default search action
Prakash Shrestha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Prakash Shrestha, Ahmed Tanvir Mahdad, Nitesh Saxena:
Sound-based Two-factor Authentication: Vulnerabilities and Redesign. ACM Trans. Priv. Secur. 27(1): 5:1-5:27 (2024) - 2023
- [j5]Christopher Brant, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira:
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking. ACM Comput. Surv. 55(2): 17:1-17:33 (2023) - [j4]Dev Raj Adhikari, Prakash Shrestha:
Knowledge management initiatives for achieving sustainable development goal 4.7: higher education institutions' stakeholder perspectives. J. Knowl. Manag. 27(4): 1109-1139 (2023) - [j3]Prakash Shrestha, Hien Thi Thu Truong, Pupu Toivonen, Nitesh Saxena, Sasu Tarkoma, Petteri Nurmi:
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures. Pervasive Mob. Comput. 88: 101720 (2023) - [c16]Luiz Giovanini, Shlok Gilda, Mirela Silva, Fabrício Ceschin, Prakash Shrestha, Christopher Brant, Juliana Fernandes, Catia S. Silva, André Grégio, Daniela Oliveira:
People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation. SocialSec 2023: 3-22 - 2022
- [c15]Prakash Shrestha, Nitesh Saxena:
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication. ACNS 2022: 85-104 - [c14]Zengrui Liu, Prakash Shrestha, Nitesh Saxena:
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques. ACNS 2022: 147-169 - 2021
- [c13]Mohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash:
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications. AsiaCCS 2021: 447-461 - [c12]Prakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha:
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. EuroS&P 2021: 71-87 - [i3]Zengrui Liu, Prakash Shrestha, Nitesh Saxena:
Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques. CoRR abs/2110.10129 (2021) - 2020
- [c11]Prakash Shrestha, Zengrui Liu, Nitesh Saxena:
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables. ACSAC 2020: 706-716 - [c10]Prakash Shrestha, Nitesh Saxena:
Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables. WISEC 2020: 13-24 - [i2]Mirela Silva, Fabrício Ceschin, Prakash Shrestha, Christopher Brant, Juliana Fernandes, Catia S. Silva, André Grégio, Daniela Oliveira, Luiz Giovanini:
Predicting Misinformation and Engagement in COVID-19 Twitter Discourse in the First Months of the Outbreak. CoRR abs/2012.02164 (2020)
2010 – 2019
- 2019
- [j2]Ali Gezer, Gary Warner, Clifford Wilson, Prakash Shrestha:
A flow-based approach for Trickbot banking trojan detection. Comput. Secur. 84: 179-192 (2019) - [c9]Manar Mohamed, Prakash Shrestha, Nitesh Saxena:
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. ACSAC 2019: 355-365 - [c8]Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat:
CATCHA: When Cats Track Your Movements Online. ISPEC 2019: 172-193 - 2018
- [j1]Prakash Shrestha, Nitesh Saxena:
An Offensive and Defensive Exposition of Wearable Computing. ACM Comput. Surv. 50(6): 92:1-92:39 (2018) - [c7]Prakash Shrestha, Babins Shrestha, Nitesh Saxena:
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity. CNS 2018: 1-9 - [c6]Prakash Shrestha, Nitesh Saxena:
Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks. WISEC 2018: 99-110 - 2017
- [c5]Prakash Shrestha, S. Abhishek Anand, Nitesh Saxena:
YELP: masking sound-based opportunistic attacks in zero-effort deauthentication. WISEC 2017: 195-206 - 2016
- [c4]Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena:
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio. CCS 2016: 908-919 - [c3]Otto Huhta, Swapnil Udar, Mika Juuti, Prakash Shrestha, Nitesh Saxena, N. Asokan:
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. NDSS 2016 - [c2]Prakash Shrestha, Manar Mohamed, Nitesh Saxena:
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise. WISEC 2016: 67-77 - 2015
- [c1]S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena:
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals. CANS 2015: 95-110 - [i1]Otto Huhta, Prakash Shrestha, Swapnil Udar, Nitesh Saxena, N. Asokan:
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication. CoRR abs/1505.05779 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint