The SCEAS System
Navigation Menu

Search the dblp DataBase


Nitesh Saxena: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nitesh Saxena
    Public Key Cryptography Sans Certificates in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:375-389 [Conf]
  2. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Identity-Based Access Control for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:362-379 [Conf]
  3. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2005, pp:269-278 [Conf]
  4. Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi
    Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:1083-1095 [Conf]
  5. Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi
    An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:1-9 [Conf]
  6. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Admission control in Peer-to-Peer: design and performance evaluation. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:104-113 [Conf]
  7. Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
    Secure Device Pairing based on a Visual Channel (Short Paper). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:306-313 [Conf]
  8. Stanislaw Jarecki, Nitesh Saxena
    Further Simplifications in Proactive RSA Signatures. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:510-528 [Conf]
  9. Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi
    Robust self-keying mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:4, pp:1169-1182 [Journal]
  10. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Threshold cryptography in P2P and MANETs: The case of access control. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3632-3649 [Journal]

  11. Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns. [Citation Graph (, )][DBLP]

  12. Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior. [Citation Graph (, )][DBLP]

  13. On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. [Citation Graph (, )][DBLP]

  14. Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes. [Citation Graph (, )][DBLP]

  15. Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. [Citation Graph (, )][DBLP]

  16. Pairing Devices with Good Quality Output Interfaces. [Citation Graph (, )][DBLP]

  17. Automated Device Pairing for Asymmetric Pairing Scenarios. [Citation Graph (, )][DBLP]

  18. On the Privacy of Peer-Assisted Distribution of Security Patches. [Citation Graph (, )][DBLP]

  19. Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. [Citation Graph (, )][DBLP]

  20. On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot. [Citation Graph (, )][DBLP]

  21. Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. [Citation Graph (, )][DBLP]

  22. Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison. [Citation Graph (, )][DBLP]

  23. Universal device pairing using an auxiliary device. [Citation Graph (, )][DBLP]

  24. Treat 'em like other devices: user authentication of multiple personal RFID tags. [Citation Graph (, )][DBLP]

  25. Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes [Citation Graph (, )][DBLP]

  26. Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population [Citation Graph (, )][DBLP]

  27. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009) [Citation Graph (, )][DBLP]

  28. Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting [Citation Graph (, )][DBLP]

  29. Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing [Citation Graph (, )][DBLP]

Search in 0.041secs, Finished in 0.042secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002