default search action
Nitesh Saxena
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Zengrui Liu, Umar Iqbal, Nitesh Saxena:
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? Proc. Priv. Enhancing Technol. 2024(1): 280-299 (2024) - [j33]Prakash Shrestha, Ahmed Tanvir Mahdad, Nitesh Saxena:
Sound-based Two-factor Authentication: Vulnerabilities and Redesign. ACM Trans. Priv. Secur. 27(1): 5:1-5:27 (2024) - [c138]Mashari Alatawi, Nitesh Saxena:
Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal. CODASPY 2024: 277-288 - [c137]Zengrui Liu, Nitesh Saxena:
Dual Study of Canvas Fingerprinting Based Authentication: A Novel Spoofing Attack and the Countermeasure. ICDCS 2024: 1354-1364 - [c136]Anuradha Mandal, Cagri Arisoy, Nitesh Saxena:
News Reader: A News Interest Identification Attack Using Single-Electrode Brainwave Signals. ISC (2) 2024: 183-202 - [c135]Fei Zhao, Chengcui Zhang, Maya Shah, Nitesh Saxena:
BubbleSig: Same-Hand Ballot Stuffing Detection. MIPR 2024: 507-510 - [i36]Shalini Saini, Nitesh Saxena:
Privacy and Security of Women's Reproductive Health Apps in a Changing Legal Landscape. CoRR abs/2404.05876 (2024) - [i35]Jimmy Dani, Kalyan Nakka, Nitesh Saxena:
Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers. CoRR abs/2405.19683 (2024) - [i34]Kalyan Nakka, Jimmy Dani, Nitesh Saxena:
Is On-Device AI Broken and Exploitable? Assessing the Trust and Ethics in Small Language Models. CoRR abs/2406.05364 (2024) - [i33]Jimmy Dani, Brandon McCulloh, Nitesh Saxena:
When AI Defeats Password Deception! A Deep Learning Framework to Distinguish Passwords and Honeywords. CoRR abs/2407.16964 (2024) - [i32]Zengrui Liu, Jimmy Dani, Shujiang Wu, Yinzhi Cao, Nitesh Saxena:
Identified-and-Targeted: The First Early Evidence of the Privacy-Invasive Use of Browser Fingerprinting for Online Tracking. CoRR abs/2409.15656 (2024) - [i31]Jimmy Dani, Kalyan Nakka, Nitesh Saxena:
Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2024: 852 (2024) - 2023
- [j32]Shalini Saini, Nitesh Saxena:
A Survey of Threats to Research Literature-dependent Medical AI Solutions. ACM Comput. Surv. 55(14s): 315:1-315:26 (2023) - [j31]Prakash Shrestha, Hien Thi Thu Truong, Pupu Toivonen, Nitesh Saxena, Sasu Tarkoma, Petteri Nurmi:
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures. Pervasive Mob. Comput. 88: 101720 (2023) - [c134]Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen:
FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors. CCS 2023: 446-459 - [c133]Shalini Saini, Nitesh Saxena:
Speaker Anonymity and Voice Conversion Vulnerability: A Speaker Recognition Analysis. CNS 2023: 1-9 - [c132]Neetu Gupta, Arjun Singh, Nitesh Saxena, G. Ravivarman, P. Gajendran, Pallavi Deshpande:
Increasing Automotive Electrical Equipment Effectiveness with Enhanced Iron Loss Estimation Techniques. IC3I 2023: 2089-2092 - [c131]Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, Nitesh Saxena:
EmoLeak: Smartphone Motions Reveal Emotions. ICDCS 2023: 316-326 - [c130]Fei Zhao, Chengcui Zhang, Nitesh Saxena, Dan S. Wallach, AKM Shahariar Azad Rabby:
Ballot Tabulation Using Deep Learning. IRI 2023: 107-114 - [c129]Ahmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena:
Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices. MobiCom 2023: 59:1-59:15 - [c128]Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Nitesh Saxena, Yan Wang, Yingying Chen:
Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors. MobiHoc 2023: 308-309 - [c127]Tianfang Zhang, Cong Shi, Payton Walker, Zhengkun Ye, Yan Wang, Nitesh Saxena, Yingying Chen:
Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets. MobiSys 2023: 96-109 - [c126]Yi Wu, Cong Shi, Tianfang Zhang, Payton Walker, Jian Liu, Nitesh Saxena, Yingying Chen:
Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards. SP 2023: 3382-3398 - [c125]Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena:
Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! USENIX Security Symposium 2023: 859-876 - [c124]Ahmed Tanvir Mahdad, Nitesh Saxena:
SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal. WISEC 2023: 175-186 - [c123]Mashari Alatawi, Nitesh Saxena:
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems. WISEC 2023: 187-201 - [c122]Payton Walker, Tianfang Zhang, Cong Shi, Nitesh Saxena, Yingying Chen:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. WISEC 2023: 203-214 - [i30]Payton Walker, Tianfang Zhang, Cong Shi, Nitesh Saxena, Yingying Chen:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. CoRR abs/2302.02042 (2023) - [i29]Mashari Alatawi, Nitesh Saxena:
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. CoRR abs/2307.03426 (2023) - [i28]Mashari Alatawi, Nitesh Saxena:
VOICE-ZEUS: Impersonating Zoom's E2EE-Protected Static Media and Textual Communications via Simple Voice Manipulations. CoRR abs/2310.13894 (2023) - 2022
- [j30]Xin Yang, Song Yang, Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena:
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices. IEEE Trans. Mob. Comput. 21(10): 3565-3580 (2022) - [c121]Prakash Shrestha, Nitesh Saxena:
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication. ACNS 2022: 85-104 - [c120]Zengrui Liu, Prakash Shrestha, Nitesh Saxena:
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques. ACNS 2022: 147-169 - [c119]Payton Walker, Shalini Saini, S. Abhishek Anand, Tzipora Halevi, Nitesh Saxena:
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations. AsiaCCS 2022: 67-81 - [c118]Payton Walker, Nitesh Saxena:
Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space. EuroS&P 2022: 537-554 - [c117]Cong Shi, Tianming Zhao, Wenjin Zhang, Ahmed Tanvir Mahdad, Zhengkun Ye, Yan Wang, Nitesh Saxena, Yingying Chen:
Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds. ICDCS 2022: 680-690 - [c116]Mashari Alatawi, Nitesh Saxena:
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. ICISC 2022: 100-123 - [c115]Tianfang Zhang, Cong Shi, Tianming Zhao, Zhengkun Ye, Payton Walker, Nitesh Saxena, Yan Wang, Yingying Chen:
Personalized health monitoring via vital sign measurements leveraging motion sensors on AR/VR headsets. MobiSys 2022: 529-530 - [c114]Tianming Zhao, Zhengkun Ye, Tianfang Zhang, Cong Shi, Ahmed Tanvir Mahdad, Yan Wang, Yingying Chen, Nitesh Saxena:
Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets. MobiSys 2022: 589-590 - [c113]Cagri Arisoy, Anuradha Mandal, Nitesh Saxena:
Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility. PST 2022: 1-12 - [c112]Shalini Saini, Dhiral Panjwani, Nitesh Saxena:
Mobile Mental Health Apps: Alternative Intervention or Intrusion? PST 2022: 1-11 - [c111]Payton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, Guofei Gu:
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition. WISEC 2022: 119-124 - [c110]Anuradha Mandal, Nitesh Saxena:
SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices. WISEC 2022: 175-187 - [i27]Zengrui Liu, Umar Iqbal, Nitesh Saxena:
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? CoRR abs/2202.00885 (2022) - [i26]Shalini Saini, Nitesh Saxena:
Predatory Medicine: Exploring and Measuring the Vulnerability of Medical AI to Predatory Science. CoRR abs/2203.06245 (2022) - [i25]Shalini Saini, Dhiral Panjwani, Nitesh Saxena:
Mobile Mental Health Apps: Alternative Intervention or Intrusion? CoRR abs/2206.10728 (2022) - [i24]Cagri Arisoy, Anuradha Mandal, Nitesh Saxena:
Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility. CoRR abs/2207.08376 (2022) - [i23]Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, Nitesh Saxena:
EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers. CoRR abs/2212.12151 (2022) - 2021
- [j29]Cong Shi, Yan Wang, Yingying (Jennifer) Chen, Nitesh Saxena:
Authentication of Voice Commands by Leveraging Vibrations in Wearables. IEEE Secur. Priv. 19(6): 83-92 (2021) - [j28]Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 24(3): 17:1-17:37 (2021) - [c109]Payton Walker, Nitesh Saxena:
Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise. ACSAC 2021: 414-424 - [c108]S. Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen:
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech. AsiaCCS 2021: 67-81 - [c107]Yi Wu, Xiangyu Xu, Payton R. Walker, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks. AsiaCCS 2021: 82-94 - [c106]Mohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash:
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications. AsiaCCS 2021: 447-461 - [c105]Jay Prakash, Clarice Chua Qing Yu, Tanvi Ravindra Thombre, Andrei Bytes, Mohammed Jubur, Nitesh Saxena, Lucienne Blessing, Jianying Zhou, Tony Q. S. Quek:
Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations. EuroS&P 2021: 21-36 - [c104]Prakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha:
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. EuroS&P 2021: 71-87 - [c103]Ahmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena:
Analyzing the Security of OTP 2FA in the Face of Malicious Terminals. ICICS (1) 2021: 97-115 - [c102]Cong Shi, Xiangyu Xu, Tianfang Zhang, Payton Walker, Yi Wu, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors. MobiCom 2021: 478-490 - [c101]Maliheh Shirvanian, Christopher Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
A hidden-password online password manager. SAC 2021: 1683-1686 - [c100]Payton Walker, Nitesh Saxena:
SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors. WISEC 2021: 273-287 - [c99]S. Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen:
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. WISEC 2021: 288-299 - [i22]Kiavash Satvat, Maliheh Shirvanian, Nitesh Saxena:
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency. CoRR abs/2102.13607 (2021) - [i21]Zengrui Liu, Prakash Shrestha, Nitesh Saxena:
Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques. CoRR abs/2110.10129 (2021) - 2020
- [c98]Prakash Shrestha, Zengrui Liu, Nitesh Saxena:
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables. ACSAC 2020: 706-716 - [c97]Cong Shi, Yan Wang, Yingying Chen, Nitesh Saxena, Chen Wang:
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training. ACSAC 2020: 829-842 - [c96]Maliheh Shirvanian, Manar Mohamed, Nitesh Saxena, S. Abhishek Anand:
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks. ACSAC 2020: 870-883 - [c95]Kiavash Satvat, Maliheh Shirvanian, Mahshid Hosseini, Nitesh Saxena:
CREPE: A Privacy-Enhanced Crash Reporting System. CODASPY 2020: 295-306 - [c94]Prakash Shrestha, Nitesh Saxena:
Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables. WISEC 2020: 13-24 - [e3]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 335, Springer 2020, ISBN 978-3-030-63085-0 [contents] - [e2]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 336, Springer 2020, ISBN 978-3-030-63094-2 [contents] - [i20]Chen Wang, Cong Shi, Yingying Chen, Yan Wang, Nitesh Saxena:
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity. CoRR abs/2003.09083 (2020)
2010 – 2019
- 2019
- [j27]S. Abhishek Anand, Nitesh Saxena:
Noisy Vibrational Pairing of IoT Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 530-545 (2019) - [j26]Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. IEEE Trans. Dependable Secur. Comput. 16(5): 770-782 (2019) - [j25]Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang:
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures. IEEE Trans. Dependable Secur. Comput. 16(6): 1040-1053 (2019) - [j24]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Trans. Mob. Comput. 18(2): 444-457 (2019) - [c93]Chen Wang, S. Abhishek Anand, Jian Liu, Payton Walker, Yingying Chen, Nitesh Saxena:
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations. ACSAC 2019: 42-56 - [c92]Manar Mohamed, Prakash Shrestha, Nitesh Saxena:
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. ACSAC 2019: 355-365 - [c91]Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat:
CATCHA: When Cats Track Your Movements Online. ISPEC 2019: 172-193 - [c90]Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt:
The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection. NDSS 2019 - [c89]Maliheh Shirvanian, Summer Vo, Nitesh Saxena:
Quantifying the Breakability of Voice Assistants. PerCom 2019: 1-11 - [c88]S. Abhishek Anand, Payton Walker, Nitesh Saxena:
Compromising Speech Privacy under Continuous Masking in Personal Spaces. PST 2019: 1-10 - [c87]Ajaya Neupane, Kiavash Satvat, Mahshid Hosseini, Nitesh Saxena:
Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information. PST 2019: 1-10 - [c86]Maliheh Shirvanian, Nitesh Saxena:
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations. PST 2019: 1-10 - [c85]Babins Shrestha, Manar Mohamed, Nitesh Saxena:
ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics. PST 2019: 1-10 - [i19]S. Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen:
Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers. CoRR abs/1907.05972 (2019) - 2018
- [j23]Prakash Shrestha, Nitesh Saxena:
An Offensive and Defensive Exposition of Wearable Computing. ACM Comput. Surv. 50(6): 92:1-92:39 (2018) - [j22]Maliheh Shirvanian, Nitesh Saxena, Dibya Mukhopadhyay:
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines. J. Comput. Secur. 26(3): 311-333 (2018) - [c84]Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, Haley Johnson Bishop:
Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks. ACSAC 2018: 467-477 - [c83]Prakash Shrestha, Babins Shrestha, Nitesh Saxena:
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity. CNS 2018: 1-9 - [c82]S. Abhishek Anand, Nitesh Saxena:
Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses. CODASPY 2018: 103-110 - [c81]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. Public Key Cryptography (2) 2018: 431-461 - [c80]S. Abhishek Anand, Nitesh Saxena:
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. IEEE Symposium on Security and Privacy 2018: 1000-1017 - [c79]Prakash Shrestha, Nitesh Saxena:
Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks. WISEC 2018: 99-110 - [i18]Kiavash Satvat, Nitesh Saxena:
Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports. CoRR abs/1808.01718 (2018) - [i17]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. IACR Cryptol. ePrint Arch. 2018: 33 (2018) - [i16]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. IACR Cryptol. ePrint Arch. 2018: 695 (2018) - 2017
- [j21]Manar Mohamed, Song Gao, Niharika Sachdeva, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot:
On the security and usability of dynamic cognitive game CAPTCHAs. J. Comput. Secur. 25(3): 205-230 (2017) - [j20]Manar Mohamed, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. IEEE Trans. Inf. Forensics Secur. 12(4): 901-913 (2017) - [c78]Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. ACSAC 2017: 499-511 - [c77]Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena:
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration. CCS 2017: 73-87 - [c76]Maliheh Shirvanian, Nitesh Saxena:
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through. CCS 2017: 1329-1342 - [c75]Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena:
PEEP: Passively Eavesdropping Private Input via Brainwave Signals. Financial Cryptography 2017: 227-246 - [c74]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. ICDCS 2017: 1094-1104 - [c73]S. Abhishek Anand, Nitesh Saxena:
Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping. WISEC 2017: 173-183 - [c72]Prakash Shrestha, S. Abhishek Anand, Nitesh Saxena:
YELP: masking sound-based opportunistic attacks in zero-effort deauthentication. WISEC 2017: 195-206 - [c71]Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield:
Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study. WWW 2017: 1571-1580 - [i15]Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. CoRR abs/1707.05285 (2017) - 2016
- [j19]Jose Omar Maximo, Ajaya Neupane, Nitesh Saxena, Robert M. Joseph, Rajesh K. Kana:
Task-Dependent Changes in Frontal-Parietal Activation and Connectivity During Visual Search. Brain Connect. 6(4): 335-344 (2016) - [j18]Ajaya Neupane, Nitesh Saxena, Jose Omar Maximo, Rajesh K. Kana:
Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings. IEEE Trans. Inf. Forensics Secur. 11(9): 1970-1983 (2016) - [c70]Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena:
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics. ACSAC 2016: 265-276 - [c69]Manar Mohamed, Nitesh Saxena:
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games. ACSAC 2016: 277-288 - [c68]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. AsiaCCS 2016: 177-188 - [c67]Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena:
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio. CCS 2016: 908-919 - [c66]Manar Mohamed, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data. CODASPY 2016: 152-159 - [c65]S. Abhishek Anand, Nitesh Saxena:
A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds. Financial Cryptography 2016: 346-364 - [c64]Otto Huhta, Swapnil Udar, Mika Juuti, Prakash Shrestha, Nitesh Saxena, N. Asokan:
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. NDSS 2016 - [c63]Prakash Shrestha, Manar Mohamed, Nitesh Saxena:
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise. WISEC 2016: 67-77 - [c62]S. Abhishek Anand, Nitesh Saxena:
Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise. WISEC 2016: 103-108 - [i14]Babins Shrestha, Manar Mohamed, Nitesh Saxena:
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics. CoRR abs/1605.00766 (2016) - 2015
- [j17]Tzipora Halevi, Nitesh Saxena:
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios. Int. J. Inf. Sec. 14(5): 443-456 (2015) - [j16]Babins Shrestha, Di Ma, Yan Zhu, Haoyu Li, Nitesh Saxena:
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Trans. Inf. Forensics Secur. 10(11): 2270-2283 (2015) - [c61]Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang:
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks. ACSAC 2015: 11-20 - [c60]Maliheh Shirvanian, Nitesh Saxena:
On the Security and Usability of Crypto Phones. ACSAC 2015: 21-30 - [c59]S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena:
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals. CANS 2015: 95-110 - [c58]Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne M. Hirshfield:
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings. CCS 2015: 479-491 - [c57]Dibya Mukhopadhyay, Maliheh Shirvanian, Nitesh Saxena:
All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines. ESORICS (2) 2015: 599-621 - [c56]Babins Shrestha, Manar Mohamed, Anders Borg, Nitesh Saxena, Sandeep Tamrakar:
Curbing mobile malware based on user-transparent hand movements. PerCom 2015: 221-229 - [i13]Otto Huhta, Prakash Shrestha, Swapnil Udar, Nitesh Saxena, N. Asokan:
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication. CoRR abs/1505.05779 (2015) - [i12]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Contextual Proximity Detection in the Face of Context-Manipulating Adversaries. CoRR abs/1511.00905 (2015) - [i11]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. IACR Cryptol. ePrint Arch. 2015: 1099 (2015) - 2014
- [j15]Sai Teja Peddinti, Nitesh Saxena:
Web search query privacy: Evaluating query obfuscation and anonymizing networks. J. Comput. Secur. 22(1): 155-199 (2014) - [j14]Di Ma, Nitesh Saxena:
A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems. Secur. Commun. Networks 7(12): 2684-2695 (2014) - [c55]Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen:
A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability. AsiaCCS 2014: 195-206 - [c54]Maliheh Shirvanian, Nitesh Saxena:
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones. CCS 2014: 868-879 - [c53]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing. Financial Cryptography 2014: 349-364 - [c52]Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang:
Gaming the game: Defeating a game captcha with efficient and robust hybrid attacks. ICME 2014: 1-6 - [c51]Ajaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, Rajesh K. Kana:
Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings. NDSS 2014 - [c50]Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, Naveen Nathan:
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices. NDSS 2014 - [c49]Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan, Petteri Nurmi:
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication. PerCom 2014: 163-171 - [e1]Nitesh Saxena, Ahmad-Reza Sadeghi:
Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8651, Springer 2014, ISBN 978-3-319-13065-1 [contents] - 2013
- [j13]Di Ma, Nitesh Saxena, Tuo Xiang, Yan Zhu:
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing. IEEE Trans. Dependable Secur. Comput. 10(2): 57-69 (2013) - [j12]Tzipora Halevi, Haoyu Li, Di Ma, Nitesh Saxena, Jonathan Voris, Tuo Xiang:
Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks. IEEE Trans. Emerg. Top. Comput. 1(2): 307-318 (2013) - [j11]Tzipora Halevi, Nitesh Saxena:
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. IEEE Trans. Inf. Forensics Secur. 8(3): 563-577 (2013) - [c48]Niharika Sachdeva, Nitesh Saxena, Ponnurangam Kumaraguru:
On the viability of CAPTCHAs for use in telephony systems: a usability field study. APCHI 2013: 178-182 - [c47]Babins Shrestha, Nitesh Saxena, Justin Harrison:
Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture. CANS 2013: 199-217 - [c46]Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart:
Sensing-enabled channels for hard-to-detect command and control of mobile devices. AsiaCCS 2013: 469-480 - [c45]Alexander Gallego, Nitesh Saxena, Jonathan Voris:
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing. Financial Cryptography 2013: 60-68 - [c44]Niharika Sachdeva, Nitesh Saxena, Ponnurangam Kumaraguru:
On the Viability of CAPTCHAs for use in Telephony Systems: A Usability Field Study. ISC 2013: 261-279 - [c43]Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu:
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures. WISEC 2013: 25-30 - [i10]Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu:
Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using Intuitive Human Gestures. CoRR abs/1302.4010 (2013) - [i9]Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen:
Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability. CoRR abs/1310.1540 (2013) - 2012
- [j10]Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh Saxena, Dinko Begusic:
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User. IEEE Trans. Mob. Comput. 11(2): 337-351 (2012) - [c42]Tzipora Halevi, Nitesh Saxena:
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques. AsiaCCS 2012: 89-90 - [c41]Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang:
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. ESORICS 2012: 379-396 - [c40]Nitesh Saxena, Jonathan Voris:
Exploring Mobile Proxies for Better Password Authentication. ICICS 2012: 293-302 - [c39]Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena:
Estimating age privacy leakage in online social networks. INFOCOM 2012: 2836-2840 - [c38]Tzipora Halevi, Sein Lin, Di Ma, Anudath K. Prasad, Nitesh Saxena, Jonathan Voris, Tuo Xiang:
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model. PerCom 2012: 227-234 - [c37]Di Ma, Anudath K. Prasad, Nitesh Saxena, Tuo Xiang:
Location-aware and safer cards: enhancing RFID security and privacy via location sensing. WISEC 2012: 51-62 - 2011
- [j9]Nitesh Saxena, Jonathan Voris:
Data remanence effects on memory-based entropy collection for RFID systems. Int. J. Inf. Sec. 10(4): 213-222 (2011) - [j8]Tzipora Halevi, Nitesh Saxena, Shai Halevi:
Tree-based HB protocols for privacy-preserving authentication of RFID tags. J. Comput. Secur. 19(2): 343-363 (2011) - [j7]Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing Based on a Visual Channel: Design and Usability Study. IEEE Trans. Inf. Forensics Secur. 6(1): 28-38 (2011) - [c36]Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu:
Password-protected secret sharing. CCS 2011: 433-444 - [c35]Sai Teja Peddinti, Nitesh Saxena:
On the effectiveness of anonymizing networks for web search privacy. AsiaCCS 2011: 483-489 - [c34]Alexander Gallego, Nitesh Saxena, Jonathan Voris:
Playful security: A computer game for secure wireless device pairing. CGAMES 2011: 177-184 - [c33]Ersin Uzun, Nitesh Saxena, Arun Kumar:
Pairing devices for social interactions: a comparative usability evaluation. CHI 2011: 2315-2324 - [c32]Cong Tang, Keith W. Ross, Nitesh Saxena, Ruichuan Chen:
What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook. DASFAA Workshops 2011: 344-356 - [c31]Sai Teja Peddinti, Nitesh Saxena:
On the limitations of query obfuscation techniques for location privacy. UbiComp 2011: 187-196 - [c30]Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris, N. Asokan:
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags. PerCom 2011: 181-188 - [c29]Jonathan Voris, Nitesh Saxena, Tzipora Halevi:
Accelerometers and randomness: perfect together. WISEC 2011: 115-126 - [c28]Sai Teja Peddinti, Avis Dsouza, Nitesh Saxena:
Cover locations: availing location-based services without revealing the location. WPES 2011: 143-152 - 2010
- [j6]Stanislaw Jarecki, Nitesh Saxena:
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol. IEEE Trans. Inf. Forensics Secur. 5(4): 739-749 (2010) - [c27]Tzipora Halevi, Nitesh Saxena:
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping. CCS 2010: 97-108 - [c26]Toni Perkovic, Mario Cagalj, Nitesh Saxena:
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. Financial Cryptography 2010: 351-358 - [c25]Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ersin Uzun:
Groupthink: usability of secure group association for wireless devices. UbiComp 2010: 331-340 - [c24]Ambarish Karole, Nitesh Saxena, Nicolas Christin:
A Comparative Usability Evaluation of Traditional Password Managers. ICISC 2010: 233-251 - [c23]Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena, Keith W. Ross:
On the Privacy of Peer-Assisted Distribution of Security Patches. Peer-to-Peer Computing 2010: 1-10 - [c22]Sai Teja Peddinti, Nitesh Saxena:
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot. Privacy Enhancing Technologies 2010: 19-37 - [c21]Nitesh Saxena, Jonathan Voris:
Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model. RFIDSec 2010: 2-21 - [c20]Stanislaw Jarecki, Nitesh Saxena:
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. SCN 2010: 253-270 - [i8]Alexander Gallego, Nitesh Saxena, Jonathan Voris:
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing. CoRR abs/1005.0657 (2010) - [i7]Stanislaw Jarecki, Ali Bagherzandi, Nitesh Saxena, Yanbin Lu:
Password-Protected Secret Sharing. IACR Cryptol. ePrint Arch. 2010: 561 (2010) - [i6]Tzipora Halevi, Nitesh Saxena:
Eavesdropping over Random Passwords via Keyboard Acoustic Emanations. IACR Cryptol. ePrint Arch. 2010: 605 (2010)
2000 – 2009
- 2009
- [j5]Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun:
A comparative study of secure device pairing methods. Pervasive Mob. Comput. 5(6): 734-749 (2009) - [j4]Nitesh Saxena, Jeong Hyun Yi:
Noninteractive self-certification for long-lived mobile ad hoc networks. IEEE Trans. Inf. Forensics Secur. 4(4): 946-955 (2009) - [j3]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. IEEE Trans. Parallel Distributed Syst. 20(2): 158-170 (2009) - [c19]Nitesh Saxena, Md. Borhan Uddin:
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior. ACNS 2009: 34-52 - [c18]Nitesh Saxena, Md. Borhan Uddin:
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes. CANS 2009: 154-173 - [c17]Mario Cagalj, Nitesh Saxena, Ersin Uzun:
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. CANS 2009: 443-462 - [c16]Ambarish Karole, Nitesh Saxena:
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison. NBiS 2009: 273-278 - [c15]Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun:
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. PerCom 2009: 1-10 - [c14]Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris:
Treat 'em like other devices: user authentication of multiple personal RFID tags. SOUPS 2009 - [i5]Tzipora Halevi, Nitesh Saxena, Shai Halevi:
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population. CoRR abs/0907.1227 (2009) - [i4]Nitesh Saxena, Jonathan Voris:
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009). CoRR abs/0907.1256 (2009) - [i3]Arun Kumar, Nitesh Saxena, Ersin Uzun:
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting. CoRR abs/0907.4743 (2009) - 2008
- [c13]Ramnath Prasad, Nitesh Saxena:
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns. ACNS 2008: 328-345 - [c12]Nitesh Saxena, Jonathan Voris:
Pairing Devices with Good Quality Output Interfaces. ICDCS Workshops 2008: 382-387 - [c11]Nitesh Saxena, Md. Borhan Uddin:
Automated Device Pairing for Asymmetric Pairing Scenarios. ICICS 2008: 311-327 - [c10]Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris:
Universal device pairing using an auxiliary device. SOUPS 2008: 56-67 - [i2]Nitesh Saxena, Md. Borhan Uddin:
Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes. CoRR abs/0812.4983 (2008) - 2007
- [j2]Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi:
Robust self-keying mobile ad hoc networks. Comput. Networks 51(4): 1169-1182 (2007) - [j1]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Threshold cryptography in P2P and MANETs: The case of access control. Comput. Networks 51(12): 3632-3649 (2007) - 2006
- [c9]Nitesh Saxena:
Public Key Cryptography Sans Certificates in Ad Hoc Networks. ACNS 2006: 375-389 - [c8]Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing based on a Visual Channel (Short Paper). S&P 2006: 306-313 - [i1]Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing based on a Visual Channel. IACR Cryptol. ePrint Arch. 2006: 50 (2006) - 2005
- [c7]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. ICNP 2005: 269-278 - [c6]Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi:
Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. NETWORKING 2005: 1083-1095 - [c5]Stanislaw Jarecki, Nitesh Saxena:
Further Simplifications in Proactive RSA Signatures. TCC 2005: 510-528 - 2004
- [c4]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Access control in ad hoc groups. HOT-P2P 2004: 2-7 - [c3]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Identity-Based Access Control for Ad Hoc Groups. ICISC 2004: 362-379 - [c2]Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi:
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. SASN 2004: 1-9 - 2003
- [c1]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Admission control in Peer-to-Peer: design and performance evaluation. SASN 2003: 104-113
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint