Tzipora Halevi
Tzipora Halevi
Brooklyn College
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
European Symposium on Research in Computer Security, 379-396, 2012
1012012
A pilot study of cyber security and privacy related behavior and personality traits
T Halevi, J Lewis, N Memon
Proceedings of the 22nd international conference on world wide web, 737-744, 2013
972013
Accelerometers and randomness: Perfect together
J Voris, N Saxena, T Halevi
Proceedings of the fourth ACM conference on Wireless network security, 115-126, 2011
552011
On pairing constrained wireless devices based on secrecy of auxiliary channels: The case of acoustic eavesdropping
T Halevi, N Saxena
Proceedings of the 17th ACM conference on Computer and communications …, 2010
542010
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques
T Halevi, N Saxena
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
452012
Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks
T Halevi, N Memon, O Nov
Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January …, 2015
422015
Supporting private data on hyperledger fabric with secure multiparty computation
F Benhamouda, S Halevi, T Halevi
IBM Journal of Research and Development 63 (2/3), 3: 1-3: 8, 2019
412019
Phishing, personality traits and Facebook
T Halevi, J Lewis, N Memon
arXiv preprint arXiv:1301.7643, 2013
352013
An HMM-based behavior modeling approach for continuous mobile authentication
A Roy, T Halevi, N Memon
2014 IEEE international conference on acoustics, speech and signal …, 2014
312014
Leap motion controller for authentication via hand geometry and gestures
A Chan, T Halevi, N Memon
International Conference on Human Aspects of Information Security, Privacy …, 2015
302015
Acoustic eavesdropping attacks on constrained wireless device pairing
T Halevi, N Saxena
IEEE Transactions on Information Forensics and Security 8 (3), 563-577, 2013
262013
Context-aware defenses to RFID unauthorized reading and relay attacks
T Halevi, H Li, D Ma, N Saxena, J Voris, T Xiang
IEEE Transactions on Emerging Topics in Computing 1 (2), 307-318, 2013
252013
Implementing BP-obfuscation using graph-induced encoding
S Halevi, T Halevi, V Shoup, N Stephens-Davidowitz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
242017
Using HB family of protocols for privacy-preserving authentication of RFID tags in a population
T Halevi, N Saxena, S Halevi
arXiv preprint arXiv:0907.1227, 2009
222009
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios
T Halevi, N Saxena
International Journal of Information Security 14 (5), 443-456, 2015
212015
Cultural and psychological factors in cyber-security
T Halevi, N Memon, J Lewis, P Kumaraguru, S Arora, N Dagar, F Aloul, ...
Proceedings of the 18th International Conference on Information Integration …, 2016
182016
An HMM-based multi-sensor approach for continuous mobile authentication
A Roy, T Halevi, N Memon
MILCOM 2015-2015 IEEE Military Communications Conference, 1311-1316, 2015
182015
Tree-based HB protocols for privacy-preserving authentication of RFID tags
T Halevi, N Saxena, S Halevi
Journal of Computer Security 19 (2), 343-363, 2011
152011
Sensing-enabled defenses to rfid unauthorized reading and relay attacks without changing the usage model
T Halevi, S Lin, D Ma, AK Prasad, N Saxena, J Voris, T Xiang
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
132012
Glass OTP: Secure and convenient user authentication on google glass
P Chan, T Halevi, N Memon
International Conference on Financial Cryptography and Data Security, 298-308, 2015
112015
The system can't perform the operation now. Try again later.
Articles 1–20