Shirvanian, Maliheh
28  Ergebnisse:
Personensuche X
?
1

Compact: Approximating Complex Activation Functions for Sec..:

Islam, Mazharul ; S. Arora, Sunpreet ; Chatterjee, Rahul..
Proceedings on Privacy Enhancing Technologies.  2024 (2024)  3 - p. 25-41 , 2024
 
?
2

Oblivious Extractors and Improved Security in Biometric-Bas..:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
 
?
3

Exploring the Interplay Between Interaction Experience and ..:

, In: 2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW),
Li, Jingjie ; Arora, Sunpreet Singh ; Fawaz, Kassem... - p. 1043-1044 , 2024
 
?
4

A hidden-password online password manager:

, In: Proceedings of the 36th Annual ACM Symposium on Applied Computing,
 
?
5

Two-factor Password-authenticated Key Exchange with End-to-..:

Jarecki, Stanislaw ; Jubur, Mohammed ; Krawczyk, Hugo..
ACM Transactions on Privacy and Security (TOPS).  24 (2021)  3 - p. 1-37 , 2021
 
?
6

EchoVib: Exploring Voice Authentication via Unique Non-Line..:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
Anand, S. Abhishek ; Liu, Jian ; Wang, Chen... - p. 67-81 , 2021
 
?
7

Two-factor Password-authenticated Key Exchange with End-to-..:

Jarecki, Stanislaw ; Jubur, Mohammed ; Krawczyk, Hugo..
ACM Transactions on Privacy and Security.  24 (2021)  3 - p. 1-37 , 2021
 
?
8

2D-2FA: A New Dimension in Two-Factor Authentication:

, In: Annual Computer Security Applications Conference,
Shirvanian, Maliheh ; Agrawal, Shashank - p. 482-496 , 2021
 
?
9

Practical Speech Re-use Prevention in Voice-driven Services:

, In: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses,
 
?
10

CREPE : A Privacy-Enhanced Crash Reporting System:

, In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy,
 
?
11

Voicefox: Leveraging Inbuilt Transcription to Enhance the S..:

, In: Annual Computer Security Applications Conference,
 
?
12

Stethoscope: Crypto Phones with Transparent & Robust Finger..:

, In: 2019 17th International Conference on Privacy, Security and Trust (PST),
Shirvanian, Maliheh ; Saxena, Nitesh - p. 1-10 , 2019
 
?
13

Building and Studying a Password Store that Perfectly Hides..:

Shirvanian, Maliheh ; Saxena, Nitesh ; Jarecki, Stanislaw.
IEEE Transactions on Dependable and Secure Computing.  16 (2019)  5 - p. 770-782 , 2019
 
?
14

On the Pitfalls of End-to-End Encrypted Communications :..:

, In: Proceedings of the 33rd Annual Computer Security Applications Conference,
 
?
15

CCCP : Closed Caption Crypto Phones to Resist MITM Attac..:

, In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security,
Shirvanian, Maliheh ; Saxena, Nitesh - p. 1329-1342 , 2017
 
1-15