BibTeX records: Tzipora Halevi

download as .bib file

@article{DBLP:journals/fcomp/JairamHR22,
  author       = {Avinash Jairam and
                  Tzipora Halevi and
                  Theodore Raphan},
  title        = {Improving Mobile Device Security by Embodying and Co-adapting a Behavioral
                  Biometric Interface},
  journal      = {Frontiers Comput. Sci.},
  volume       = {4},
  pages        = {754716},
  year         = {2022},
  url          = {https://doi.org/10.3389/fcomp.2022.754716},
  doi          = {10.3389/FCOMP.2022.754716},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcomp/JairamHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/WalkerSAHS22,
  author       = {Payton Walker and
                  Shalini Saini and
                  S. Abhishek Anand and
                  Tzipora Halevi and
                  Nitesh Saxena},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential
                  for Hard Disk Drives to Eavesdrop Speech Vibrations},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {67--81},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517399},
  doi          = {10.1145/3488932.3517399},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/WalkerSAHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/SharmaH22,
  author       = {Vivek Sharma and
                  Tzipora Halevi},
  editor       = {Constantine Stephanidis and
                  Margherita Antona and
                  Stavroula Ntoa and
                  Gavriel Salvendy},
  title        = {A Survey on Phishing Website Detection Using Deep Neural Networks},
  booktitle    = {{HCI} International 2022 - Late Breaking Posters - 24th International
                  Conference on Human-Computer Interaction, {HCII} 2022, Virtual Event,
                  June 26 - July 1, 2022, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {1655},
  pages        = {684--694},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-19682-9\_87},
  doi          = {10.1007/978-3-031-19682-9\_87},
  timestamp    = {Tue, 06 Dec 2022 10:18:32 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/SharmaH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurGHIKSZ21,
  author       = {Itai Dinur and
                  Steven Goldfeder and
                  Tzipora Halevi and
                  Yuval Ishai and
                  Mahimna Kelkar and
                  Vivek Sharma and
                  Greg Zaverucha},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates,
                  Protocols, and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {517--547},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_18},
  doi          = {10.1007/978-3-030-84259-8\_18},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurGHIKSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/ScottSBCGHJMSTW21a,
  author       = {Michael James Scott and
                  Rory Summerley and
                  Nicolas Besombes and
                  Cornelia Connolly and
                  Joey Gawrysiak and
                  Tzipora Halevi and
                  Seth Jenny and
                  Michael Miljanovic and
                  Melissa C. Stange and
                  Toni Taipalus and
                  J. Patrick Williams},
  title        = {Foundations for Esports Curricula in Higher Education},
  booktitle    = {Proceedings of the 2021 Working Group Reports on Innovation and Technology
                  in Computer Science Education, ITiCSE-WGR 2021, Virtual Event Germany,
                  26 June 2021- 1 July 2021},
  pages        = {27--55},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3502870.3506566},
  doi          = {10.1145/3502870.3506566},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iticse/ScottSBCGHJMSTW21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/ScottSBCGHJMSTW21,
  author       = {Michael James Scott and
                  Rory Summerley and
                  Nicolas Besombes and
                  Cornelia Connolly and
                  Joey Gawrysiak and
                  Tzipora Halevi and
                  Seth Jenny and
                  Michael Miljanovic and
                  Melissa C. Stange and
                  Toni Taipalus and
                  J. Patrick Williams},
  editor       = {Carsten Schulte and
                  Brett A. Becker and
                  Monica Divitini and
                  Erik Barendsen},
  title        = {Towards a Framework to Support the Design of Esports Curricula in
                  Higher Education},
  booktitle    = {ITiCSE '21: Proceedings of the 26th {ACM} Conference on Innovation
                  and Technology in Computer Science Education V.2, Virtual Event, Germany,
                  June 26 - July 1, 2021},
  pages        = {599--600},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3456565.3461440},
  doi          = {10.1145/3456565.3461440},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iticse/ScottSBCGHJMSTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurGHIKSZ21,
  author       = {Itai Dinur and
                  Steven Goldfeder and
                  Tzipora Halevi and
                  Yuval Ishai and
                  Mahimna Kelkar and
                  Vivek Sharma and
                  Greg Zaverucha},
  title        = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates,
                  Protocols, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/885},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurGHIKSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmrd/BenhamoudaHH19,
  author       = {Fabrice Benhamouda and
                  Shai Halevi and
                  Tzipora Halevi},
  title        = {Supporting private data on Hyperledger Fabric with secure multiparty
                  computation},
  journal      = {{IBM} J. Res. Dev.},
  volume       = {63},
  number       = {2/3},
  pages        = {3:1--3:8},
  year         = {2019},
  url          = {https://doi.org/10.1147/JRD.2019.2913621},
  doi          = {10.1147/JRD.2019.2913621},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ibmrd/BenhamoudaHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BergamaschiHHH19,
  author       = {Fl{\'{a}}vio Bergamaschi and
                  Shai Halevi and
