Follow
Nitesh Saxena
Nitesh Saxena
Full Professor at the Texas A&M University
Verified email at tamu.edu - Homepage
Title
Cited by
Cited by
Year
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
2672006
The pollution attack in p2p live video streaming: measurement results and defenses
P Dhungel, X Hei, KW Ross, N Saxena
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, 323-328, 2007
1672007
What’s in a name: A study of names, gender inference, and gender behavior in facebook
C Tang, K Ross, N Saxena, R Chen
Database Systems for Adanced Applications: 16th International Conference …, 2011
1382011
Estimating age privacy leakage in online social networks
R Dey, C Tang, K Ross, N Saxena
2012 proceedings ieee infocom, 2836-2840, 2012
1352012
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1262012
Password-protected secret sharing
A Bagherzandi, S Jarecki, N Saxena, Y Lu
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
1262011
Admission control in peer-to-peer: design and performance evaluation
N Saxena, G Tsudik, JH Yi
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
1232003
A comparative usability evaluation of traditional password managers
A Karole, N Saxena, N Christin
Information Security and Cryptology-ICISC 2010: 13th International …, 2011
1122011
A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
Pervasive and Mobile Computing 5 (6), 734-749, 2009
1102009
On the privacy of web search based on query obfuscation: A case study of trackmenot
ST Peddinti, N Saxena
Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010
1092010
Caveat eptor: A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
992009
All your voices are belong to us: Stealing voices to fool humans and machines
D Mukhopadhyay, M Shirvanian, N Saxena
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
972015
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, AK Prasad, N Saxena, T Xiang
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
952012
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
B Shrestha, N Saxena, HTT Truong, N Asokan
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
892014
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
852014
Efficient device pairing using “human-comparable” synchronized audiovisual patterns
R Prasad, N Saxena
Applied Cryptography and Network Security: 6th International Conference …, 2008
782008
Identity-Based Access Control for Ad Hoc Groups.
N Saxena, G Tsudik, JH Yi
ICISC 4, 362-379, 2004
782004
Efficient node admission for short-lived mobile ad hoc networks
N Saxena, G Tsudik, JH Yi
13TH IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
772005
VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration
J Liu, C Wang, Y Chen, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
762017
Threshold cryptography in P2P and MANETs: The case of access control
N Saxena, G Tsudik, JH Yi
Computer Networks 51 (12), 3632-3649, 2007
742007
The system can't perform the operation now. Try again later.
Articles 1–20