi}, title = {Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication}, booktitle = {{IEEE} International Conference on Pervasive Computing and Communications, PerCom 2014, Budapest, Hungary, March 24-28, 2014}, pages = {163--171}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PerCom.2014.6813957}, doi = {10.1109/PERCOM.2014.6813957}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/TruongGSSAN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rfidsec/2014, editor = {Nitesh Saxena and Ahmad{-}Reza Sadeghi}, title = {Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8651}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13066-8}, doi = {10.1007/978-3-319-13066-8}, isbn = {978-3-319-13065-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaSXZ13, author = {Di Ma and Nitesh Saxena and Tuo Xiang and Yan Zhu}, title = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy via Location Sensing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {57--69}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.89}, doi = {10.1109/TDSC.2012.89}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/HaleviLMSVX13, author = {Tzipora Halevi and Haoyu Li and Di Ma and Nitesh Saxena and Jonathan Voris and Tuo Xiang}, title = {Context-Aware Defenses to {RFID} Unauthorized Reading and Relay Attacks}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {1}, number = {2}, pages = {307--318}, year = {2013}, url = {https://doi.org/10.1109/TETC.2013.2290537}, doi = {10.1109/TETC.2013.2290537}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/HaleviLMSVX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HaleviS13, author = {Tzipora Halevi and Nitesh Saxena}, title = {Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {3}, pages = {563--577}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2247758}, doi = {10.1109/TIFS.2013.2247758}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HaleviS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apchi/SachdevaSK13, author = {Niharika Sachdeva and Nitesh Saxena and Ponnurangam Kumaraguru}, editor = {Sanjay Tripathi and Anirudha N. Joshi}, title = {On the viability of CAPTCHAs for use in telephony systems: a usability field study}, booktitle = {11th Asia Pacific Conference on Computer Human Interaction, {APCHI} '13, Bangalore, India - September 24 - 27, 2013}, pages = {178--182}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2525194.2525265}, doi = {10.1145/2525194.2525265}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apchi/SachdevaSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ShresthaSH13, author = {Babins Shrestha and Nitesh Saxena and Justin Harrison}, editor = {Michel Abdalla and Cristina Nita{-}Rotaru and Ricardo Dahab}, title = {Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture}, booktitle = {Cryptology and Network Security - 12th International Conference, {CANS} 2013, Paraty, Brazil, November 20-22. 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8257}, pages = {199--217}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02937-5\_11}, doi = {10.1007/978-3-319-02937-5\_11}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/ShresthaSH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HasanSHZR13, author = {Ragib Hasan and Nitesh Saxena and Tzipora Halevi and Shams Zawoad and Dustin Rinehart}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Sensing-enabled channels for hard-to-detect command and control of mobile devices}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {469--480}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484373}, doi = {10.1145/2484313.2484373}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HasanSHZR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GallegoSV13, author = {Alexander Gallego and Nitesh Saxena and Jonathan Voris}, editor = {Ahmad{-}Reza Sadeghi}, title = {Exploring Extrinsic Motivation for Better Security: {A} Usability Study of Scoring-Enhanced Device Pairing}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {60--68}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_6}, doi = {10.1007/978-3-642-39884-1\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GallegoSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SachdevaSK13, author = {Niharika Sachdeva and Nitesh Saxena and Ponnurangam Kumaraguru}, editor = {Yvo Desmedt}, title = {On the Viability of CAPTCHAs for use in Telephony Systems: {A} Usability Field Study}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {261--279}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_19}, doi = {10.1007/978-3-319-27659-5\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/SachdevaSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiMSSZ13, author = {Haoyu Li and Di Ma and Nitesh Saxena and Babins Shrestha and Yan Zhu}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {25--30}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462101}, doi = {10.1145/2462096.2462101}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiMSSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-4010, author = {Haoyu Li and Di Ma and Nitesh Saxena and Babins Shrestha and Yan Zhu}, title = {Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using Intuitive Human Gestures}, journal = {CoRR}, volume = {abs/1302.4010}, year = {2013}, url = {http://arxiv.org/abs/1302.4010}, eprinttype = {arXiv}, eprint = {1302.4010}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-4010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MohamedSGGSZKOC13, author = {Manar Mohamed and Niharika Sachdeva and Michael Georgescu and Song Gao and Nitesh Saxena and Chengcui Zhang and Ponnurangam Kumaraguru and Paul C. van Oorschot and Wei{-}bang Chen}, title = {Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability}, journal = {CoRR}, volume = {abs/1310.1540}, year = {2013}, url = {http://arxiv.org/abs/1310.1540}, eprinttype = {arXiv}, eprint = {1310.1540}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MohamedSGGSZKOC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/PerkovicCMSB12, author = {Toni Perkovic and Mario Cagalj and Toni Mastelic and Nitesh Saxena and Dinko Begusic}, title = {Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {11}, number = {2}, pages = {337--351}, year = {2012}, url = {https://doi.org/10.1109/TMC.2011.35}, doi = {10.1109/TMC.2011.35}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/PerkovicCMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviS12, author = {Tzipora Halevi and Nitesh Saxena}, editor = {Heung Youl Youm and Yoojae Won}, title = {A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {89--90}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414509}, doi = {10.1145/2414456.2414509}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaleviS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HaleviMSX12, author = {Tzipora Halevi and Di Ma and Nitesh Saxena and Tuo Xiang}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Secure Proximity Detection for {NFC} Devices Based on Ambient Sensor Data}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {379--396}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_22}, doi = {10.1007/978-3-642-33167-1\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HaleviMSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SaxenaV12, author = {Nitesh Saxena and Jonathan Voris}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Exploring Mobile Proxies for Better Password Authentication}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {293--302}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_26}, doi = {10.1007/978-3-642-34129-8\_26}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SaxenaV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/DeyTRS12, author = {Ratan Dey and Cong Tang and Keith W. Ross and Nitesh Saxena}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Estimating age privacy leakage in online social networks}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2836--2840}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195711}, doi = {10.1109/INFCOM.2012.6195711}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/DeyTRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/HaleviLMPSVX12, author = {Tzipora Halevi and Sein Lin and Di Ma and Anudath K. Prasad and Nitesh Saxena and Jonathan Voris and Tuo Xiang}, editor = {Silvia Giordano and Marc Langheinrich and Albrecht Schmidt}, title = {Sensing-enabled defenses to {RFID} unauthorized reading and relay attacks without changing the usage model}, booktitle = {2012 {IEEE} International Conference on Pervasive Computing and Communications, Lugano, Switzerland, March 19-23, 2012}, pages = {227--234}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerCom.2012.6199835}, doi = {10.1109/PERCOM.2012.6199835}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/HaleviLMPSVX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MaPSX12, author = {Di Ma and Anudath K. Prasad and Nitesh Saxena and Tuo Xiang}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Location-aware and safer cards: enhancing {RFID} security and privacy via location sensing}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {51--62}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185457}, doi = {10.1145/2185448.2185457}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MaPSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SaxenaV11, author = {Nitesh Saxena and Jonathan Voris}, title = {Data remanence effects on memory-based entropy collection for {RFID} systems}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {4}, pages = {213--222}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0139-0}, doi = {10.1007/S10207-011-0139-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SaxenaV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HaleviSH11, author = {Tzipora Halevi and Nitesh Saxena and Shai Halevi}, title = {Tree-based {HB} protocols for privacy-preserving authentication of {RFID} tags}, journal = {J. Comput. Secur.}, volume = {19}, number = {2}, pages = {343--363}, year = {2011}, url = {https://doi.org/10.3233/JCS-2010-0404}, doi = {10.3233/JCS-2010-0404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HaleviSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SaxenaEKA11, author = {Nitesh Saxena and Jan{-}Erik Ekberg and Kari Kostiainen and N. Asokan}, title = {Secure Device Pairing Based on a Visual Channel: Design and Usability Study}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {1}, pages = {28--38}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2010.2096217}, doi = {10.1109/TIFS.2010.2096217}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SaxenaEKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BagherzandiJSL11, author = {Ali Bagherzandi and Stanislaw Jarecki and Nitesh Saxena and Yanbin Lu}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Password-protected secret sharing}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {433--444}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046758}, doi = {10.1145/2046707.2046758}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BagherzandiJSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PeddintiS11, author = {Sai Teja Peddinti and Nitesh Saxena}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {On the effectiveness of anonymizing networks for web search privacy}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {483--489}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966984}, doi = {10.1145/1966913.1966984}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PeddintiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgames/GallegoSV11, author = {Alexander Gallego and Nitesh Saxena and Jonathan Voris}, editor = {Quasim H. Mehdi and Adel Said Elmaghraby and Robert Moreton and Roman V. Yampolskiy and Julia Chariker}, title = {Playful security: {A} computer game for secure wireless device pairing}, booktitle = {16th International Conference on Computer Games, {CGAMES} 2011, Louisville, KY, USA, 27-30 July, 2011}, pages = {177--184}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CGAMES.2011.6000336}, doi = {10.1109/CGAMES.2011.6000336}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cgames/GallegoSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/UzunSK11, author = {Ersin Uzun and Nitesh Saxena and Arun Kumar}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {Pairing devices for social interactions: a comparative usability evaluation}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2315--2324}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979282}, doi = {10.1145/1978942.1979282}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/UzunSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/TangRSC11, author = {Cong Tang and Keith W. Ross and Nitesh Saxena and Ruichuan Chen}, editor = {Jianliang Xu and Ge Yu and Shuigeng Zhou and Rainer Unland}, title = {What's in a Name: {A} Study of Names, Gender Inference, and Gender Behavior in Facebook}, booktitle = {Database Systems for Adanced Applications - 16th International Conference, {DASFAA} 2011, International Workshops: GDB, SIM3, FlashDB, SNSMW, DaMEN, DQIS, Hong Kong, China, April 22-25, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6637}, pages = {344--356}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20244-5\_33}, doi = {10.1007/978-3-642-20244-5\_33}, timestamp = {Sun, 05 Jan 2020 16:37:46 +0100}, biburl = {https://dblp.org/rec/conf/dasfaa/TangRSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/PeddintiS11, author = {Sai Teja Peddinti and Nitesh Saxena}, editor = {James A. Landay and Yuanchun Shi and Donald J. Patterson and Yvonne Rogers and Xing Xie}, title = {On the limitations of query obfuscation techniques for location privacy}, booktitle = {UbiComp 2011: Ubiquitous Computing, 13th International Conference, UbiComp 2011, Beijing, China, September 17-21, 2011, Proceedings}, pages = {187--196}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2030112.2030139}, doi = {10.1145/2030112.2030139}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/PeddintiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/SaxenaUVA11, author = {Nitesh Saxena and Md. Borhan Uddin and Jonathan Voris and N. Asokan}, title = {Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal {RFID} tags}, booktitle = {Ninth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2011, 21-25 March 2011, Seattle, WA, USA, Proceedings}, pages = {181--188}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PERCOM.2011.5767583}, doi = {10.1109/PERCOM.2011.5767583}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/SaxenaUVA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/VorisSH11, author = {Jonathan Voris and Nitesh Saxena and Tzipora Halevi}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Accelerometers and randomness: perfect together}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {115--126}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998433}, doi = {10.1145/1998412.1998433}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/VorisSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/PeddintiDS11, author = {Sai Teja Peddinti and Avis Dsouza and Nitesh Saxena}, editor = {Yan Chen and Jaideep Vaidya}, title = {Cover locations: availing location-based services without revealing the location}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {143--152}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046576}, doi = {10.1145/2046556.2046576}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/PeddintiDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JareckiS10, author = {Stanislaw Jarecki and Nitesh Saxena}, title = {On the Insecurity of Proactive {RSA} in the {URSA} Mobile Ad Hoc Network Access Control Protocol}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {4}, pages = {739--749}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2058104}, doi = {10.1109/TIFS.2010.2058104}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JareckiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviS10, author = {Tzipora Halevi and Nitesh Saxena}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {97--108}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866319}, doi = {10.1145/1866307.1866319}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaleviS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/PerkovicCS10, author = {Toni Perkovic and Mario Cagalj and Nitesh Saxena}, editor = {Radu Sion}, title = {Shoulder-Surfing Safe Login in a Partially Observable Attacker Model}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {351--358}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_29}, doi = {10.1007/978-3-642-14577-3\_29}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/PerkovicCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/NithyanandSTU10, author = {Rishab Nithyanand and Nitesh Saxena and Gene Tsudik and Ersin Uzun}, editor = {Jakob E. Bardram and Marc Langheinrich and Khai N. Truong and Paddy Nixon}, title = {Groupthink: usability of secure group association for wireless devices}, booktitle = {UbiComp 2010: Ubiquitous Computing, 12th International Conference, UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {331--340}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1864349.1864399}, doi = {10.1145/1864349.1864399}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/NithyanandSTU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KaroleSC10, author = {Ambarish Karole and Nitesh Saxena and Nicolas Christin}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {A Comparative Usability Evaluation of Traditional Password Managers}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {233--251}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_16}, doi = {10.1007/978-3-642-24209-0\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KaroleSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/WuTDSR10, author = {Di Wu and Cong Tang and Prithula Dhungel and Nitesh Saxena and Keith W. Ross}, title = {On the Privacy of Peer-Assisted Distribution of Security Patches}, booktitle = {{IEEE} Tenth International Conference on Peer-to-Peer Computing, {P2P} 2010, Delft, The Netherlands, 25-27 August 2010}, pages = {1--10}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/P2P.2010.5569988}, doi = {10.1109/P2P.2010.5569988}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/p2p/WuTDSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/PeddintiS10, author = {Sai Teja Peddinti and Nitesh Saxena}, editor = {Mikhail J. Atallah and Nicholas J. Hopper}, title = {On the Privacy of Web Search Based on Query Obfuscation: {A} Case Study of TrackMeNot}, booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS} 2010, Berlin, Germany, July 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6205}, pages = {19--37}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14527-8\_2}, doi = {10.1007/978-3-642-14527-8\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/PeddintiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/SaxenaV10, author = {Nitesh Saxena and Jonathan Voris}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {Still and Silent: Motion Detection for Enhanced {RFID} Security and Privacy without Changing the Usage Model}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {2--21}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_2}, doi = {10.1007/978-3-642-16822-2\_2}, timestamp = {Fri, 03 Sep 2021 17:40:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/SaxenaV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/JareckiS10, author = {Stanislaw Jarecki and Nitesh Saxena}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {253--270}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_17}, doi = {10.1007/978-3-642-15317-4\_17}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/JareckiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1005-0657, author = {Alexander Gallego and Nitesh Saxena and Jonathan Voris}, title = {Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing}, journal = {CoRR}, volume = {abs/1005.0657}, year = {2010}, url = {http://arxiv.org/abs/1005.0657}, eprinttype = {arXiv}, eprint = {1005.0657}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1005-0657.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiBSL10, author = {Stanislaw Jarecki and Ali Bagherzandi and Nitesh Saxena and Yanbin Lu}, title = {Password-Protected Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2010}, url = {http://eprint.iacr.org/2010/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiBSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviS10, author = {Tzipora Halevi and Nitesh Saxena}, title = {Eavesdropping over Random Passwords via Keyboard Acoustic Emanations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2010}, url = {http://eprint.iacr.org/2010/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/KumarSTU09, author = {Arun Kumar and Nitesh Saxena and Gene Tsudik and Ersin Uzun}, title = {A comparative study of secure device pairing methods}, journal = {Pervasive Mob. Comput.}, volume = {5}, number = {6}, pages = {734--749}, year = {2009}, url = {https://doi.org/10.1016/j.pmcj.2009.07.008}, doi = {10.1016/J.PMCJ.2009.07.008}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/KumarSTU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SaxenaY09, author = {Nitesh Saxena and Jeong Hyun Yi}, title = {Noninteractive self-certification for long-lived mobile ad hoc networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {946--955}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2031946}, doi = {10.1109/TIFS.2009.2031946}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SaxenaY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SaxenaTY09, author = {Nitesh Saxena and Gene Tsudik and Jeong Hyun Yi}, title = {Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {20}, number = {2}, pages = {158--170}, year = {2009}, url = {https://doi.org/10.1109/TPDS.2008.77}, doi = {10.1109/TPDS.2008.77}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/SaxenaTY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SaxenaU09, author = {Nitesh Saxena and Md. Borhan Uddin}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {34--52}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_3}, doi = {10.1007/978-3-642-01957-9\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SaxenaU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SaxenaU09, author = {Nitesh Saxena and Md. Borhan Uddin}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {154--173}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_11}, doi = {10.1007/978-3-642-10433-6\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SaxenaU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/CagaljSU09, author = {Mario Cagalj and Nitesh Saxena and Ersin Uzun}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {On the Usability of Secure Association of Wireless Devices Based on Distance Bounding}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {443--462}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_30}, doi = {10.1007/978-3-642-10433-6\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/CagaljSU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/KaroleS09, author = {Ambarish Karole and Nitesh Saxena}, editor = {Arjan Durresi and Leonard Barolli and Tomoya Enokido and Minoru Uehara and Elhadi M. Shakshuki and Makoto Takizawa}, title = {Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison}, booktitle = {NBiS 2009, 12th International Conference on Network-Based Information Systems, Indianapolis, Indiana, USA, 19-21 August 2009}, pages = {273--278}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NBiS.2009.57}, doi = {10.1109/NBIS.2009.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/KaroleS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/KumarSTU09, author = {Arun Kumar and Nitesh Saxena and Gene Tsudik and Ersin Uzun}, title = {Caveat Emptor: {A} Comparative Study of Secure Device Pairing Methods}, booktitle = {Seventh Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/PERCOM.2009.4912753}, doi = {10.1109/PERCOM.2009.4912753}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/KumarSTU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/SaxenaUV09, author = {Nitesh Saxena and Md. Borhan Uddin and Jonathan Voris}, editor = {Lorrie Faith Cranor}, title = {Treat 'em like other devices: user authentication of multiple personal {RFID} tags}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572573}, doi = {10.1145/1572532.1572573}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/SaxenaUV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-1227, author = {Tzipora Halevi and Nitesh Saxena and Shai Halevi}, title = {Using {HB} Family of Protocols for Privacy-Preserving Authentication of {RFID} Tags in a Population}, journal = {CoRR}, volume = {abs/0907.1227}, year = {2009}, url = {http://arxiv.org/abs/0907.1227}, eprinttype = {arXiv}, eprint = {0907.1227}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-1227.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-1256, author = {Nitesh Saxena and Jonathan Voris}, title = {We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of {RAM} for True Random Number Generation on {RFID} Tags (RFIDSec 2009)}, journal = {CoRR}, volume = {abs/0907.1256}, year = {2009}, url = {http://arxiv.org/abs/0907.1256}, eprinttype = {arXiv}, eprint = {0907.1256}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-1256.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-4743, author = {Arun Kumar and Nitesh Saxena and Ersin Uzun}, title = {Alice Meets Bob: {A} Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting}, journal = {CoRR}, volume = {abs/0907.4743}, year = {2009}, url = {http://arxiv.org/abs/0907.4743}, eprinttype = {arXiv}, eprint = {0907.4743}, timestamp = {Thu, 01 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-4743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PrasadS08, author = {Ramnath Prasad and Nitesh Saxena}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {328--345}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_20}, doi = {10.1007/978-3-540-68914-0\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PrasadS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/SaxenaV08, author = {Nitesh Saxena and Jonathan Voris}, title = {Pairing Devices with Good Quality Output Interfaces}, booktitle = {28th {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2008 Workshops), 17-20 June 2008, Beijing, China}, pages = {382--387}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDCS.Workshops.2008.87}, doi = {10.1109/ICDCS.WORKSHOPS.2008.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/SaxenaV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SaxenaU08, author = {Nitesh Saxena and Md. Borhan Uddin}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Automated Device Pairing for Asymmetric Pairing Scenarios}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {311--327}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_21}, doi = {10.1007/978-3-540-88625-9\_21}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/SaxenaU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/SaxenaUV08, author = {Nitesh Saxena and Md. Borhan Uddin and Jonathan Voris}, editor = {Lorrie Faith Cranor}, title = {Universal device pairing using an auxiliary device}, booktitle = {Proceedings of the 4th Symposium on Usable Privacy and Security, {SOUPS} 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008}, series = {{ACM} International Conference Proceeding Series}, pages = {56--67}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1408664.1408672}, doi = {10.1145/1408664.1408672}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/SaxenaUV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0812-4983, author = {Nitesh Saxena and Md. Borhan Uddin}, title = {Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes}, journal = {CoRR}, volume = {abs/0812.4983}, year = {2008}, url = {http://arxiv.org/abs/0812.4983}, eprinttype = {arXiv}, eprint = {0812.4983}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0812-4983.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CastellucciaSY07, author = {Claude Castelluccia and Nitesh Saxena and Jeong Hyun Yi}, title = {Robust self-keying mobile ad hoc networks}, journal = {Comput. Networks}, volume = {51}, number = {4}, pages = {1169--1182}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2006.07.009}, doi = {10.1016/J.COMNET.2006.07.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CastellucciaSY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SaxenaTY07, author = {Nitesh Saxena and Gene Tsudik and Jeong Hyun Yi}, title = {Threshold cryptography in {P2P} and MANETs: The case of access control}, journal = {Comput. Networks}, volume = {51}, number = {12}, pages = {3632--3649}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2007.03.001}, doi = {10.1016/J.COMNET.2007.03.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SaxenaTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Saxena06, author = {Nitesh Saxena}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Public Key Cryptography Sans Certificates in Ad Hoc Networks}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {375--389}, year = {2006}, url = {https://doi.org/10.1007/11767480\_26}, doi = {10.1007/11767480\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Saxena06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SaxenaEKA06, author = {Nitesh Saxena and Jan{-}Erik Ekberg and Kari Kostiainen and N. Asokan}, title = {Secure Device Pairing based on a Visual Channel (Short Paper)}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {306--313}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.35}, doi = {10.1109/SP.2006.35}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/SaxenaEKA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SaxenaEKA06, author = {Nitesh Saxena and Jan{-}Erik Ekberg and Kari Kostiainen and N. Asokan}, title = {Secure Device Pairing based on a Visual Channel}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2006}, url = {http://eprint.iacr.org/2006/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SaxenaEKA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/SaxenaTY05, author = {Nitesh Saxena and Gene Tsudik and Jeong Hyun Yi}, title = {Efficient Node Admission for Short-lived Mobile Ad Hoc Networks}, booktitle = {13th {IEEE} International Conference on Network Protocols {(ICNP} 2005), 6-9 November 2005, Boston, MA, {USA}}, pages = {269--278}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICNP.2005.14}, doi = {10.1109/ICNP.2005.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/SaxenaTY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/CastellucciaSY05, author = {Claude Castelluccia and Nitesh Saxena and Jeong Hyun Yi}, editor = {Raouf Boutaba and Kevin C. Almeroth and Ram{\'{o}}n Puigjaner and Sherman X. Shen and James P. Black}, title = {Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks}, booktitle = {{NETWORKING} 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International {IFIP-TC6} Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3462}, pages = {1083--1095}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11422778\_87}, doi = {10.1007/11422778\_87}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/CastellucciaSY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JareckiS05, author = {Stanislaw Jarecki and Nitesh Saxena}, editor = {Joe Kilian}, title = {Further Simplifications in Proactive {RSA} Signatures}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {510--528}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_28}, doi = {10.1007/978-3-540-30576-7\_28}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JareckiS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotp2p/SaxenaTY04, author = {Nitesh Saxena and Gene Tsudik and Jeong Hyun Yi}, title = {Access control in ad hoc groups}, booktitle = {International Workshop on Hot Topics in Peer-to-Peer Systems, {HOT-P2P} 2004, Volendam, The Netherlands, October 8, 2004}, pages = {2--7}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PTPSYS.2004.2}, doi = {10.1109/PTPSYS.2004.2}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotp2p/SaxenaTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SaxenaTY04, author = {Nitesh Saxena and Gene Tsudik and Jeong Hyun Yi}, editor = {Choonsik Park and Seongtaek Chee}, title = {Identity-Based Access Control for Ad Hoc Groups}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {362--379}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_27}, doi = {10.1007/11496618\_27}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SaxenaTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/JareckiSY04, author = {Stanislaw Jarecki and Nitesh Saxena and Jeong Hyun Yi}, editor = {Sanjeev Setia and Vipin Swarup}, title = {An attack on the proactive {RSA} signature scheme in the {URSA} ad hoc network access control protocol}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2004, Washington, DC, USA, October 25, 2004}, pages = {1--9}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029102.1029105}, doi = {10.1145/1029102.1029105}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/JareckiSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/SaxenaTY03, author = {Nitesh Saxena and Gene Tsudik and Jeong Hyun Yi}, editor = {Sanjeev Setia and Vipin Swarup}, title = {Admission control in Peer-to-Peer: design and performance evaluation}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003}, pages = {104--113}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986858.986873}, doi = {10.1145/986858.986873}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/SaxenaTY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.