Nitesh Saxena
Title
Cited by
Cited by
Year
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
2522006
The pollution attack in P2P live video streaming: measurement results and defenses
P Dhungel, X Hei, KW Ross, N Saxena
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, 323-328, 2007
1602007
Estimating age privacy leakage in online social networks
R Dey, C Tang, K Ross, N Saxena
2012 proceedings ieee infocom, 2836-2840, 2012
1182012
Admission control in peer-to-peer: design and performance evaluation
N Saxena, G Tsudik, JH Yi
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
1162003
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
European Symposium on Research in Computer Security, 379-396, 2012
1042012
What’s in a name: A study of names, gender inference, and gender behavior in facebook
C Tang, K Ross, N Saxena, R Chen
International Conference on Database Systems for Advanced Applications, 344-356, 2011
972011
Caveat eptor: A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
932009
A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
Pervasive and Mobile Computing 5 (6), 734-749, 2009
892009
Password-protected secret sharing
A Bagherzandi, S Jarecki, N Saxena, Y Lu
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
862011
A comparative usability evaluation of traditional password managers
A Karole, N Saxena, N Christin
International Conference on Information Security and Cryptology, 233-251, 2010
852010
On the privacy of web search based on query obfuscation: a case study of TrackMeNot
ST Peddinti, N Saxena
International Symposium on Privacy Enhancing Technologies Symposium, 19-37, 2010
842010
The thalamus and brainstem act as key hubs in alterations of human brain network connectivity induced by mild propofol sedation
T Gili, N Saxena, A Diukova, K Murphy, JE Hall, RG Wise
Journal of Neuroscience 33 (9), 4024-4031, 2013
792013
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, N Saxena, T Xiang, Y Zhu
IEEE transactions on dependable and secure computing 10 (2), 57-69, 2012
772012
Identity-based access control for ad hoc groups
N Saxena, G Tsudik, JH Yi
International Conference on Information Security and Cryptology, 362-379, 2004
742004
Efficient node admission for short-lived mobile ad hoc networks
N Saxena, G Tsudik, JH Yi
13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
732005
Threshold cryptography in P2P and MANETs: The case of access control
N Saxena, G Tsudik, JH Yi
Computer Networks 51 (12), 3632-3649, 2007
722007
Efficient device pairing using “human-comparable” synchronized audiovisual patterns
R Prasad, N Saxena
International Conference on Applied Cryptography and Network Security, 328-345, 2008
702008
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
B Shrestha, N Saxena, HTT Truong, N Asokan
International Conference on Financial Cryptography and Data Security, 349-364, 2014
682014
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
642014
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
S Jarecki, N Saxena, JH Yi
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
612004
The system can't perform the operation now. Try again later.
Articles 1–20