default search action
Tzipora Halevi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j8]Avinash Jairam, Tzipora Halevi, Theodore Raphan:
Improving Mobile Device Security by Embodying and Co-adapting a Behavioral Biometric Interface. Frontiers Comput. Sci. 4: 754716 (2022) - [c24]Payton Walker, Shalini Saini, S. Abhishek Anand, Tzipora Halevi, Nitesh Saxena:
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations. AsiaCCS 2022: 67-81 - [c23]Vivek Sharma, Tzipora Halevi:
A Survey on Phishing Website Detection Using Deep Neural Networks. HCI (49) 2022: 684-694 - 2021
- [c22]Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha:
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications. CRYPTO (4) 2021: 517-547 - [c21]Michael James Scott, Rory Summerley, Nicolas Besombes, Cornelia Connolly, Joey Gawrysiak, Tzipora Halevi, Seth Jenny, Michael Miljanovic, Melissa C. Stange, Toni Taipalus, J. Patrick Williams:
Foundations for Esports Curricula in Higher Education. ITiCSE-WGR 2021: 27-55 - [c20]Michael James Scott, Rory Summerley, Nicolas Besombes, Cornelia Connolly, Joey Gawrysiak, Tzipora Halevi, Seth Jenny, Michael Miljanovic, Melissa C. Stange, Toni Taipalus, J. Patrick Williams:
Towards a Framework to Support the Design of Esports Curricula in Higher Education. ITiCSE (2) 2021: 599-600 - [i8]Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha:
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications. IACR Cryptol. ePrint Arch. 2021: 885 (2021)
2010 – 2019
- 2019
- [j7]Fabrice Benhamouda, Shai Halevi, Tzipora Halevi:
Supporting private data on Hyperledger Fabric with secure multiparty computation. IBM J. Res. Dev. 63(2/3): 3:1-3:8 (2019) - [c19]Flávio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. ACNS 2019: 592-611 - [c18]Tzipora Halevi, Fabrice Benhamouda, Angelo De Caro, Shai Halevi, Charanjit S. Jutla, Yacov Manevich, Qi Zhang:
Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation. Blockchain 2019: 91-98 - [c17]Lior Baron, Tzipora Halevi:
Feasibility Assessment of Cloud SaaS Enabled Collaboration and Information Confidentiality for the Public Accounting Industry. HCI (LBP) 2019: 451-467 - [i7]Flávio Bergamaschi, Shai Halevi, Tzipora Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. IACR Cryptol. ePrint Arch. 2019: 425 (2019) - 2018
- [c16]Fabrice Benhamouda, Shai Halevi, Tzipora Halevi:
Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation. IC2E 2018: 357-363 - 2017
- [j6]Tzipora Halevi, Nasir D. Memon, James Levis, Ponnurangam Kumaraguru, Sumit Arora, Nikita Dagar, Fadi A. Aloul, Jay Chen:
Cultural and Psychological Factors in Cyber-Security. J. Mobile Multimedia 13(1&2): 43-56 (2017) - [c15]Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz:
Implementing BP-Obfuscation Using Graph-Induced Encoding. CCS 2017: 783-798 - [i6]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based Multi-sensor Approach for Continuous Mobile Authentication. CoRR abs/1712.08305 (2017) - [i5]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based behavior modeling approach for continuous mobile authentication. CoRR abs/1712.08307 (2017) - [i4]Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz:
Implementing BP-Obfuscation Using Graph-Induced Encoding. IACR Cryptol. ePrint Arch. 2017: 104 (2017) - 2016
- [c14]Tzipora Halevi, Nasir D. Memon, James Lewis, Ponnurangam Kumaraguru, Sumit Arora, Nikita Dagar, Fadi A. Aloul, Jay Chen:
Cultural and psychological factors in cyber-security. iiWAS 2016: 318-324 - 2015
- [j5]Masooda N. Bashir, April Lambert, Boyi Guo, Nasir D. Memon, Tzipora Halevi:
Cybersecurity Competitions: The Human Angle. IEEE Secur. Priv. 13(5): 74-79 (2015) - [j4]Tzipora Halevi, Nitesh Saxena:
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios. Int. J. Inf. Sec. 14(5): 443-456 (2015) - [c13]Pan Chan, Tzipora Halevi, Nasir D. Memon:
Glass OTP: Secure and Convenient User Authentication on Google Glass. Financial Cryptography Workshops 2015: 298-308 - [c12]Alexander Chan, Tzipora Halevi, Nasir D. Memon:
Leap Motion Controller for Authentication via Hand Geometry and Gestures. HCI (22) 2015: 13-22 - [c11]Tzipora Halevi, Trishank Karthik Kuppusamy, Meghan Caiazzo, Nasir D. Memon:
Investigating users' readiness to trade-off biometric fingerprint data. ISBA 2015: 1-8 - [c10]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based multi-sensor approach for continuous mobile authentication. MILCOM 2015: 1311-1316 - 2014
- [c9]Alexander Chan, Tzipora Halevi, Nasir D. Memon:
Touchpad Input for Continuous Biometric Authentication. Communications and Multimedia Security 2014: 86-91 - [c8]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based behavior modeling approach for continuous mobile authentication. ICASSP 2014: 3789-3793 - 2013
- [j3]Tzipora Halevi, Haoyu Li, Di Ma, Nitesh Saxena, Jonathan Voris, Tuo Xiang:
Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks. IEEE Trans. Emerg. Top. Comput. 1(2): 307-318 (2013) - [j2]Tzipora Halevi, Nitesh Saxena:
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. IEEE Trans. Inf. Forensics Secur. 8(3): 563-577 (2013) - [c7]Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart:
Sensing-enabled channels for hard-to-detect command and control of mobile devices. AsiaCCS 2013: 469-480 - [c6]Tzipora Halevi, James Lewis, Nasir D. Memon:
A pilot study of cyber security and privacy related behavior and personality traits. WWW (Companion Volume) 2013: 737-744 - [i3]Tzipora Halevi, Jim Lewis, Nasir D. Memon:
Phishing, Personality Traits and Facebook. CoRR abs/1301.7643 (2013) - 2012
- [c5]Tzipora Halevi, Nitesh Saxena:
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques. AsiaCCS 2012: 89-90 - [c4]Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang:
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. ESORICS 2012: 379-396 - [c3]Tzipora Halevi, Sein Lin, Di Ma, Anudath K. Prasad, Nitesh Saxena, Jonathan Voris, Tuo Xiang:
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model. PerCom 2012: 227-234 - 2011
- [j1]Tzipora Halevi, Nitesh Saxena, Shai Halevi:
Tree-based HB protocols for privacy-preserving authentication of RFID tags. J. Comput. Secur. 19(2): 343-363 (2011) - [c2]Jonathan Voris, Nitesh Saxena, Tzipora Halevi:
Accelerometers and randomness: perfect together. WISEC 2011: 115-126 - 2010
- [c1]Tzipora Halevi, Nitesh Saxena:
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping. CCS 2010: 97-108 - [i2]Tzipora Halevi, Nitesh Saxena:
Eavesdropping over Random Passwords via Keyboard Acoustic Emanations. IACR Cryptol. ePrint Arch. 2010: 605 (2010)
2000 – 2009
- 2009
- [i1]Tzipora Halevi, Nitesh Saxena, Shai Halevi:
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population. CoRR abs/0907.1227 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint