Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi 2014 IEEE International Conference on Pervasive Computing and Communications …, 2014 | 96 | 2014 |
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing B Shrestha, N Saxena, HTT Truong, N Asokan Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 93 | 2014 |
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio B Shrestha, M Shirvanian, P Shrestha, N Saxena Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 55 | 2016 |
Smashed: Sniffing and manipulating android sensor data for offensive purposes M Mohamed, B Shrestha, N Saxena IEEE Transactions on Information Forensics and Security 12 (4), 901-913, 2016 | 43 | 2016 |
Wave-to-access: Protecting sensitive mobile device services via a hand waving gesture B Shrestha, N Saxena, J Harrison Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013 | 38 | 2013 |
Sensor-based proximity detection in the face of active adversaries B Shrestha, N Saxena, HTT Truong, N Asokan IEEE Transactions on Mobile Computing 18 (2), 444-457, 2018 | 34 | 2018 |
Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi Pervasive and Mobile Computing 16, 187-204, 2015 | 28 | 2015 |
Tap-Wave-Rub: Lightweight Malware Prevention For Smartphones Using Intuitive Human Gestures H Li, D Ma, N Saxena, B Shrestha, Y Zhu Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 23 | 2013 |
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware B Shrestha, D Ma, Y Zhu, H Li, N Saxena IEEE Transactions on Information Forensics and Security 10 (11), 2270-2283, 2015 | 21 | 2015 |
ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics B Shrestha, M Mohamed, N Saxena 2019 17th International Conference on Privacy, Security and Trust (PST), 1-10, 2019 | 20 | 2019 |
Contextual Proximity Detection in the Face of Context-Manipulating Adversaries B Shrestha, N Saxena, HTT Truong, N Asokan arXiv preprint arXiv:1511.00905, 2015 | 16 | 2015 |
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics B Shrestha, M Mohamed, S Tamrakar, N Saxena Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 15 | 2016 |
SMASheD: Sniffing and Manipulating Android Sensor Data M Mohamed, B Shrestha, N Saxena Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 14 | 2016 |
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics B Shrestha, M Mohamed, N Saxena arXiv preprint arXiv:1605.00766, 2016 | 13 | 2016 |
Curbing mobile malware based on user-transparent hand movements B Shrestha, M Mohamed, A Borg, N Saxena, S Tamrakar 2015 IEEE International Conference on Pervasive Computing and Communications …, 2015 | 10 | 2015 |
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity P Shrestha, B Shrestha, N Saxena 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 4 | 2018 |
Context-Enhanced Mobile Device Authorization and Authentication B Shrestha THE UNIVERSITY OF ALABAMA AT BIRMINGHAM, 2016 | 1 | 2016 |