N. Asokan
Orcid: 0000-0002-5093-9871Affiliations:
- University of Waterloo, ON, Canada
- Aalto University, Department of Computer Science and Engineering
- University of Helsinki, Department of Computer Science (former)
According to our database1,
N. Asokan
authored at least 211 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2018, "For contributions to systems security and privacy, especially of mobile systems".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on asokan.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
2023
Empir. Softw. Eng., November, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks.
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
CoRR, 2022
Proceedings of the IEEE Secure Development Conference, 2022
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022
2021
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches.
ACM Trans. Priv. Secur., 2021
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning.
CoRR, 2021
Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks.
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the IEEE Secure Development Conference, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the IEEE International Symposium on Technology and Society, 2021
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021
2020
Proc. Priv. Enhancing Technol., 2020
A little goes a long way: Improving toxic language classification despite data scarcity.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020
2019
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Computers, 2019
Proc. Priv. Enhancing Technol., 2019
Proc. Priv. Enhancing Technol., 2019
IEEE J. Sel. Areas Commun., 2019
ACM Comput. Surv., 2019
Using logical form encodings for unsupervised linguistic transformation: Theory and applications.
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
IEEE Internet Comput., 2018
IACR Cryptol. ePrint Arch., 2018
CoRR, 2018
Comput. Commun., 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
IEEE Trans. Computers, 2017
Proc. Priv. Enhancing Technol., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
CoRR, 2017
STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 54th Annual Design Automation Conference, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
CoRR, 2016
Comput. Commun., 2016
POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 2016 IFIP Networking Conference, 2016
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
CoRR, 2015
CoRR, 2015
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication.
CoRR, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Secur. Priv., 2014
The company you keep: mobile malware infection rates and inexpensive risk indicators.
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013
Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the Distributed Computing and Internet Technology, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
Proceedings of the Information Security Technology for Applications, 2010
Use of Ratings from Personalized Communities for Trustworthy Application Installation.
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010
2009
Int. J. Secur. Networks, 2009
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005
2003
Proceedings of the Security Protocols, 2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002
2001
Authentication and key generation for mobile IP using GSM authentication and roaming.
Proceedings of the IEEE International Conference on Communications, 2001
2000
1999
1998
Pers. Ubiquitous Comput., 1998
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Fairness in electronic commerce.
PhD thesis, 1998
1997
1995
1994
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994