Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing
News
Paper accepted at Percom 2012
Sensing-Enabled Defenses to RFID Unauthorized Reading and Relay Attacks without Changing the Usage Model
Paper accepted at INFOCOM 2012
Estimating Age Privacy Leakage in Online Social Networks
Grant proposal funded by the NSF EAGER (Trustworthy Computing) program
Towards Context-Aware Security and Privacy for RFID Systems
Grant proposal funded by the NSF Trustworthy Computing program
Mobile Phone Password Managers: An Evaluation and a Re-Design based on Human-Perceptible Communication
