Tzipora Halevi
Tzipora Halevi
Brooklyn College
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
A pilot study of cyber security and privacy related behavior and personality traits
T Halevi, J Lewis, N Memon
Proceedings of the 22nd international conference on world wide web, 737-744, 2013
Supporting private data on hyperledger fabric with secure multiparty computation
F Benhamouda, S Halevi, T Halevi
IBM Journal of Research and Development 63 (2/3), 3: 1-3: 8, 2019
Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks
T Halevi, N Memon, O Nov
Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January …, 2015
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
Phishing, personality traits and Facebook
T Halevi, J Lewis, N Memon
arXiv preprint arXiv:1301.7643, 2013
Accelerometers and randomness: Perfect together
J Voris, N Saxena, T Halevi
Proceedings of the fourth ACM conference on Wireless network security, 115-126, 2011
On pairing constrained wireless devices based on secrecy of auxiliary channels: The case of acoustic eavesdropping
T Halevi, N Saxena
Proceedings of the 17th ACM conference on Computer and communications …, 2010
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques
T Halevi, N Saxena
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
Cultural and psychological factors in cyber-security
T Halevi, N Memon, J Lewis, P Kumaraguru, S Arora, N Dagar, F Aloul, ...
Proceedings of the 18th International Conference on Information Integration …, 2016
Leap motion controller for authentication via hand geometry and gestures
A Chan, T Halevi, N Memon
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios
T Halevi, N Saxena
International Journal of Information Security 14, 443-456, 2015
An HMM-based behavior modeling approach for continuous mobile authentication
A Roy, T Halevi, N Memon
2014 IEEE international conference on acoustics, speech and signal …, 2014
Implementing BP-obfuscation using graph-induced encoding
S Halevi, T Halevi, V Shoup, N Stephens-Davidowitz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Acoustic eavesdropping attacks on constrained wireless device pairing
T Halevi, N Saxena
IEEE Transactions on Information Forensics and Security 8 (3), 563-577, 2013
Context-aware defenses to RFID unauthorized reading and relay attacks
T Halevi, H Li, D Ma, N Saxena, J Voris, T Xiang
IEEE Transactions on Emerging Topics in Computing 1 (2), 307-318, 2013
An HMM-based multi-sensor approach for continuous mobile authentication
A Roy, T Halevi, N Memon
MILCOM 2015-2015 IEEE Military Communications Conference, 1311-1316, 2015
Homomorphic training of 30,000 logistic regression models
F Bergamaschi, S Halevi, TT Halevi, H Hunt
Applied Cryptography and Network Security: 17th International Conference …, 2019
Using HB family of protocols for privacy-preserving authentication of RFID tags in a population
T Halevi, N Saxena, S Halevi
arXiv preprint arXiv:0907.1227, 2009
Initial public offering (IPO) on permissioned blockchain using secure multiparty computation
T Halevi, F Benhamouda, A De Caro, S Halevi, C Jutla, Y Manevich, ...
2019 IEEE International Conference on Blockchain (Blockchain), 91-98, 2019
Glass otp: Secure and convenient user authentication on google glass
P Chan, T Halevi, N Memon
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20