Tzipora Halevi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j7]Fabrice Benhamouda, Shai Halevi
, Tzipora Halevi:
Supporting private data on Hyperledger Fabric with secure multiparty computation. IBM Journal of Research and Development 63(2/3): 3:1-3:8 (2019) - [c18]Flávio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. ACNS 2019: 592-611 - [c17]Lior Baron
, Tzipora Halevi
:
Feasibility Assessment of Cloud SaaS Enabled Collaboration and Information Confidentiality for the Public Accounting Industry. HCI (LBP) 2019: 451-467 - [i7]Flávio Bergamaschi, Shai Halevi, Tzipora Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. IACR Cryptology ePrint Archive 2019: 425 (2019) - 2018
- [c16]Fabrice Benhamouda
, Shai Halevi, Tzipora Halevi:
Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation. IC2E 2018: 357-363 - 2017
- [j6]Tzipora Halevi, Nasir D. Memon, James Levis, Ponnurangam Kumaraguru, Sumit Arora, Nikita Dagar, Fadi A. Aloul, Jay Chen:
Cultural and Psychological Factors in Cyber-Security. J. Mobile Multimedia 13(1&2): 43-56 (2017) - [c15]Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz:
Implementing BP-Obfuscation Using Graph-Induced Encoding. ACM Conference on Computer and Communications Security 2017: 783-798 - [i6]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based Multi-sensor Approach for Continuous Mobile Authentication. CoRR abs/1712.08305 (2017) - [i5]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based behavior modeling approach for continuous mobile authentication. CoRR abs/1712.08307 (2017) - [i4]Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz:
Implementing BP-Obfuscation Using Graph-Induced Encoding. IACR Cryptology ePrint Archive 2017: 104 (2017) - 2016
- [c14]Tzipora Halevi, Nasir D. Memon, James Lewis, Ponnurangam Kumaraguru, Sumit Arora, Nikita Dagar, Fadi A. Aloul, Jay Chen:
Cultural and psychological factors in cyber-security. iiWAS 2016: 318-324 - 2015
- [j5]Masooda Bashir, April Lambert, Boyi Guo, Nasir D. Memon, Tzipora Halevi:
Cybersecurity Competitions: The Human Angle. IEEE Security & Privacy 13(5): 74-79 (2015) - [j4]Tzipora Halevi, Nitesh Saxena:
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios. Int. J. Inf. Sec. 14(5): 443-456 (2015) - [c13]Pan Chan, Tzipora Halevi, Nasir D. Memon:
Glass OTP: Secure and Convenient User Authentication on Google Glass. Financial Cryptography Workshops 2015: 298-308 - [c12]Alexander Chan, Tzipora Halevi, Nasir D. Memon:
Leap Motion Controller for Authentication via Hand Geometry and Gestures. HCI (22) 2015: 13-22 - [c11]Tzipora Halevi, Trishank Karthik Kuppusamy, Meghan Caiazzo, Nasir D. Memon:
Investigating users' readiness to trade-off biometric fingerprint data. ISBA 2015: 1-8 - [c10]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based multi-sensor approach for continuous mobile authentication. MILCOM 2015: 1311-1316 - 2014
- [c9]Alexander Chan, Tzipora Halevi, Nasir D. Memon:
Touchpad Input for Continuous Biometric Authentication. Communications and Multimedia Security 2014: 86-91 - [c8]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based behavior modeling approach for continuous mobile authentication. ICASSP 2014: 3789-3793 - 2013
- [j3]Tzipora Halevi, Haoyu Li, Di Ma, Nitesh Saxena, Jonathan Voris, Tuo Xiang:
Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks. IEEE Trans. Emerging Topics Comput. 1(2): 307-318 (2013) - [j2]Tzipora Halevi, Nitesh Saxena:
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. IEEE Trans. Information Forensics and Security 8(3): 563-577 (2013) - [c7]Ragib Hasan
, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart:
Sensing-enabled channels for hard-to-detect command and control of mobile devices. AsiaCCS 2013: 469-480 - [c6]Tzipora Halevi, James Lewis, Nasir D. Memon:
A pilot study of cyber security and privacy related behavior and personality traits. WWW (Companion Volume) 2013: 737-744 - [i3]Tzipora Halevi, Jim Lewis, Nasir D. Memon:
Phishing, Personality Traits and Facebook. CoRR abs/1301.7643 (2013) - 2012
- [c5]Tzipora Halevi, Nitesh Saxena:
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques. AsiaCCS 2012: 89-90 - [c4]Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang:
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. ESORICS 2012: 379-396 - [c3]Tzipora Halevi, Sein Lin, Di Ma, Anudath K. Prasad, Nitesh Saxena, Jonathan Voris, Tuo Xiang:
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model. PerCom 2012: 227-234 - 2011
- [j1]Tzipora Halevi, Nitesh Saxena, Shai Halevi:
Tree-based HB protocols for privacy-preserving authentication of RFID tags. Journal of Computer Security 19(2): 343-363 (2011) - [c2]Jonathan Voris, Nitesh Saxena, Tzipora Halevi:
Accelerometers and randomness: perfect together. WISEC 2011: 115-126 - 2010
- [c1]Tzipora Halevi, Nitesh Saxena:
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping. ACM Conference on Computer and Communications Security 2010: 97-108 - [i2]Tzipora Halevi, Nitesh Saxena:
Eavesdropping over Random Passwords via Keyboard Acoustic Emanations. IACR Cryptology ePrint Archive 2010: 605 (2010)
2000 – 2009
- 2009
- [i1]Tzipora Halevi, Nitesh Saxena, Shai Halevi:
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population. CoRR abs/0907.1227 (2009)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-10-02 03:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint