Follow
Tzipora Halevi
Tzipora Halevi
Brooklyn College
Verified email at nyu.edu
Title
Cited by
Cited by
Year
A pilot study of cyber security and privacy related behavior and personality traits
T Halevi, J Lewis, N Memon
Proceedings of the 22nd international conference on world wide web, 737-744, 2013
2252013
Supporting private data on hyperledger fabric with secure multiparty computation
F Benhamouda, S Halevi, T Halevi
IBM Journal of Research and Development 63 (2/3), 3: 1-3: 8, 2019
2202019
Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks
T Halevi, N Memon, O Nov
Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January …, 2015
1892015
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1392012
Phishing, personality traits and Facebook
T Halevi, J Lewis, N Memon
arXiv preprint arXiv:1301.7643, 2013
882013
Cultural and psychological factors in cyber-security
T Halevi, N Memon, J Lewis, P Kumaraguru, S Arora, N Dagar, F Aloul, ...
Proceedings of the 18th International Conference on Information Integration …, 2016
822016
Accelerometers and randomness: Perfect together
J Voris, N Saxena, T Halevi
Proceedings of the fourth ACM conference on Wireless network security, 115-126, 2011
752011
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques
T Halevi, N Saxena
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
712012
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios
T Halevi, N Saxena
International Journal of Information Security 14, 443-456, 2015
692015
On pairing constrained wireless devices based on secrecy of auxiliary channels: The case of acoustic eavesdropping
T Halevi, N Saxena
Proceedings of the 17th ACM conference on Computer and communications …, 2010
662010
Leap motion controller for authentication via hand geometry and gestures
A Chan, T Halevi, N Memon
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
572015
An HMM-based behavior modeling approach for continuous mobile authentication
A Roy, T Halevi, N Memon
2014 IEEE international conference on acoustics, speech and signal …, 2014
472014
Implementing BP-obfuscation using graph-induced encoding
S Halevi, T Halevi, V Shoup, N Stephens-Davidowitz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
462017
An HMM-based multi-sensor approach for continuous mobile authentication
A Roy, T Halevi, N Memon
MILCOM 2015-2015 IEEE Military Communications Conference, 1311-1316, 2015
422015
Homomorphic training of 30,000 logistic regression models
F Bergamaschi, S Halevi, TT Halevi, H Hunt
Applied Cryptography and Network Security: 17th International Conference …, 2019
412019
Acoustic eavesdropping attacks on constrained wireless device pairing
T Halevi, N Saxena
IEEE Transactions on Information Forensics and Security 8 (3), 563-577, 2013
392013
Foundations for esports curricula in higher education
MJ Scott, R Summerley, N Besombes, C Connolly, J Gawrysiak, T Halevi, ...
Proceedings of the 2021 Working Group Reports on Innovation and Technology …, 2021
36*2021
Context-aware defenses to RFID unauthorized reading and relay attacks
T Halevi, H Li, D Ma, N Saxena, J Voris, T Xiang
IEEE Transactions on Emerging Topics in Computing 1 (2), 307-318, 2013
352013
Initial public offering (IPO) on permissioned blockchain using secure multiparty computation
T Halevi, F Benhamouda, A De Caro, S Halevi, C Jutla, Y Manevich, ...
2019 IEEE International Conference on Blockchain (Blockchain), 91-98, 2019
302019
MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications
I Dinur, S Goldfeder, T Halevi, Y Ishai, M Kelkar, V Sharma, G Zaverucha
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
282021
The system can't perform the operation now. Try again later.
Articles 1–20