                  Tzipora T. Halevi and
                  Hamish Hunt},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Homomorphic Training of 30, 000 Logistic Regression Models},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {592--611},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_29},
  doi          = {10.1007/978-3-030-21568-2\_29},
  timestamp    = {Wed, 29 May 2019 12:25:55 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BergamaschiHHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/HaleviBCHJMZ19,
  author       = {Tzipora Halevi and
                  Fabrice Benhamouda and
                  Angelo De Caro and
                  Shai Halevi and
                  Charanjit S. Jutla and
                  Yacov Manevich and
                  Qi Zhang},
  title        = {Initial Public Offering {(IPO)} on Permissioned Blockchain Using Secure
                  Multiparty Computation},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {91--98},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00021},
  doi          = {10.1109/BLOCKCHAIN.2019.00021},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/HaleviBCHJMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/BaronH19,
  author       = {Lior Baron and
                  Tzipora Halevi},
  editor       = {Constantine Stephanidis},
  title        = {Feasibility Assessment of Cloud SaaS Enabled Collaboration and Information
                  Confidentiality for the Public Accounting Industry},
  booktitle    = {{HCI} International 2019 - Late Breaking Papers - 21st {HCI} International
                  Conference, {HCII} 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11786},
  pages        = {451--467},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30033-3\_35},
  doi          = {10.1007/978-3-030-30033-3\_35},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/BaronH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BergamaschiHHH19,
  author       = {Fl{\'{a}}vio Bergamaschi and
                  Shai Halevi and
                  Tzipora Halevi and
                  Hamish Hunt},
  title        = {Homomorphic Training of 30, 000 Logistic Regression Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BergamaschiHHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/BenhamoudaHH18,
  author       = {Fabrice Benhamouda and
                  Shai Halevi and
                  Tzipora Halevi},
  editor       = {Abhishek Chandra and
                  Jie Li and
                  Ying Cai and
                  Tian Guo},
  title        = {Supporting Private Data on Hyperledger Fabric with Secure Multiparty
                  Computation},
  booktitle    = {2018 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2018, Orlando, FL, USA, April 17-20, 2018},
  pages        = {357--363},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/IC2E.2018.00069},
  doi          = {10.1109/IC2E.2018.00069},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/BenhamoudaHH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmm/HaleviMLKADAC17,
  author       = {Tzipora Halevi and
                  Nasir D. Memon and
                  James Levis and
                  Ponnurangam Kumaraguru and
                  Sumit Arora and
                  Nikita Dagar and
                  Fadi A. Aloul and
                  Jay Chen},
  title        = {Cultural and Psychological Factors in Cyber-Security},
  journal      = {J. Mobile Multimedia},
  volume       = {13},
  number       = {1{\&}2},
  pages        = {43--56},
  year         = {2017},
  url          = {http://www.rintonpress.com/xjmm13/jmm-13-12/043-056.pdf},
  timestamp    = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmm/HaleviMLKADAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaleviHSS17,
  author       = {Shai Halevi and
                  Tzipora Halevi and
                  Victor Shoup and
                  Noah Stephens{-}Davidowitz},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Implementing BP-Obfuscation Using Graph-Induced Encoding},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {783--798},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133976},
  doi          = {10.1145/3133956.3133976},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HaleviHSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-08305,
  author       = {Aditi Roy and
                  Tzipora Halevi and
                  Nasir D. Memon},
  title        = {An HMM-based Multi-sensor Approach for Continuous Mobile Authentication},
  journal      = {CoRR},
  volume       = {abs/1712.08305},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.08305},
  eprinttype    = {arXiv},
  eprint       = {1712.08305},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-08305.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-08307,
  author       = {Aditi Roy and
                  Tzipora Halevi and
                  Nasir D. Memon},
  title        = {An HMM-based behavior modeling approach for continuous mobile authentication},
  journal      = {CoRR},
  volume       = {abs/1712.08307},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.08307},
  eprinttype    = {arXiv},
  eprint       = {1712.08307},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-08307.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviHSS17,
  author       = {Shai Halevi and
                  Tzipora Halevi and
                  Victor Shoup and
                  Noah Stephens{-}Davidowitz},
  title        = {Implementing BP-Obfuscation Using Graph-Induced Encoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviHSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/HaleviMLKADAC16,
  author       = {Tzipora Halevi and
                  Nasir D. Memon and
                  James Lewis and
                  Ponnurangam Kumaraguru and
                  Sumit Arora and
                  Nikita Dagar and
                  Fadi A. Aloul and
                  Jay Chen},
  editor       = {Gabriele Anderst{-}Kotsis},
  title        = {Cultural and psychological factors in cyber-security},
  booktitle    = {Proceedings of the 18th International Conference on Information Integration
                  and Web-based Applications and Services, iiWAS 2016, Singapore, November
                  28-30, 2016},
  pages        = {318--324},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3011141.3011165},
  doi          = {10.1145/3011141.3011165},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiwas/HaleviMLKADAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BashirLGMH15,
  author       = {Masooda N. Bashir and
                  April Lambert and
                  Boyi Guo and
                  Nasir D. Memon and
                  Tzipora Halevi},
  title        = {Cybersecurity Competitions: The Human Angle},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {5},
  pages        = {74--79},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.100},
  doi          = {10.1109/MSP.2015.100},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BashirLGMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HaleviS15,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  title        = {Keyboard acoustic side channel attacks: exploring realistic and security-sensitive
                  scenarios},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {5},
  pages        = {443--456},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0264-7},
  doi          = {10.1007/S10207-014-0264-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HaleviS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChanHM15,
  author       = {Pan Chan and
                  Tzipora Halevi and
                  Nasir D. Memon},
  editor       = {Michael Brenner and
                  Nicolas Christin and
                  Benjamin Johnson and
                  Kurt Rohloff},
  title        = {Glass {OTP:} Secure and Convenient User Authentication on Google Glass},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2015 International
                  Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
                  30, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  pages        = {298--308},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48051-9\_22},
  doi          = {10.1007/978-3-662-48051-9\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ChanHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ChanHM15,
  author       = {Alexander Chan and
                  Tzipora Halevi and
                  Nasir D. Memon},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {Leap Motion Controller for Authentication via Hand Geometry and Gestures},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Third
                  International Conference, {HAS} 2015, Held as Part of {HCI} International
                  2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9190},
  pages        = {13--22},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20376-8\_2},
  doi          = {10.1007/978-3-319-20376-8\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/ChanHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isba/HaleviKCM15,
  author       = {Tzipora Halevi and
                  Trishank Karthik Kuppusamy and
                  Meghan Caiazzo and
                  Nasir D. Memon},
  title        = {Investigating users' readiness to trade-off biometric fingerprint
                  data},
  booktitle    = {{IEEE} International Conference on Identity, Security and Behavior
                  Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISBA.2015.7126366},
  doi          = {10.1109/ISBA.2015.7126366},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isba/HaleviKCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/RoyHM15,
  author       = {Aditi Roy and
                  Tzipora Halevi and
                  Nasir D. Memon},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {An HMM-based multi-sensor approach for continuous mobile authentication},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {1311--1316},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357626},
  doi          = {10.1109/MILCOM.2015.7357626},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/RoyHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/ChanHM14,
  author       = {Alexander Chan and
                  Tzipora Halevi and
                  Nasir D. Memon},
  editor       = {Bart De Decker and
                  Andr{\'{e}} Z{\'{u}}quete},
  title        = {Touchpad Input for Continuous Biometric Authentication},
  booktitle    = {Communications and Multimedia Security - 15th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2014, Aveiro, Portugal, September
                  25-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8735},
  pages        = {86--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44885-4\_7},
  doi          = {10.1007/978-3-662-44885-4\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/ChanHM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/RoyHM14,
  author       = {Aditi Roy and
                  Tzipora Halevi and
                  Nasir D. Memon},
  title        = {An HMM-based behavior modeling approach for continuous mobile authentication},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2014, Florence, Italy, May 4-9, 2014},
  pages        = {3789--3793},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICASSP.2014.6854310},
  doi          = {10.1109/ICASSP.2014.6854310},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/RoyHM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/HaleviLMSVX13,
  author       = {Tzipora Halevi and
                  Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Jonathan Voris and
                  Tuo Xiang},
  title        = {Context-Aware Defenses to {RFID} Unauthorized Reading and Relay Attacks},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {1},
  number       = {2},
  pages        = {307--318},
  year         = {2013},
  url          = {https://doi.org/10.1109/TETC.2013.2290537},
  doi          = {10.1109/TETC.2013.2290537},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/HaleviLMSVX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaleviS13,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  title        = {Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {3},
  pages        = {563--577},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2247758},
  doi          = {10.1109/TIFS.2013.2247758},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HaleviS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HasanSHZR13,
  author       = {Ragib Hasan and
                  Nitesh Saxena and
                  Tzipora Halevi and
                  Shams Zawoad and
                  Dustin Rinehart},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Sensing-enabled channels for hard-to-detect command and control of
                  mobile devices},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {469--480},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484373},
  doi          = {10.1145/2484313.2484373},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HasanSHZR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/HaleviLM13,
  author       = {Tzipora Halevi and
                  James Lewis and
                  Nasir D. Memon},
  editor       = {Leslie Carr and
                  Alberto H. F. Laender and
                  Bernadette Farias L{\'{o}}scio and
                  Irwin King and
                  Marcus Fontoura and
                  Denny Vrandecic and
                  Lora Aroyo and
                  Jos{\'{e}} Palazzo M. de Oliveira and
                  Fernanda Lima and
                  Erik Wilde},
  title        = {A pilot study of cyber security and privacy related behavior and personality
                  traits},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013, Companion Volume},
  pages        = {737--744},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487788.2488034},
  doi          = {10.1145/2487788.2488034},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/HaleviLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-7643,
  author       = {Tzipora Halevi and
                  Jim Lewis and
                  Nasir D. Memon},
  title        = {Phishing, Personality Traits and Facebook},
  journal      = {CoRR},
  volume       = {abs/1301.7643},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.7643},
  eprinttype    = {arXiv},
  eprint       = {1301.7643},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-7643.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaleviS12,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {A closer look at keyboard acoustic emanations: random passwords, typing
                  styles and decoding techniques},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {89--90},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414509},
  doi          = {10.1145/2414456.2414509},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaleviS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HaleviMSX12,
  author       = {Tzipora Halevi and
                  Di Ma and
                  Nitesh Saxena and
                  Tuo Xiang},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Secure Proximity Detection for {NFC} Devices Based on Ambient Sensor
                  Data},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {379--396},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_22},
  doi          = {10.1007/978-3-642-33167-1\_22},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HaleviMSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/HaleviLMPSVX12,
  author       = {Tzipora Halevi and
                  Sein Lin and
                  Di Ma and
                  Anudath K. Prasad and
                  Nitesh Saxena and
                  Jonathan Voris and
                  Tuo Xiang},
  editor       = {Silvia Giordano and
                  Marc Langheinrich and
                  Albrecht Schmidt},
  title        = {Sensing-enabled defenses to {RFID} unauthorized reading and relay
                  attacks without changing the usage model},
  booktitle    = {2012 {IEEE} International Conference on Pervasive Computing and Communications,
                  Lugano, Switzerland, March 19-23, 2012},
  pages        = {227--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerCom.2012.6199835},
  doi          = {10.1109/PERCOM.2012.6199835},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/HaleviLMPSVX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HaleviSH11,
  author       = {Tzipora Halevi and
                  Nitesh Saxena and
                  Shai Halevi},
  title        = {Tree-based {HB} protocols for privacy-preserving authentication of
                  {RFID} tags},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {343--363},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2010-0404},
  doi          = {10.3233/JCS-2010-0404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HaleviSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/VorisSH11,
  author       = {Jonathan Voris and
                  Nitesh Saxena and
                  Tzipora Halevi},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Accelerometers and randomness: perfect together},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {115--126},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998433},
  doi          = {10.1145/1998412.1998433},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/VorisSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaleviS10,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {On pairing constrained wireless devices based on secrecy of auxiliary
                  channels: the case of acoustic eavesdropping},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866319},
  doi          = {10.1145/1866307.1866319},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaleviS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviS10,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  title        = {Eavesdropping over Random Passwords via Keyboard Acoustic Emanations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-1227,
  author       = {Tzipora Halevi and
                  Nitesh Saxena and
                  Shai Halevi},
  title        = {Using {HB} Family of Protocols for Privacy-Preserving Authentication
                  of {RFID} Tags in a Population},
  journal      = {CoRR},
  volume       = {abs/0907.1227},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.1227},
  eprinttype    = {arXiv},
  eprint       = {0907.1227},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-1227.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics