Tzipora Halevi
Orcid: 0000-0003-3988-0239
According to our database1,
Tzipora Halevi
authored at least 34 papers
between 2009 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Improving Mobile Device Security by Embodying and Co-adapting a Behavioral Biometric Interface.
Frontiers Comput. Sci., 2022
Proceedings of the HCI International 2022 - Late Breaking Posters, 2022
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 2021 Working Group Reports on Innovation and Technology in Computer Science Education, 2021
Proceedings of the ITiCSE '21: Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V.2, Virtual Event, Germany, June 26, 2021
2019
IBM J. Res. Dev., 2019
IACR Cryptol. ePrint Arch., 2019
Feasibility Assessment of Cloud SaaS Enabled Collaboration and Information Confidentiality for the Public Accounting Industry.
Proceedings of the HCI International 2019 - Late Breaking Papers, 2019
Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation.
Proceedings of the IEEE International Conference on Blockchain, 2019
2017
IACR Cryptol. ePrint Arch., 2017
2016
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016
2015
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios.
Int. J. Inf. Sec., 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the IEEE International Conference on Identity, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the Communications and Multimedia Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Emerg. Top. Comput., 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
J. Comput. Secur., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
CoRR, 2009