Nitesh Saxena
Orcid: 0000-0001-6083-104X
According to our database1,
Nitesh Saxena
authored at least 196 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., January, 2024
ACM Trans. Priv. Secur., 2024
Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2024
Identified-and-Targeted: The First Early Evidence of the Privacy-Invasive Use of Browser Fingerprinting for Online Tracking.
CoRR, 2024
When AI Defeats Password Deception! A Deep Learning Framework to Distinguish Passwords and Honeywords.
CoRR, 2024
Is On-Device AI Broken and Exploitable? Assessing the Trust and Ethics in Small Language Models.
CoRR, 2024
Privacy and Security of Women's Reproductive Health Apps in a Changing Legal Landscape.
CoRR, 2024
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024
News Reader: A News Interest Identification Attack Using Single-Electrode Brainwave Signals.
Proceedings of the Information Security - 27th International Conference, 2024
Dual Study of Canvas Fingerprinting Based Authentication: A Novel Spoofing Attack and the Countermeasure.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration Signatures.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display Authenticators.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures.
Pervasive Mob. Comput., January, 2023
ACM Comput. Surv., 2023
VOICE-ZEUS: Impersonating Zoom's E2EE-Protected Static Media and Textual Communications via Simple Voice Manipulations.
CoRR, 2023
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!
Proceedings of the 32nd USENIX Security Symposium, 2023
Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023
Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Proceedings of the 24th IEEE International Conference on Information Reuse and Integration for Data Science, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Increasing Automotive Electrical Equipment Effectiveness with Enhanced Iron Loss Estimation Techniques.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023
Speaker Anonymity and Voice Conversion Vulnerability: A Speaker Recognition Analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2023
FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices.
IEEE Trans. Mob. Comput., 2022
EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers.
CoRR, 2022
Predatory Medicine: Exploring and Measuring the Vulnerability of Medical AI to Predatory Science.
CoRR, 2022
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Personalized health monitoring via vital sign measurements leveraging motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication.
Proceedings of the Applied Cryptography and Network Security, 2022
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques.
Proceedings of the Applied Cryptography and Network Security, 2022
2021
ACM Trans. Priv. Secur., 2021
IEEE Secur. Priv., 2021
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency.
CoRR, 2021
SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity.
CoRR, 2020
Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2019
Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers.
CoRR, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Information Security Practice and Experience, 2019
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines.
J. Comput. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
J. Comput. Secur., 2017
Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study.
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics.
CoRR, 2016
Task-Dependent Changes in Frontal-Parietal Activation and Connectivity During Visual Search.
Brain Connect., 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds.
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Inf. Forensics Secur., 2015
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios.
Int. J. Inf. Sec., 2015
IACR Cryptol. ePrint Arch., 2015
CoRR, 2015
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication.
CoRR, 2015
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems.
Secur. Commun. Networks, 2014
J. Comput. Secur., 2014
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Emerg. Top. Comput., 2013
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing.
IEEE Trans. Dependable Secur. Comput., 2013
Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
CoRR, 2013
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
IEEE Trans. Mob. Comput., 2012
Location-aware and safer cards: enhancing RFID security and privacy via location sensing.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
J. Comput. Secur., 2011
Int. J. Inf. Sec., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011
What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook.
Proceedings of the Database Systems for Adanced Applications, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the 16th International Conference on Computer Games, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol.
IEEE Trans. Inf. Forensics Secur., 2010
IACR Cryptol. ePrint Arch., 2010
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
CoRR, 2010
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
IEEE Trans. Parallel Distributed Syst., 2009
IEEE Trans. Inf. Forensics Secur., 2009
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting
CoRR, 2009
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
CoRR, 2009
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
CoRR, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison.
Proceedings of the NBiS 2009, 2009
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes
CoRR, 2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Comput. Networks, 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the NETWORKING 2005: Networking Technologies, 2005
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005
2004
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004
2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003