Secure device pairing based on a visual channel N Saxena, JE Ekberg, K Kostiainen, N Asokan 2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006 | 272 | 2006 |
The pollution attack in p2p live video streaming: measurement results and defenses P Dhungel, X Hei, KW Ross, N Saxena Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, 323-328, 2007 | 183 | 2007 |
Password-protected secret sharing A Bagherzandi, S Jarecki, N Saxena, Y Lu Proceedings of the 18th ACM conference on Computer and Communications …, 2011 | 161 | 2011 |
What’s in a name: A study of names, gender inference, and gender behavior in facebook C Tang, K Ross, N Saxena, R Chen Database Systems for Adanced Applications: 16th International Conference …, 2011 | 153 | 2011 |
Estimating age privacy leakage in online social networks R Dey, C Tang, K Ross, N Saxena 2012 proceedings ieee infocom, 2836-2840, 2012 | 148 | 2012 |
Secure proximity detection for NFC devices based on ambient sensor data T Halevi, D Ma, N Saxena, T Xiang Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 139 | 2012 |
A comparative usability evaluation of traditional password managers A Karole, N Saxena, N Christin Information Security and Cryptology-ICISC 2010: 13th International …, 2011 | 129 | 2011 |
All your voices are belong to us: Stealing voices to fool humans and machines D Mukhopadhyay, M Shirvanian, N Saxena Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 122 | 2015 |
Admission control in peer-to-peer: design and performance evaluation N Saxena, G Tsudik, JH Yi Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 121 | 2003 |
A comparative study of secure device pairing methods A Kumar, N Saxena, G Tsudik, E Uzun Pervasive and Mobile Computing 5 (6), 734-749, 2009 | 118 | 2009 |
On the privacy of web search based on query obfuscation: A case study of trackmenot ST Peddinti, N Saxena Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010 | 117 | 2010 |
Speechless: Analyzing the threat to speech privacy from smartphone motion sensors SA Anand, N Saxena 2018 IEEE Symposium on Security and Privacy (SP), 1000-1017, 2018 | 108 | 2018 |
VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration J Liu, C Wang, Y Chen, N Saxena Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 107 | 2017 |
Caveat eptor: A comparative study of secure device pairing methods A Kumar, N Saxena, G Tsudik, E Uzun 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 102 | 2009 |
Location-aware and safer cards: enhancing RFID security and privacy via location sensing D Ma, AK Prasad, N Saxena, T Xiang Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 101 | 2012 |
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi 2014 IEEE International Conference on Pervasive Computing and Communications …, 2014 | 100 | 2014 |
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing B Shrestha, N Saxena, HTT Truong, N Asokan International Conference on Financial Cryptography and Data Security, 349-364, 2014 | 95 | 2014 |
Identity-based access control for ad hoc groups N Saxena, G Tsudik, JH Yi Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 82 | 2005 |
A three-way investigation of a game-captcha: automated attacks, relay attacks and usability M Mohamed, N Sachdeva, M Georgescu, S Gao, N Saxena, C Zhang, ... Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 80 | 2014 |
Efficient device pairing using “human-comparable” synchronized audiovisual patterns R Prasad, N Saxena Applied Cryptography and Network Security: 6th International Conference …, 2008 | 79 | 2008 |