Nitesh Saxena
Titolo
Citata da
Citata da
Anno
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
2462006
The pollution attack in p2p live video streaming: measurement results and defenses
P Dhungel, X Hei, KW Ross, N Saxena
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, 323-328, 2007
1632007
Estimating age privacy leakage in online social networks
R Dey, C Tang, K Ross, N Saxena
2012 proceedings ieee infocom, 2836-2840, 2012
1212012
Admission control in peer-to-peer: design and performance evaluation
N Saxena, G Tsudik, JH Yi
Proceedings of the 1st ACM workshop on Security of ad hoc and sensorá…, 2003
1212003
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
European Symposium on Research in Computer Security, 379-396, 2012
1062012
What’s in a name: A study of names, gender inference, and gender behavior in facebook
C Tang, K Ross, N Saxena, R Chen
International Conference on Database Systems for Advanced Applications, 344-356, 2011
1062011
A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
Pervasive and Mobile Computing 5 (6), 734-749, 2009
942009
Password-protected secret sharing
A Bagherzandi, S Jarecki, N Saxena, Y Lu
Proceedings of the 18th ACM conference on Computer and Communicationsá…, 2011
932011
Caveat eptor: A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
2009 IEEE International Conference on Pervasive Computing and Communicationsá…, 2009
932009
On the privacy of web search based on query obfuscation: A case study of trackmenot
ST Peddinti, N Saxena
International Symposium on Privacy Enhancing Technologies Symposium, 19-37, 2010
912010
A comparative usability evaluation of traditional password managers
A Karole, N Saxena, N Christin
International Conference on Information Security and Cryptology, 233-251, 2010
872010
The thalamus and brainstem act as key hubs in alterations of human brain network connectivity induced by mild propofol sedation
T Gili, N Saxena, A Diukova, K Murphy, JE Hall, RG Wise
Journal of Neuroscience 33 (9), 4024-4031, 2013
792013
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, N Saxena, T Xiang, Y Zhu
IEEE transactions on dependable and secure computing 10 (2), 57-69, 2012
792012
Identity-based access control for ad hoc groups
N Saxena, G Tsudik, JH Yi
International Conference on Information Security and Cryptology, 362-379, 2004
762004
Threshold cryptography in P2P and MANETs: The case of access control
N Saxena, G Tsudik, JH Yi
Computer Networks 51 (12), 3632-3649, 2007
742007
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
B Shrestha, N Saxena, HTT Truong, N Asokan
International Conference on Financial Cryptography and Data Security, 349-364, 2014
722014
Efficient device pairing using “human-comparable” synchronized audiovisual patterns
R Prasad, N Saxena
International Conference on Applied Cryptography and Network Security, 328-345, 2008
722008
Efficient node admission for short-lived mobile ad hoc networks
N Saxena, G Tsudik, JH Yi
13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
722005
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
2014 IEEE International Conference on Pervasive Computing and Communicationsá…, 2014
672014
Accelerometers and randomness: Perfect together
J Voris, N Saxena, T Halevi
Proceedings of the fourth ACM conference on Wireless network security, 115-126, 2011
592011
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20