Prakash Shrestha
Orcid: 0000-0002-7779-6399
According to our database1,
Prakash Shrestha
authored at least 24 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Trans. Priv. Secur., 2024
2023
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures.
Pervasive Mob. Comput., January, 2023
Knowledge management initiatives for achieving sustainable development goal 4.7: higher education institutions' stakeholder perspectives.
J. Knowl. Manag., 2023
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking.
ACM Comput. Surv., 2023
People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023
2022
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication.
Proceedings of the Applied Cryptography and Network Security, 2022
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques.
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Predicting Misinformation and Engagement in COVID-19 Twitter Discourse in the First Months of the Outbreak.
CoRR, 2020
Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the Information Security Practice and Experience, 2019
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication.
CoRR, 2015
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015