Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tzipora Halevi
@article{DBLP:journals/fcomp/JairamHR22, author = {Avinash Jairam and Tzipora Halevi and Theodore Raphan}, title = {Improving Mobile Device Security by Embodying and Co-adapting a Behavioral Biometric Interface}, journal = {Frontiers Comput. Sci.}, volume = {4}, pages = {754716}, year = {2022}, url = {https://doi.org/10.3389/fcomp.2022.754716}, doi = {10.3389/FCOMP.2022.754716}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcomp/JairamHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/WalkerSAHS22, author = {Payton Walker and Shalini Saini and S. Abhishek Anand and Tzipora Halevi and Nitesh Saxena}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {67--81}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517399}, doi = {10.1145/3488932.3517399}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/WalkerSAHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/SharmaH22, author = {Vivek Sharma and Tzipora Halevi}, editor = {Constantine Stephanidis and Margherita Antona and Stavroula Ntoa and Gavriel Salvendy}, title = {A Survey on Phishing Website Detection Using Deep Neural Networks}, booktitle = {{HCI} International 2022 - Late Breaking Posters - 24th International Conference on Human-Computer Interaction, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1655}, pages = {684--694}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19682-9\_87}, doi = {10.1007/978-3-031-19682-9\_87}, timestamp = {Tue, 06 Dec 2022 10:18:32 +0100}, biburl = {https://dblp.org/rec/conf/hci/SharmaH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurGHIKSZ21, author = {Itai Dinur and Steven Goldfeder and Tzipora Halevi and Yuval Ishai and Mahimna Kelkar and Vivek Sharma and Greg Zaverucha}, editor = {Tal Malkin and Chris Peikert}, title = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {517--547}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_18}, doi = {10.1007/978-3-030-84259-8\_18}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurGHIKSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iticse/ScottSBCGHJMSTW21a, author = {Michael James Scott and Rory Summerley and Nicolas Besombes and Cornelia Connolly and Joey Gawrysiak and Tzipora Halevi and Seth Jenny and Michael Miljanovic and Melissa C. Stange and Toni Taipalus and J. Patrick Williams}, title = {Foundations for Esports Curricula in Higher Education}, booktitle = {Proceedings of the 2021 Working Group Reports on Innovation and Technology in Computer Science Education, ITiCSE-WGR 2021, Virtual Event Germany, 26 June 2021- 1 July 2021}, pages = {27--55}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3502870.3506566}, doi = {10.1145/3502870.3506566}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iticse/ScottSBCGHJMSTW21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iticse/ScottSBCGHJMSTW21, author = {Michael James Scott and Rory Summerley and Nicolas Besombes and Cornelia Connolly and Joey Gawrysiak and Tzipora Halevi and Seth Jenny and Michael Miljanovic and Melissa C. Stange and Toni Taipalus and J. Patrick Williams}, editor = {Carsten Schulte and Brett A. Becker and Monica Divitini and Erik Barendsen}, title = {Towards a Framework to Support the Design of Esports Curricula in Higher Education}, booktitle = {ITiCSE '21: Proceedings of the 26th {ACM} Conference on Innovation and Technology in Computer Science Education V.2, Virtual Event, Germany, June 26 - July 1, 2021}, pages = {599--600}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3456565.3461440}, doi = {10.1145/3456565.3461440}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iticse/ScottSBCGHJMSTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurGHIKSZ21, author = {Itai Dinur and Steven Goldfeder and Tzipora Halevi and Yuval Ishai and Mahimna Kelkar and Vivek Sharma and Greg Zaverucha}, title = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2021}, url = {https://eprint.iacr.org/2021/885}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurGHIKSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/BenhamoudaHH19, author = {Fabrice Benhamouda and Shai Halevi and Tzipora Halevi}, title = {Supporting private data on Hyperledger Fabric with secure multiparty computation}, journal = {{IBM} J. Res. Dev.}, volume = {63}, number = {2/3}, pages = {3:1--3:8}, year = {2019}, url = {https://doi.org/10.1147/JRD.2019.2913621}, doi = {10.1147/JRD.2019.2913621}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmrd/BenhamoudaHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BergamaschiHHH19, author = {Fl{\'{a}}vio Bergamaschi and Shai Halevi and Tzipora T. Halevi and Hamish Hunt}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Homomorphic Training of 30, 000 Logistic Regression Models}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {592--611}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_29}, doi = {10.1007/978-3-030-21568-2\_29}, timestamp = {Wed, 29 May 2019 12:25:55 +0200}, biburl = {https://dblp.org/rec/conf/acns/BergamaschiHHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/HaleviBCHJMZ19, author = {Tzipora Halevi and Fabrice Benhamouda and Angelo De Caro and Shai Halevi and Charanjit S. Jutla and Yacov Manevich and Qi Zhang}, title = {Initial Public Offering {(IPO)} on Permissioned Blockchain Using Secure Multiparty Computation}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {91--98}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00021}, doi = {10.1109/BLOCKCHAIN.2019.00021}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/HaleviBCHJMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/BaronH19, author = {Lior Baron and Tzipora Halevi}, editor = {Constantine Stephanidis}, title = {Feasibility Assessment of Cloud SaaS Enabled Collaboration and Information Confidentiality for the Public Accounting Industry}, booktitle = {{HCI} International 2019 - Late Breaking Papers - 21st {HCI} International Conference, {HCII} 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11786}, pages = {451--467}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30033-3\_35}, doi = {10.1007/978-3-030-30033-3\_35}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/BaronH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BergamaschiHHH19, author = {Fl{\'{a}}vio Bergamaschi and Shai Halevi and Tzipora Halevi and Hamish Hunt}, title = {Homomorphic Training of 30, 000 Logistic Regression Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2019}, url = {https://eprint.iacr.org/2019/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BergamaschiHHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/BenhamoudaHH18, author = {Fabrice Benhamouda and Shai Halevi and Tzipora Halevi}, editor = {Abhishek Chandra and Jie Li and Ying Cai and Tian Guo}, title = {Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation}, booktitle = {2018 {IEEE} International Conference on Cloud Engineering, {IC2E} 2018, Orlando, FL, USA, April 17-20, 2018}, pages = {357--363}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/IC2E.2018.00069}, doi = {10.1109/IC2E.2018.00069}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/BenhamoudaHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmm/HaleviMLKADAC17, author = {Tzipora Halevi and Nasir D. Memon and James Levis and Ponnurangam Kumaraguru and Sumit Arora and Nikita Dagar and Fadi A. Aloul and Jay Chen}, title = {Cultural and Psychological Factors in Cyber-Security}, journal = {J. Mobile Multimedia}, volume = {13}, number = {1{\&}2}, pages = {43--56}, year = {2017}, url = {http://www.rintonpress.com/xjmm13/jmm-13-12/043-056.pdf}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmm/HaleviMLKADAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviHSS17, author = {Shai Halevi and Tzipora Halevi and Victor Shoup and Noah Stephens{-}Davidowitz}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Implementing BP-Obfuscation Using Graph-Induced Encoding}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {783--798}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133976}, doi = {10.1145/3133956.3133976}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HaleviHSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-08305, author = {Aditi Roy and Tzipora Halevi and Nasir D. Memon}, title = {An HMM-based Multi-sensor Approach for Continuous Mobile Authentication}, journal = {CoRR}, volume = {abs/1712.08305}, year = {2017}, url = {http://arxiv.org/abs/1712.08305}, eprinttype = {arXiv}, eprint = {1712.08305}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-08305.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-08307, author = {Aditi Roy and Tzipora Halevi and Nasir D. Memon}, title = {An HMM-based behavior modeling approach for continuous mobile authentication}, journal = {CoRR}, volume = {abs/1712.08307}, year = {2017}, url = {http://arxiv.org/abs/1712.08307}, eprinttype = {arXiv}, eprint = {1712.08307}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-08307.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviHSS17, author = {Shai Halevi and Tzipora Halevi and Victor Shoup and Noah Stephens{-}Davidowitz}, title = {Implementing BP-Obfuscation Using Graph-Induced Encoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2017}, url = {http://eprint.iacr.org/2017/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviHSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/HaleviMLKADAC16, author = {Tzipora Halevi and Nasir D. Memon and James Lewis and Ponnurangam Kumaraguru and Sumit Arora and Nikita Dagar and Fadi A. Aloul and Jay Chen}, editor = {Gabriele Anderst{-}Kotsis}, title = {Cultural and psychological factors in cyber-security}, booktitle = {Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2016, Singapore, November 28-30, 2016}, pages = {318--324}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3011141.3011165}, doi = {10.1145/3011141.3011165}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiwas/HaleviMLKADAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BashirLGMH15, author = {Masooda N. Bashir and April Lambert and Boyi Guo and Nasir D. Memon and Tzipora Halevi}, title = {Cybersecurity Competitions: The Human Angle}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {5}, pages = {74--79}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.100}, doi = {10.1109/MSP.2015.100}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BashirLGMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HaleviS15, author = {Tzipora Halevi and Nitesh Saxena}, title = {Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {443--456}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0264-7}, doi = {10.1007/S10207-014-0264-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HaleviS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChanHM15, author = {Pan Chan and Tzipora Halevi and Nasir D. Memon}, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {Glass {OTP:} Secure and Convenient User Authentication on Google Glass}, booktitle = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, pages = {298--308}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48051-9\_22}, doi = {10.1007/978-3-662-48051-9\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ChanHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ChanHM15, author = {Alexander Chan and Tzipora Halevi and Nasir D. Memon}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {Leap Motion Controller for Authentication via Hand Geometry and Gestures}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Third International Conference, {HAS} 2015, Held as Part of {HCI} International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9190}, pages = {13--22}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20376-8\_2}, doi = {10.1007/978-3-319-20376-8\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hci/ChanHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/HaleviKCM15, author = {Tzipora Halevi and Trishank Karthik Kuppusamy and Meghan Caiazzo and Nasir D. Memon}, title = {Investigating users' readiness to trade-off biometric fingerprint data}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126366}, doi = {10.1109/ISBA.2015.7126366}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/HaleviKCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/RoyHM15, author = {Aditi Roy and Tzipora Halevi and Nasir D. Memon}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {An HMM-based multi-sensor approach for continuous mobile authentication}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {1311--1316}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357626}, doi = {10.1109/MILCOM.2015.7357626}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/milcom/RoyHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/ChanHM14, author = {Alexander Chan and Tzipora Halevi and Nasir D. Memon}, editor = {Bart De Decker and Andr{\'{e}} Z{\'{u}}quete}, title = {Touchpad Input for Continuous Biometric Authentication}, booktitle = {Communications and Multimedia Security - 15th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8735}, pages = {86--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44885-4\_7}, doi = {10.1007/978-3-662-44885-4\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/ChanHM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/RoyHM14, author = {Aditi Roy and Tzipora Halevi and Nasir D. Memon}, title = {An HMM-based behavior modeling approach for continuous mobile authentication}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2014, Florence, Italy, May 4-9, 2014}, pages = {3789--3793}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICASSP.2014.6854310}, doi = {10.1109/ICASSP.2014.6854310}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/RoyHM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/HaleviLMSVX13, author = {Tzipora Halevi and Haoyu Li and Di Ma and Nitesh Saxena and Jonathan Voris and Tuo Xiang}, title = {Context-Aware Defenses to {RFID} Unauthorized Reading and Relay Attacks}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {1}, number = {2}, pages = {307--318}, year = {2013}, url = {https://doi.org/10.1109/TETC.2013.2290537}, doi = {10.1109/TETC.2013.2290537}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/HaleviLMSVX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HaleviS13, author = {Tzipora Halevi and Nitesh Saxena}, title = {Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {3}, pages = {563--577}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2247758}, doi = {10.1109/TIFS.2013.2247758}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HaleviS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HasanSHZR13, author = {Ragib Hasan and Nitesh Saxena and Tzipora Halevi and Shams Zawoad and Dustin Rinehart}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Sensing-enabled channels for hard-to-detect command and control of mobile devices}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {469--480}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484373}, doi = {10.1145/2484313.2484373}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HasanSHZR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/HaleviLM13, author = {Tzipora Halevi and James Lewis and Nasir D. Memon}, editor = {Leslie Carr and Alberto H. F. Laender and Bernadette Farias L{\'{o}}scio and Irwin King and Marcus Fontoura and Denny Vrandecic and Lora Aroyo and Jos{\'{e}} Palazzo M. de Oliveira and Fernanda Lima and Erik Wilde}, title = {A pilot study of cyber security and privacy related behavior and personality traits}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013, Companion Volume}, pages = {737--744}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487788.2488034}, doi = {10.1145/2487788.2488034}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/HaleviLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-7643, author = {Tzipora Halevi and Jim Lewis and Nasir D. Memon}, title = {Phishing, Personality Traits and Facebook}, journal = {CoRR}, volume = {abs/1301.7643}, year = {2013}, url = {http://arxiv.org/abs/1301.7643}, eprinttype = {arXiv}, eprint = {1301.7643}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-7643.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviS12, author = {Tzipora Halevi and Nitesh Saxena}, editor = {Heung Youl Youm and Yoojae Won}, title = {A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {89--90}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414509}, doi = {10.1145/2414456.2414509}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaleviS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HaleviMSX12, author = {Tzipora Halevi and Di Ma and Nitesh Saxena and Tuo Xiang}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Secure Proximity Detection for {NFC} Devices Based on Ambient Sensor Data}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {379--396}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_22}, doi = {10.1007/978-3-642-33167-1\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HaleviMSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/HaleviLMPSVX12, author = {Tzipora Halevi and Sein Lin and Di Ma and Anudath K. Prasad and Nitesh Saxena and Jonathan Voris and Tuo Xiang}, editor = {Silvia Giordano and Marc Langheinrich and Albrecht Schmidt}, title = {Sensing-enabled defenses to {RFID} unauthorized reading and relay attacks without changing the usage model}, booktitle = {2012 {IEEE} International Conference on Pervasive Computing and Communications, Lugano, Switzerland, March 19-23, 2012}, pages = {227--234}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerCom.2012.6199835}, doi = {10.1109/PERCOM.2012.6199835}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/HaleviLMPSVX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HaleviSH11, author = {Tzipora Halevi and Nitesh Saxena and Shai Halevi}, title = {Tree-based {HB} protocols for privacy-preserving authentication of {RFID} tags}, journal = {J. Comput. Secur.}, volume = {19}, number = {2}, pages = {343--363}, year = {2011}, url = {https://doi.org/10.3233/JCS-2010-0404}, doi = {10.3233/JCS-2010-0404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HaleviSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/VorisSH11, author = {Jonathan Voris and Nitesh Saxena and Tzipora Halevi}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Accelerometers and randomness: perfect together}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {115--126}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998433}, doi = {10.1145/1998412.1998433}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/VorisSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviS10, author = {Tzipora Halevi and Nitesh Saxena}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {97--108}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866319}, doi = {10.1145/1866307.1866319}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaleviS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviS10, author = {Tzipora Halevi and Nitesh Saxena}, title = {Eavesdropping over Random Passwords via Keyboard Acoustic Emanations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2010}, url = {http://eprint.iacr.org/2010/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-1227, author = {Tzipora Halevi and Nitesh Saxena and Shai Halevi}, title = {Using {HB} Family of Protocols for Privacy-Preserving Authentication of {RFID} Tags in a Population}, journal = {CoRR}, volume = {abs/0907.1227}, year = {2009}, url = {http://arxiv.org/abs/0907.1227}, eprinttype = {arXiv}, eprint = {0907.1227}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-1227.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.