default search action
Maliheh Shirvanian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j4]Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian:
Compact: Approximating Complex Activation Functions for Secure Computation. Proc. Priv. Enhancing Technol. 2024(3): 25-41 (2024) - 2021
- [j3]Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 24(3): 17:1-17:37 (2021) - 2019
- [j2]Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. IEEE Trans. Dependable Secur. Comput. 16(5): 770-782 (2019) - 2018
- [j1]Maliheh Shirvanian, Nitesh Saxena, Dibya Mukhopadhyay:
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines. J. Comput. Secur. 26(3): 311-333 (2018)
Conference and Workshop Papers
- 2024
- [c21]Jingjie Li, Sunpreet Singh Arora, Kassem Fawaz, Younghyun Kim, Can Liu, Sebastian Meiser, Mohsen Minaei, Maliheh Shirvanian, Kim Wagner:
Exploring the Interplay Between Interaction Experience and Security Perception of Payment Authentication in Virtual Reality. VR Workshops 2024: 1043-1044 - 2023
- [c20]Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian:
Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems. ESORICS (1) 2023: 290-312 - 2021
- [c19]Maliheh Shirvanian, Shashank Agrawal:
2D-2FA: A New Dimension in Two-Factor Authentication. ACSAC 2021: 482-496 - [c18]S. Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen:
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech. AsiaCCS 2021: 67-81 - [c17]Yangyong Zhang, Sunpreet S. Arora, Maliheh Shirvanian, Jianwei Huang, Guofei Gu:
Practical Speech Re-use Prevention in Voice-driven Services. RAID 2021: 282-295 - [c16]Maliheh Shirvanian, Christopher Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
A hidden-password online password manager. SAC 2021: 1683-1686 - 2020
- [c15]Maliheh Shirvanian, Manar Mohamed, Nitesh Saxena, S. Abhishek Anand:
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks. ACSAC 2020: 870-883 - [c14]Kiavash Satvat, Maliheh Shirvanian, Mahshid Hosseini, Nitesh Saxena:
CREPE: A Privacy-Enhanced Crash Reporting System. CODASPY 2020: 295-306 - 2019
- [c13]Maliheh Shirvanian, Summer Vo, Nitesh Saxena:
Quantifying the Breakability of Voice Assistants. PerCom 2019: 1-11 - [c12]Maliheh Shirvanian, Nitesh Saxena:
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations. PST 2019: 1-10 - 2018
- [c11]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. Public Key Cryptography (2) 2018: 431-461 - 2017
- [c10]Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. ACSAC 2017: 499-511 - [c9]Maliheh Shirvanian, Nitesh Saxena:
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through. CCS 2017: 1329-1342 - [c8]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. ICDCS 2017: 1094-1104 - 2016
- [c7]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. AsiaCCS 2016: 177-188 - [c6]Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena:
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio. CCS 2016: 908-919 - 2015
- [c5]Maliheh Shirvanian, Nitesh Saxena:
On the Security and Usability of Crypto Phones. ACSAC 2015: 21-30 - [c4]Dibya Mukhopadhyay, Maliheh Shirvanian, Nitesh Saxena:
All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines. ESORICS (2) 2015: 599-621 - 2014
- [c3]Maliheh Shirvanian, Nitesh Saxena:
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones. CCS 2014: 868-879 - [c2]Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, Naveen Nathan:
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices. NDSS 2014 - 2008
- [c1]Maliheh Shirvanian, Farah Torkamani-Azar:
Adaptive SVD-Based Digital Image Watermarking. IWDW 2008: 113-123
Informal and Other Publications
- 2023
- [i15]Jingjie Li, Sunpreet Singh Arora, Kassem Fawaz, Younghyun Kim, Can Liu, Sebastian Meiser, Mohsen Minaei, Maliheh Shirvanian, Kim Wagner:
"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality. CoRR abs/2303.11575 (2023) - [i14]Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian:
Compact: Approximating Complex Activation Functions for Secure Computation. CoRR abs/2309.04664 (2023) - 2022
- [i13]Mihai Christodorescu, Maliheh Shirvanian, Shams Zawoad:
Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors. CoRR abs/2211.13195 (2022) - [i12]Maliheh Shirvanian, Sebastian Meiser:
"Tell me, how do you know it's me?" Expectations of security and personalization measures for smart speaker applications. CoRR abs/2212.01905 (2022) - [i11]Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian:
Oblivious Extractors and Improved Security in Biometric-based Authentication Systems. IACR Cryptol. ePrint Arch. 2022: 1030 (2022) - [i10]Sunpreet S. Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Maliheh Shirvanian, Kim Wagner, Gaven J. Watson:
Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures. IACR Cryptol. ePrint Arch. 2022: 1555 (2022) - [i9]Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu, Payman Mohassel:
CoRA: Collaborative Risk-Aware Authentication. IACR Cryptol. ePrint Arch. 2022: 1685 (2022) - 2021
- [i8]Yangyong Zhang, Maliheh Shirvanian, Sunpreet S. Arora, Jianwei Huang, Guofei Gu:
Practical Speech Re-use Prevention in Voice-driven Services. CoRR abs/2101.04773 (2021) - [i7]Kiavash Satvat, Maliheh Shirvanian, Nitesh Saxena:
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency. CoRR abs/2102.13607 (2021) - [i6]Maliheh Shirvanian, Shashank Agrawal:
2D-2FA: A New Dimension in Two-Factor Authentication. CoRR abs/2110.15872 (2021) - 2018
- [i5]Kiavash Satvat, Mahshid Hosseini, Maliheh Shirvanian:
Camouflaged with Size: A Case Study of Espionage using Acquirable Single-Board Computers. CoRR abs/1809.04112 (2018) - [i4]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. IACR Cryptol. ePrint Arch. 2018: 33 (2018) - [i3]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. IACR Cryptol. ePrint Arch. 2018: 695 (2018) - 2017
- [i2]Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. CoRR abs/1707.05285 (2017) - 2015
- [i1]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. IACR Cryptol. ePrint Arch. 2015: 1099 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-19 19:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint