N. Asokan

Orcid: 0000-0002-5093-9871

Affiliations:
  • University of Waterloo, ON, Canada
  • Aalto University, Department of Computer Science and Engineering
  • University of Helsinki, Department of Computer Science (former)


According to our database1, N. Asokan authored at least 211 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

ACM Fellow

ACM Fellow 2018, "For contributions to systems security and privacy, especially of mobile systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations.
CoRR, 2024

Cancellable Memory Requests: A transparent, lightweight Spectre mitigation.
CoRR, 2024

Espresso: Robust Concept Filtering in Text-to-Image Models.
CoRR, 2024

SeMalloc: Semantics-Informed Memory Allocator.
CoRR, 2024

The Spectre of Surveillance and Censorship in Future Internet Architectures.
CoRR, 2024

False Claims against Model Ownership Resolution.
Proceedings of the 33rd USENIX Security Symposium, 2024

GrOVe: Ownership Verification of Graph Neural Networks using Embeddings.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

SoK: Unintended Interactions among Machine Learning Defenses and Risks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

BliMe Linter.
Proceedings of the IEEE Secure Development Conference, 2024

BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

A User-centered Security Evaluation of Copilot.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Data-Oblivious ML Accelerators Using Hardware Security Extensions.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

Attesting Distributional Properties of Training Data for Machine Learning.
Proceedings of the Computer Security - ESORICS 2024, 2024

S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

2023
Is GitHub's Copilot as bad as humans at introducing vulnerabilities in code?
Empir. Softw. Eng., November, 2023

On the Robustness of Dataset Inference.
Trans. Mach. Learn. Res., 2023

Copilot Security: A User Study.
CoRR, 2023

Auditing Framework APIs via Inferred App-side Security Specifications.
Proceedings of the 32nd USENIX Security Symposium, 2023

Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Model Stealing Attacks and Defenses: Where Are We Now?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks.
Proceedings of the Annual Computer Security Applications Conference, 2023

Conflicting Interactions among Protection Mechanisms for Machine Learning Models.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Parallel and Asynchronous Smart Contract Execution.
IEEE Trans. Parallel Distributed Syst., 2022

Hardware Platform Security for Mobile Devices.
Found. Trends Priv. Secur., 2022

Conflicting Interactions Among Protections Mechanisms for Machine Learning Models.
CoRR, 2022

Color My World: Deterministic Tagging for Memory Safety.
CoRR, 2022

On the Effectiveness of Dataset Watermarking in Adversarial Settings.
CoRR, 2022

Towards cryptographically-authenticated in-memory data structures.
Proceedings of the IEEE Secure Development Conference, 2022

Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses.
Proceedings of the Computer Security - ESORICS 2022, 2022

On the Effectiveness of Dataset Watermarking.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

2021
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches.
ACM Trans. Priv. Secur., 2021

SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning.
CoRR, 2021

Real-time Attacks Against Deep Reinforcement Learning Policies.
CoRR, 2021

Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks.
CoRR, 2021

PACStack: an Authenticated Call Stack.
Proceedings of the 30th USENIX Security Symposium, 2021

WAFFLE: Watermarking in Federated Learning.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Tutorial: Investigating Advanced Exploits for System Security Assurance.
Proceedings of the IEEE Secure Development Conference, 2021

DAWN: Dynamic Adversarial Watermarking of Neural Networks.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Investigating targeted espionage: Methods, findings, implications.
Proceedings of the IEEE International Symposium on Technology and Society, 2021

Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

2020
Effective writing style transfer via combinatorial paraphrasing.
Proc. Priv. Enhancing Technol., 2020

Confronting the Limitations of Hardware-Assisted Security.
IEEE Secur. Priv., 2020

A little goes a long way: Improving toxic language classification despite data scarcity.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

2019
Sensor-Based Proximity Detection in the Face of Active Adversaries.
IEEE Trans. Mob. Comput., 2019

Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing.
IEEE Trans. Computers, 2019

SoK: Modular and Efficient Private Decision Tree Evaluation.
Proc. Priv. Enhancing Technol., 2019

Circumventing Cryptographic Deniability with Remote Attestation.
Proc. Priv. Enhancing Technol., 2019

AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication.
IEEE J. Sel. Areas Commun., 2019

Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?
ACM Comput. Surv., 2019

Extraction of Complex DNN Models: Real Threat or Boogeyman?
CoRR, 2019

Effective writing style imitation via combinatorial paraphrasing.
CoRR, 2019

Using logical form encodings for unsupervised linguistic transformation: Theory and applications.
CoRR, 2019

Exploitation Techniques and Defenses for Data-Oriented Attacks.
CoRR, 2019

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication.
Proceedings of the 28th USENIX Security Symposium, 2019

Making Speculative BFT Resilient with Trusted Monotonic Counters.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

Protecting the stack with PACed canaries.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019

Exploitation Techniques and Defenses for Data-Oriented Attacks.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

PRADA: Protecting Against DNN Model Stealing Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Sustainable Security & Safety: Challenges and Opportunities.
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019

HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

Authenticated Call Stack.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

Making Targeted Black-box Evasion Attacks Effective and Efficient.
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019

Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Toward Linux kernel memory safety.
Softw. Pract. Exp., 2018

OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
IEEE Internet Comput., 2018

Toward Fairness of Cryptocurrency Payments.
IEEE Secur. Priv., 2018

On The Use of Remote Attestation to Break and Repair Deniability.
IACR Cryptol. ePrint Arch., 2018

All You Need is "Love": Evading Hate-speech Detection.
CoRR, 2018

PRADA: Protecting against DNN Model Stealing Attacks.
CoRR, 2018

DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
CoRR, 2018

Proximity Verification Based on Acoustic Room Impulse Response.
CoRR, 2018

Ad-hoc key agreement: A brief history and the challenges ahead.
Comput. Commun., 2018

Using SafeKeeper to Protect Web Passwords.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

SafeKeeper: Protecting Web Passwords using Trusted Execution Environments.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews.
Proceedings of the Computer Security, 2018

Migrating SGX Enclaves with Persistent State.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Revisiting context-based authentication in IoT.
Proceedings of the 55th Annual Design Automation Conference, 2018

All You Need is: Evading Hate Speech Detection.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
IEEE Trans. Computers, 2017

Private Set Intersection for Unequal Set Sizes with Mobile Applications.
Proc. Priv. Enhancing Technol., 2017

Oblivious Neural Network Predictions via MiniONN transformations.
IACR Cryptol. ePrint Arch., 2017

Secure Deduplication of Encrypted Data: Refined Model and New Constructions.
IACR Cryptol. ePrint Arch., 2017

Towards Linux Kernel Memory Safety.
CoRR, 2017

Protecting Web Passwords from Rogue Servers using Trusted Execution Environments.
CoRR, 2017

HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
CoRR, 2017

STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Randomization Can't Stop BPF JIT Spray.
Proceedings of the Network and System Security - 11th International Conference, 2017

SELint: An SEAndroid Policy Analysis Tool.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Profiling Users by Modeling Web Transactions.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
Proceedings of the 54th Annual Design Automation Conference, 2017

The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Towards Fairness of Cryptocurrency Payments.
CoRR, 2016

TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition.
CoRR, 2016

ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs.
Comput. Commun., 2016

POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

On improving tie strength estimates by aggregating multiple communication channels.
Proceedings of the 2016 IFIP Networking Conference, 2016

Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Exploring the use of Intel SGX for Secure Many-Party Applications.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Protecting Password Databases using Trusted Hardware.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Characterizing SEAndroid Policies in the Wild.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Real-Time Client-Side Phishing Prevention Add-On.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Invited - Things, trouble, trust: on building trust in IoT systems.
Proceedings of the 53rd Annual Design Automation Conference, 2016

C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Secure Deduplication of Encrypted Data without Additional Independent Servers.
IACR Cryptol. ePrint Arch., 2015

OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
CoRR, 2015

Contextual Proximity Detection in the Face of Context-Manipulating Adversaries.
CoRR, 2015

Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication.
CoRR, 2015

SpotShare and nearbyPeople: applications of the Social PaL framework.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Open-TEE - An Open Virtual Trusted Execution Environment.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

On Making Emerging Trusted Execution Environments Accessible to Developers.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Checksum gestures: continuous gestures as an out-of-band channel for secure pairing.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Proceedings of the Financial Cryptography and Data Security, 2015

I Know Where You are: Proofs of Presence Resilient to Malicious Provers.
Proceedings of the 10th ACM Symposium on Information, 2015

SEDA: Scalable Embedded Device Attestation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Mobile Trusted Computing.
Proc. IEEE, 2014

The Untapped Potential of Trusted Execution Environments on Mobile Devices.
IEEE Secur. Priv., 2014

Security of OS-level virtualization technologies: Technical report.
CoRR, 2014

The company you keep: mobile malware infection rates and inexpensive risk indicators.
Proceedings of the 23rd International World Wide Web Conference, 2014

On mobile malware infections.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

Security of OS-Level Virtualization Technologies.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Groupsourcing: nudging users away from unsafe content.
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014

MDoctor: A Mobile Malware Prognosis Application.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing.
Proceedings of the Financial Cryptography and Data Security, 2014

Citizen Electronic Identities using TPM 2.0.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

ConXsense: automated context classification for context-aware access control.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Mobile Platform Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013

Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
IACR Cryptol. ePrint Arch., 2013

ConXsense - Context Sensing for Adaptive Usable Access Control.
CoRR, 2013

PeerShare: A System Secure Distribution of Sensitive Data among Social Contacts.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

CCS'13 co-located workshop summary for SPSM 2013.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Trusted execution environments on mobile devices.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

CrowdShare: Secure Mobile Resource Sharing.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Is this app safe?: a large scale study on application permissions and risk signals.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Authenticated Encryption Primitives for Size-Constrained Trusted Computing.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
Proceedings of the 2012 International Conference on Privacy, 2012

PeerSense: Who is near you?
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Usable Mobile Security.
Proceedings of the Distributed Computing and Internet Technology, 2012

2011
Secure Device Pairing Based on a Visual Channel: Design and Usability Study.
IEEE Trans. Inf. Forensics Secur., 2011

Practical Property-Based Attestation on Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Using context-profiling to aid access control decisions in mobile devices.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Best-effort authentication for opportunistic networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Identity verification schemes for public transport ticketing with NFC phones.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

Credential life cycle management in open credential platforms (short paper).
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

Towards User-Friendly Credential Transfer on Open Credential Platforms.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Controlling resource hogs in mobile delay-tolerant networks.
Comput. Commun., 2010

Key Attestation from Trusted Execution Environments.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

A closer look at recognition-based graphical passwords on mobile devices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Credential Disabling from Trusted Execution Environments.
Proceedings of the Information Security Technology for Applications, 2010

Use of Ratings from Personalized Communities for Trustworthy Application Installation.
Proceedings of the Information Security Technology for Applications, 2010

Can Hand-Held Computers Still Be Better Smart Cards?
Proceedings of the Trusted Systems - Second International Conference, 2010

Towards security policy decisions based on context profiling.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

2009
Standards for security associations in personal networks: a comparative analysis.
Int. J. Secur. Networks, 2009

External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.
Proceedings of the Trusted Systems, First International Conference, 2009

On-board credentials with open provisioning.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Using Salience Differentials to Making Visual Cues Noticeable.
Proceedings of the Usability, Psychology, and Security, 2008

Securing Peer-to-Peer Distributions for Mobile Devices.
Proceedings of the Information Security Practice and Experience, 2008

Secure roaming with identity metasystems.
Proceedings of the IDtrust 2008, 2008

A Platform for OnBoard Credentials.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Scheduling execution of credentials in constrained secure environments.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2007
Secure software installation in a mobile environment.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Applicability of identity-based cryptography for disruption-tolerant networking.
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007

Enabling Fairer Digital Rights Management with Trusted Computing.
Proceedings of the Information Security, 10th International Conference, 2007

Usability Analysis of Secure Pairing Methods.
Proceedings of the Financial Cryptography and Data Security, 2007

Security Associations in Personal Networks: A Comparative Analysis.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

Beyond secure channels.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

2006
Secure Device Pairing based on a Visual Channel.
IACR Cryptol. ePrint Arch., 2006

Secure Device Pairing based on a Visual Channel (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Ad Hoc Security Associations for Groups.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

Remote storage for mobile devices.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
Efficient Mutual Data Authentication Using Manually Authenticated Strings.
IACR Cryptol. ePrint Arch., 2005

Visitor Access Management in Personal Wireless Networks.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

2003
Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion).
Proceedings of the Security Protocols, 2003

Defining Authorization Domains Using Virtual Devices.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

2002
Man-in-the-Middle in Tunnelled Authentication Protocols.
IACR Cryptol. ePrint Arch., 2002

Securing ad hoc routing protocols.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

2001
Secure Vickrey Auctions without Threshold Trust.
IACR Cryptol. ePrint Arch., 2001

Authentication and key generation for mobile IP using GSM authentication and roaming.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Optimistic fair exchange of digital signatures.
IEEE J. Sel. Areas Commun., 2000

Key agreement in ad hoc networks.
Comput. Commun., 2000

State of the art in electronic payment systems.
Adv. Comput., 2000

1999
Authenticating public terminals.
Comput. Networks, 1999

1998
Protecting the Computation Results of Free-Roaming Agents.
Pers. Ubiquitous Comput., 1998

Designing a Generic Payment Service.
IBM Syst. J., 1998

Towards a Framework for Handling Disputes in Payment Systems.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Asynchronous Protocols for Optimistic Fair Exchange.
Proceedings of the Security and Privacy, 1998

Optimistic Fair Exchange of Digital Signatures (Extended Abstract).
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Fairness in electronic commerce.
PhD thesis, 1998

1997
Server-Supported Signatures.
J. Comput. Secur., 1997

Optimistic Protocols for Fair Exchange.
Proceedings of the CCS '97, 1997

1995
Untraceability in Mobile Networks.
Proceedings of the MOBICOM '95, 1995

1994
Anonymity in a Mobile Computing Environment.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994


  Loading...