Secure device pairing based on a visual channel N Saxena, JE Ekberg, K Kostiainen, N Asokan 2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006 | 246 | 2006 |
The pollution attack in p2p live video streaming: measurement results and defenses P Dhungel, X Hei, KW Ross, N Saxena Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, 323-328, 2007 | 163 | 2007 |
Estimating age privacy leakage in online social networks R Dey, C Tang, K Ross, N Saxena 2012 proceedings ieee infocom, 2836-2840, 2012 | 121 | 2012 |
Admission control in peer-to-peer: design and performance evaluation N Saxena, G Tsudik, JH Yi Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 121 | 2003 |
Secure proximity detection for NFC devices based on ambient sensor data T Halevi, D Ma, N Saxena, T Xiang European Symposium on Research in Computer Security, 379-396, 2012 | 106 | 2012 |
What’s in a name: A study of names, gender inference, and gender behavior in facebook C Tang, K Ross, N Saxena, R Chen International Conference on Database Systems for Advanced Applications, 344-356, 2011 | 106 | 2011 |
A comparative study of secure device pairing methods A Kumar, N Saxena, G Tsudik, E Uzun Pervasive and Mobile Computing 5 (6), 734-749, 2009 | 94 | 2009 |
Password-protected secret sharing A Bagherzandi, S Jarecki, N Saxena, Y Lu Proceedings of the 18th ACM conference on Computer and Communications …, 2011 | 93 | 2011 |
Caveat eptor: A comparative study of secure device pairing methods A Kumar, N Saxena, G Tsudik, E Uzun 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 93 | 2009 |
On the privacy of web search based on query obfuscation: A case study of trackmenot ST Peddinti, N Saxena International Symposium on Privacy Enhancing Technologies Symposium, 19-37, 2010 | 91 | 2010 |
A comparative usability evaluation of traditional password managers A Karole, N Saxena, N Christin International Conference on Information Security and Cryptology, 233-251, 2010 | 87 | 2010 |
The thalamus and brainstem act as key hubs in alterations of human brain network connectivity induced by mild propofol sedation T Gili, N Saxena, A Diukova, K Murphy, JE Hall, RG Wise Journal of Neuroscience 33 (9), 4024-4031, 2013 | 79 | 2013 |
Location-aware and safer cards: enhancing RFID security and privacy via location sensing D Ma, N Saxena, T Xiang, Y Zhu IEEE transactions on dependable and secure computing 10 (2), 57-69, 2012 | 79 | 2012 |
Identity-based access control for ad hoc groups N Saxena, G Tsudik, JH Yi International Conference on Information Security and Cryptology, 362-379, 2004 | 76 | 2004 |
Threshold cryptography in P2P and MANETs: The case of access control N Saxena, G Tsudik, JH Yi Computer Networks 51 (12), 3632-3649, 2007 | 74 | 2007 |
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing B Shrestha, N Saxena, HTT Truong, N Asokan International Conference on Financial Cryptography and Data Security, 349-364, 2014 | 72 | 2014 |
Efficient device pairing using “human-comparable” synchronized audiovisual patterns R Prasad, N Saxena International Conference on Applied Cryptography and Network Security, 328-345, 2008 | 72 | 2008 |
Efficient node admission for short-lived mobile ad hoc networks N Saxena, G Tsudik, JH Yi 13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005 | 72 | 2005 |
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi 2014 IEEE International Conference on Pervasive Computing and Communications …, 2014 | 67 | 2014 |
Accelerometers and randomness: Perfect together J Voris, N Saxena, T Halevi Proceedings of the fourth ACM conference on Wireless network security, 115-126, 2011 | 59 | 2011 |