N. Asokan
#119,358
Most Influential Person Now
Computer scientist
N. Asokan's AcademicInfluence.com Rankings
N. Asokancomputer-science Degrees
Computer Science
#5722
World Rank
#6041
Historical Rank
Database
#7240
World Rank
#7491
Historical Rank

Download Badge
Computer Science
Why Is N. Asokan Influential?
(Suggest an Edit or Addition)According to Wikipedia, Nadarajah Asokan is a professor of computer science and the David R. Cheriton Chair in Software Systems at the University of Waterloo's David R. Cheriton School of Computer Science. He is also an adjunct professor in the Department of Computer Science at Aalto University.
N. Asokan's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Optimistic fair exchange of digital signatures (2000) (650)
- Optimistic protocols for fair exchange (1997) (530)
- Securing ad hoc routing protocols (2002) (503)
- Oblivious Neural Network Predictions via MiniONN Transformations (2017) (501)
- Key agreement in ad hoc networks (2000) (458)
- IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT (2016) (442)
- Asynchronous protocols for optimistic fair exchange (1998) (339)
- DÏoT: A Federated Self-learning Anomaly Detection System for IoT (2018) (283)
- PRADA: Protecting Against DNN Model Stealing Attacks (2018) (264)
- The State of the Art in Electronic Payment Systems (1997) (254)
- Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems (2015) (244)
- Is this app safe?: a large scale study on application permissions and risk signals (2012) (232)
- Secure device pairing based on a visual channel (2006) (218)
- C-FLAT: Control-Flow Attestation for Embedded Systems Software (2016) (215)
- Fairness in electronic commerce (1998) (210)
- Secure Vickrey Auctions without Threshold Trust (2002) (190)
- SEDA: Scalable Embedded Device Attestation (2015) (188)
- Optimistic Fair Exchange of Digital Signatures (Extended Abstract) (1998) (178)
- Usability Analysis of Secure Pairing Methods (2007) (166)
- Man-in-the-Middle in Tunnelled Authentication Protocols (2003) (159)
- All You Need is "Love": Evading Hate Speech Detection (2018) (159)
- Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing (2016) (145)
- A closer look at recognition-based graphical passwords on mobile devices (2010) (138)
- Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices (2014) (123)
- Untraceability in mobile networks (1995) (122)
- Invited: Things, trouble, trust: On building trust in IoT systems (2016) (114)
- On-board credentials with open provisioning (2009) (113)
- The Untapped Potential of Trusted Execution Environments on Mobile Devices (2013) (102)
- Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets (2015) (96)
- AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication (2019) (95)
- Beyond secure channels (2007) (92)
- LO-FAT: Low-Overhead control Flow ATtestation in hardware (2017) (89)
- Designing a Generic Payment Service (1998) (88)
- Applicability of identity-based cryptography for disruption-tolerant networking (2007) (87)
- Private Set Intersection for Unequal Set Sizes with Mobile Applications (2017) (85)
- Security Associations in Personal Networks: A Comparative Analysis (2007) (81)
- DAWN: Dynamic Adversarial Watermarking of Neural Networks (2019) (79)
- Man-in-the-Middle in Tunneled Authentication Protocols (2002) (78)
- ConXsense: automated context classification for context-aware access control (2013) (77)
- Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing (2014) (77)
- Trusted execution environments on mobile devices (2013) (75)
- PAC it up: Towards Pointer Integrity using ARM Pointer Authentication (2018) (74)
- Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication (2014) (73)
- Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application (2017) (72)
- The company you keep: mobile malware infection rates and inexpensive risk indicators (2013) (66)
- Open-TEE -- An Open Virtual Trusted Execution Environment (2015) (64)
- Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling (2012) (64)
- Anonymity in a Mobile Computing Environment (1994) (61)
- ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices (2018) (60)
- Optimistic Protocols for Multi-Party Fair Exchange (1996) (55)
- Security of OS-Level Virtualization Technologies (2014) (52)
- IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT (2017) (52)
- Toward Fairness of Cryptocurrency Payments (2016) (49)
- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers (2017) (49)
- DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices (2018) (46)
- Exploring the use of Intel SGX for Secure Many-Party Applications (2016) (45)
- Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags (2011) (44)
- The Circle Game: Scalable Private Membership Test Using Trusted Hardware (2016) (44)
- S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX (2018) (43)
- SoK: Modular and Efficient Private Decision Tree Evaluation (2019) (42)
- Mobile Trusted Computing (2014) (41)
- Optimistic Synchronous Multi-Party Contract Signing (1998) (41)
- Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications (2013) (40)
- Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures (2011) (40)
- Enabling Fairer Digital Rights Management with Trusted Computing (2007) (39)
- Standards for security associations in personal networks: a comparative analysis (2009) (39)
- Ad Hoc Security Associations for Groups (2006) (38)
- Secure Device Pairing Based on a Visual Channel: Design and Usability Study (2011) (37)
- Towards a Framework for Handling Disputes in Payment Systems (1998) (34)
- Extraction of Complex DNN Models: Real Threat or Boogeyman? (2019) (33)
- Stay On-Topic: Generating Context-specific Fake Restaurant Reviews (2018) (32)
- State of the art in electronic payment systems (2000) (31)
- Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks (2015) (29)
- Comparison of Visual Datasets for Machine Learning (2017) (29)
- Controlling resource hogs in mobile delay-tolerant networks (2010) (27)
- Checksum gestures: continuous gestures as an out-of-band channel for secure pairing (2015) (27)
- Revisiting Context-Based Authentication in IoT (2018) (27)
- Cellular Authentication for Mobile and Internet Services (2008) (27)
- PACStack: an Authenticated Call Stack (2019) (25)
- Extending cellular authentication as a service (2005) (24)
- ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs (2016) (24)
- Identity verification schemes for public transport ticketing with NFC phones (2011) (24)
- Migrating SGX Enclaves with Persistent State (2018) (23)
- Sensor-Based Proximity Detection in the Face of Active Adversaries (2019) (22)
- Using contextual co-presence to strengthen Zero-Interaction Authentication:Design, integration and usability (2015) (22)
- On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World (2018) (21)
- CrowdShare: Secure Mobile Resource Sharing (2013) (21)
- Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? (2019) (21)
- HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement (2017) (20)
- SafeKeeper: Protecting Web Passwords using Trusted Execution Environments (2017) (20)
- Scheduling execution of credentials in constrained secure environments (2008) (20)
- Practical Property-Based Attestation on Mobile Devices (2011) (19)
- I Know Where You are: Proofs of Presence Resilient to Malicious Provers (2015) (19)
- WAFFLE: Watermarking in Federated Learning (2020) (19)
- Smart and Secure Cross-Device Apps for the Internet of Advanced Things (2015) (19)
- Defining authorization domains using virtual devices (2003) (19)
- Generic Authentication Architecture (2008) (18)
- Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion) (2003) (18)
- Citizen Electronic Identities using TPM 2.0 (2014) (16)
- Exploitation Techniques and Defenses for Data-Oriented Attacks (2019) (15)
- Registration Keys for Route Optimization (2000) (15)
- Characterizing SEAndroid Policies in the Wild (2015) (15)
- Authentication and key generation for mobile IP using GSM authentication and roaming (2001) (14)
- Use of Ratings from Personalized Communities for Trustworthy Application Installation (2010) (13)
- DIoT: A Self-learning System for Detecting Compromised IoT Devices (2018) (13)
- Remote Storage for Mobile Devices (2006) (13)
- A little goes a long way: Improving toxic language classification despite data scarcity (2020) (13)
- SELint: An SEAndroid Policy Analysis Tool (2016) (13)
- Security of OS-level virtualization technologies: Technical report (2014) (13)
