A pilot study of cyber security and privacy related behavior and personality traits T Halevi, J Lewis, N Memon Proceedings of the 22nd international conference on world wide web, 737-744, 2013 | 225 | 2013 |
Supporting private data on hyperledger fabric with secure multiparty computation F Benhamouda, S Halevi, T Halevi IBM Journal of Research and Development 63 (2/3), 3: 1-3: 8, 2019 | 220 | 2019 |
Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks T Halevi, N Memon, O Nov Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January …, 2015 | 189 | 2015 |
Secure proximity detection for NFC devices based on ambient sensor data T Halevi, D Ma, N Saxena, T Xiang Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 139 | 2012 |
Phishing, personality traits and Facebook T Halevi, J Lewis, N Memon arXiv preprint arXiv:1301.7643, 2013 | 88 | 2013 |
Cultural and psychological factors in cyber-security T Halevi, N Memon, J Lewis, P Kumaraguru, S Arora, N Dagar, F Aloul, ... Proceedings of the 18th International Conference on Information Integration …, 2016 | 82 | 2016 |
Accelerometers and randomness: Perfect together J Voris, N Saxena, T Halevi Proceedings of the fourth ACM conference on Wireless network security, 115-126, 2011 | 75 | 2011 |
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques T Halevi, N Saxena Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 71 | 2012 |
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios T Halevi, N Saxena International Journal of Information Security 14, 443-456, 2015 | 69 | 2015 |
On pairing constrained wireless devices based on secrecy of auxiliary channels: The case of acoustic eavesdropping T Halevi, N Saxena Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 66 | 2010 |
Leap motion controller for authentication via hand geometry and gestures A Chan, T Halevi, N Memon Human Aspects of Information Security, Privacy, and Trust: Third …, 2015 | 57 | 2015 |
An HMM-based behavior modeling approach for continuous mobile authentication A Roy, T Halevi, N Memon 2014 IEEE international conference on acoustics, speech and signal …, 2014 | 47 | 2014 |
Implementing BP-obfuscation using graph-induced encoding S Halevi, T Halevi, V Shoup, N Stephens-Davidowitz Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 46 | 2017 |
An HMM-based multi-sensor approach for continuous mobile authentication A Roy, T Halevi, N Memon MILCOM 2015-2015 IEEE Military Communications Conference, 1311-1316, 2015 | 42 | 2015 |
Homomorphic training of 30,000 logistic regression models F Bergamaschi, S Halevi, TT Halevi, H Hunt Applied Cryptography and Network Security: 17th International Conference …, 2019 | 41 | 2019 |
Acoustic eavesdropping attacks on constrained wireless device pairing T Halevi, N Saxena IEEE Transactions on Information Forensics and Security 8 (3), 563-577, 2013 | 39 | 2013 |
Foundations for esports curricula in higher education MJ Scott, R Summerley, N Besombes, C Connolly, J Gawrysiak, T Halevi, ... Proceedings of the 2021 Working Group Reports on Innovation and Technology …, 2021 | 36* | 2021 |
Context-aware defenses to RFID unauthorized reading and relay attacks T Halevi, H Li, D Ma, N Saxena, J Voris, T Xiang IEEE Transactions on Emerging Topics in Computing 1 (2), 307-318, 2013 | 35 | 2013 |
Initial public offering (IPO) on permissioned blockchain using secure multiparty computation T Halevi, F Benhamouda, A De Caro, S Halevi, C Jutla, Y Manevich, ... 2019 IEEE International Conference on Blockchain (Blockchain), 91-98, 2019 | 30 | 2019 |
MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications I Dinur, S Goldfeder, T Halevi, Y Ishai, M Kelkar, V Sharma, G Zaverucha Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 28 | 2021 |