Nitesh Saxena
Nitesh Saxena
Bestätigte E-Mail-Adresse bei uab.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
2482006
The pollution attack in p2p live video streaming: measurement results and defenses
P Dhungel, X Hei, KW Ross, N Saxena
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, 323-328, 2007
1632007
Estimating age privacy leakage in online social networks
R Dey, C Tang, K Ross, N Saxena
2012 proceedings ieee infocom, 2836-2840, 2012
1242012
Admission control in peer-to-peer: design and performance evaluation
N Saxena, G Tsudik, JH Yi
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
1212003
What’s in a name: A study of names, gender inference, and gender behavior in facebook
C Tang, K Ross, N Saxena, R Chen
International Conference on Database Systems for Advanced Applications, 344-356, 2011
1072011
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
European Symposium on Research in Computer Security, 379-396, 2012
1062012
Password-protected secret sharing
A Bagherzandi, S Jarecki, N Saxena, Y Lu
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
982011
A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
Pervasive and Mobile Computing 5 (6), 734-749, 2009
962009
On the privacy of web search based on query obfuscation: A case study of trackmenot
ST Peddinti, N Saxena
International Symposium on Privacy Enhancing Technologies Symposium, 19-37, 2010
932010
Caveat eptor: A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
932009
A comparative usability evaluation of traditional password managers
A Karole, N Saxena, N Christin
International Conference on Information Security and Cryptology, 233-251, 2010
872010
The thalamus and brainstem act as key hubs in alterations of human brain network connectivity induced by mild propofol sedation
T Gili, N Saxena, A Diukova, K Murphy, JE Hall, RG Wise
Journal of Neuroscience 33 (9), 4024-4031, 2013
832013
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, N Saxena, T Xiang, Y Zhu
IEEE transactions on dependable and secure computing 10 (2), 57-69, 2012
822012
Identity-based access control for ad hoc groups
N Saxena, G Tsudik, JH Yi
International Conference on Information Security and Cryptology, 362-379, 2004
782004
Threshold cryptography in P2P and MANETs: The case of access control
N Saxena, G Tsudik, JH Yi
Computer Networks 51 (12), 3632-3649, 2007
742007
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
B Shrestha, N Saxena, HTT Truong, N Asokan
International Conference on Financial Cryptography and Data Security, 349-364, 2014
732014
Efficient device pairing using “human-comparable” synchronized audiovisual patterns
R Prasad, N Saxena
International Conference on Applied Cryptography and Network Security, 328-345, 2008
732008
Efficient node admission for short-lived mobile ad hoc networks
N Saxena, G Tsudik, JH Yi
13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
722005
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
682014
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
S Jarecki, N Saxena, JH Yi
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor …, 2004
602004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20