Seguir
Nitesh Saxena
Nitesh Saxena
Full Professor at the Texas A&M University
Dirección de correo verificada de tamu.edu - Página principal
Título
Citado por
Citado por
Año
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
2702006
The pollution attack in p2p live video streaming: measurement results and defenses
P Dhungel, X Hei, KW Ross, N Saxena
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, 323-328, 2007
1812007
Password-protected secret sharing
A Bagherzandi, S Jarecki, N Saxena, Y Lu
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
1502011
What’s in a name: A study of names, gender inference, and gender behavior in facebook
C Tang, K Ross, N Saxena, R Chen
Database Systems for Adanced Applications: 16th International Conference …, 2011
1492011
Estimating age privacy leakage in online social networks
R Dey, C Tang, K Ross, N Saxena
2012 proceedings ieee infocom, 2836-2840, 2012
1452012
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1362012
A comparative usability evaluation of traditional password managers
A Karole, N Saxena, N Christin
Information Security and Cryptology-ICISC 2010: 13th International …, 2011
1252011
Admission control in peer-to-peer: design and performance evaluation
N Saxena, G Tsudik, JH Yi
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
1202003
All your voices are belong to us: Stealing voices to fool humans and machines
D Mukhopadhyay, M Shirvanian, N Saxena
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
1192015
On the privacy of web search based on query obfuscation: A case study of trackmenot
ST Peddinti, N Saxena
Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010
1162010
A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
Pervasive and Mobile Computing 5 (6), 734-749, 2009
1152009
Caveat eptor: A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
1022009
VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration
J Liu, C Wang, Y Chen, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1002017
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, AK Prasad, N Saxena, T Xiang
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
992012
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
982014
Speechless: Analyzing the threat to speech privacy from smartphone motion sensors
SA Anand, N Saxena
2018 IEEE Symposium on Security and Privacy (SP), 1000-1017, 2018
952018
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
B Shrestha, N Saxena, HTT Truong, N Asokan
International Conference on Financial Cryptography and Data Security, 349-364, 2014
942014
Identity-based access control for ad hoc groups
N Saxena, G Tsudik, JH Yi
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
812005
Efficient device pairing using “human-comparable” synchronized audiovisual patterns
R Prasad, N Saxena
Applied Cryptography and Network Security: 6th International Conference …, 2008
792008
Efficient node admission for short-lived mobile ad hoc networks
N Saxena, G Tsudik, JH Yi
13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
792005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20