- Mobile Platform Security (2013) (12)
- On the usefulness of proof-of-possession (2003) (12)
- Real-Time Client-Side Phishing Prevention Add-On (2016) (12)
- Is GitHub's Copilot as Bad As Humans at Introducing Vulnerabilities in Code? (2022) (12)
- Issues in initializing security (2005) (12)
- Contextual Proximity Detection in the Face of Context-Manipulating Adversaries (2015) (12)
- STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification (2016) (12)
- Man-inthe-Middle in Tunnelled Authentication (2002) (11)
- Using context-profiling to aid access control decisions in mobile devices (2011) (11)
- Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories (2018) (11)
- ACM International Joint Conference on Pervasive and Ubiquitous Computing (2015) (11)
- HardScope: Hardening Embedded Systems Against Data-Oriented Attacks (2019) (10)
- NRC-TR-2007-007 Towards Securing Disruption-Tolerant Networking (2007) (10)
- Protecting the stack with PACed canaries (2019) (10)
- A Platform for OnBoard Credentials (2008) (10)
- Credential Disabling from Trusted Execution Environments (2010) (9)
- Protecting Web Passwords from Rogue Servers using Trusted Execution Environments (2017) (9)
- Key Attestation from Trusted Execution Environments (2010) (9)
- Effective writing style transfer via combinatorial paraphrasing (2020) (8)
- Towards security policy decisions based on context profiling (2010) (8)
- Authenticated Call Stack (2019) (8)
- Anonymity and Untraceability in Mobile Networks (1995) (8)
- Ad-hoc key agreement: A brief history and the challenges ahead (2018) (7)
- Randomization Can't Stop BPF JIT Spray (2017) (7)
- Usable Mobile Security (2012) (7)
- OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices (2015) (7)
- Profiling Users by Modeling Web Transactions (2017) (7)
- Securing Peer-to-Peer Distributions for Mobile Devices (2008) (7)
- MDoctor: A Mobile Malware Prognosis Application (2014) (7)
- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change (2018) (7)
- DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification (2018) (6)
- Secure software installation in a mobile environment (2007) (6)
- Making Targeted Black-box Evasion Attacks Effective and Efficient (2019) (6)
- AUDI: Towards Autonomous IoT Device-Type Identification (2019) (6)
- Effective writing style imitation via combinatorial paraphrasing (2019) (6)
- Using SafeKeeper to Protect Web Passwords (2018) (6)
- Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead (2019) (5)
- Can Hand-Held Computers Still Be Better Smart Cards? (2010) (5)
- POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments (2016) (5)
- NRC-TR-2008-001 OnBoard Credentials Platform Design and Implementation (2008) (5)
- Groupsourcing: nudging users away from unsafe content (2014) (5)
- Proximity Verification Based on Acoustic Room Impulse Response (2018) (5)
- Real-time Attacks Against Deep Reinforcement Learning Policies (2021) (5)
- Parallel and Asynchronous Smart Contract Execution (2021) (5)
- On Making Emerging Trusted Execution Environments Accessible to Developers (2015) (5)
- Visitor access management in personal wireless networks (2005) (4)
- Lux (2020) (4)
- Toward Linux kernel memory safety (2017) (4)
- Sustainable Security & Safety: Challenges and Opportunities (2019) (4)
- Making Speculative BFT Resilient with Trusted Monotonic Counters (2019) (4)
- Best-effort authentication for opportunistic networks (2011) (4)
- ConXsense - Context Sensing for Adaptive Usable Access Control (2013) (4)
- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing (2009) (4)
- Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks (2021) (3)
- Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials (2018) (3)
- OmniShare: Encrypted Cloud Storage for the Multi-Device Era (2018) (3)
- Authenticated Encryption Primitives for Size-Constrained Trusted Computing (2012) (3)
- SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning (2021) (2)
- On mobile malware infections (2014) (2)
- EAT2seq: A generic framework for controlled sentence transformation without task-specific training (2019) (2)
- Towards Fairness of Cryptocurrency Transactions (2016) (2)
- Electronic Payment Systems 1 (1996) (2)
- Revisiting Context-Based Pairing in IoT (2018) (2)
- Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011 (2011) (2)
- Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Models (2021) (1)
- On The Use of Remote Attestation to Break and Repair Deniability (2018) (1)
- Controlling Resource Hogs in Delay-Tolerant Networks (2008) (1)
- Do Transformers use variable binding? (2022) (1)
- Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches (2021) (1)
- Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication (2015) (1)
- Security Associations for Wireless Devices (2009) (1)
- Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses (2021) (1)
- LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling (2015) (1)
- Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009 (2009) (0)
- WAR: Wireless Anonymous Routing. Commentary. Authors' reply (2005) (0)
- Authenticating to a network of tranmisison packet data. (2001) (0)
- Proceedings of the 1st Workshop on System Software for Trusted Execution (2016) (0)
- HardScope (2019) (0)
- DAWN (2021) (0)
- System and method for loading a temporary public key infrastructure of a cellular telekommunikationsauthentifizierungs- and billing infrastructure (2001) (0)
- A pr 2 01 9 EAT 2 seq : A generic framework for controlled sentence transformation without task-specific training (2019) (0)
- access to the address (2000) (0)
- Terminology and Abbreviations (2008) (0)
- SWARM ATTESTATION 2 . 1 Problem Description and System Model (2015) (0)
- The authentication packet data network (2000) (0)
- Transfert de donnees securise (2004) (0)
- Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication (2017) (0)
- the address acquisition (2000) (0)
- Applications Using Generic Authentication Architecture (2008) (0)
- Confronting the Limitations of Hardware-Assisted Security (2020) (0)
- Anonymity in a mobile computing environment (1994) (0)
- A method, system and equipment for transferring accounting information (2002) (0)
- Sim authentication mechanism for dhcrv4 / v6 news (2000) (0)
- Guidance for Deploying GAA (2008) (0)
- Do Transformers know symbolic rules, and would we know if they did? (2022) (0)
- Late Breaking Results: Authenticated Call Stack (2019) (0)
- Addressing and routing in ad hoc networks movement (2000) (0)
- Trust and Trustworthy Computing (2013) (0)
- Session details: Mobile Security 1 (2017) (0)
- Tutorial: Investigating Advanced Exploits for System Security Assurance (2021) (0)
- SEDA - Technical Report (2015) (0)
- Hardware Platform Security for Mobile Devices (2022) (0)
- TUD-CS-2013-0084 CrowdShare : Secure Mobile Resource Sharing (2015) (0)
- Title : Off-the-Hook : An Efficient and Usable Client-Side Phishing Prevention Application Year : 2017 Version : Preprint (2017) (0)
- False Claims against Model Ownership Resolution (2023) (0)
- 人工智能时代的网络空间安全专题简介 (2022) (0)
- IoT Cloud Service Device-type Identification Policy Database IoT deviceIoT deviceIoT deviceIoT device IoT device Device Fingerprinting Policy Application WiFi Ethernet IoT deviceIoT device IoT device Local SOHO network IoT Gateway Internet (2019) (0)
- A method for protecting an electronic device and an electronic device (2001) (0)
- Using logical form encodings for unsupervised linguistic transformation: Theory and applications (2019) (0)
- Color My World: Deterministic Tagging for Memory Safety (2022) (0)
- Using a shared secrecy for bootstrapping (2004) (0)
- Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. (2014) (0)
- TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition (2016) (0)
- CCS'13 co-located workshop summary for SPSM 2013 (2013) (0)
- Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices (2021) (0)
- IoT Security Service Device-Type Identification Anomaly Detection Models IoT deviceIoT device IoT deviceIoT device IoT device Device Fingerprinting Anomaly Detection WiFi Ethernet IoT deviceIoT device IoT device Local SOHO network Botnet server Security Gateway Infected IoT device Infected IoT devic (2018) (0)
- Classical Approaches to Authentication and Key Agreement (2008) (0)
This paper list is powered by the following services:
Other Resources About N. Asokan
What Schools Are Affiliated With N. Asokan?
N. Asokan is affiliated with the following schools: