His main research concerns Computer security, Computer network, Wireless, Authentication and Pairing. His work on Access control, Key management and Secret sharing as part of general Computer security study is frequently linked to Admission control and Relay attack, bridging the gap between disciplines. The Computer network study combines topics in areas such as Mobile ad hoc network, Wireless ad hoc network and Key.
His work in Key addresses issues such as Secrecy, which are connected to fields such as Password. His Wireless course of study focuses on Usability and Secure channel, Bootstrapping, Evil twin, Man-in-the-middle attack and World Wide Web. His research integrates issues of Trusted third party, Hash function, Secure communication and Public-key cryptography in his study of Authentication.
His primary areas of study are Computer security, Authentication, Computer network, Usability and Password. Nitesh Saxena undertakes multidisciplinary investigations into Computer security and Relay attack in his work. His biological study deals with issues like Security token, which deal with fields such as Smartwatch.
Nitesh Saxena combines subjects such as Wireless, Mobile ad hoc network, Bluetooth, Wireless ad hoc network and Communication channel with his study of Computer network. The Usability study combines topics in areas such as User experience design, Man-in-the-middle attack and CAPTCHA. His research in Password intersects with topics in Authenticated Key Exchange, Side channel attack and Multi-factor authentication.
His primary areas of investigation include Password, Authentication, Computer security, Wearable computer and Voice command device. His study in Password is interdisciplinary in nature, drawing from both Authenticated Key Exchange and Record locking. His Authentication research incorporates themes from Server and Gesture.
His study in Computer security concentrates on Vulnerability and Private information retrieval. His study on Voice command device also encompasses disciplines like
Nitesh Saxena mainly investigates Information sensitivity, Voice command device, Direct voice input, Smartwatch and Human–computer interaction. He has researched Information sensitivity in several fields, including Security token, Wearable computer and Microphone.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Secure device pairing based on a visual channel
Nitesh Saxena;Jan-Erik Ekberg;Kari Kostiainen;N. Asokan.
ieee symposium on security and privacy (2006)
The pollution attack in P2P live video streaming: measurement results and defenses
Prithula Dhungel;Xiaojun Hei;Keith W. Ross;Nitesh Saxena.
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV (2007)
Estimating age privacy leakage in online social networks
Ratan Dey;Cong Tang;Keith Ross;Nitesh Saxena.
international conference on computer communications (2012)
Admission control in Peer-to-Peer: design and performance evaluation
Nitesh Saxena;Gene Tsudik;Jeong Hyun Yi.
security of ad hoc and sensor networks (2003)
What's in a name: a study of names, gender inference, and gender behavior in facebook
Cong Tang;Keith Ross;Nitesh Saxena;Ruichuan Chen.
database systems for advanced applications (2011)
Secure proximity detection for NFC devices based on ambient sensor data
Tzipora Halevi;Di Ma;Nitesh Saxena;Tuo Xiang.
european symposium on research in computer security (2012)
A comparative study of secure device pairing methods
Arun Kumar;Nitesh Saxena;Gene Tsudik;Ersin Uzun.
Pervasive and Mobile Computing (2009)
Password-protected secret sharing
Ali Bagherzandi;Stanislaw Jarecki;Nitesh Saxena;Yanbin Lu.
computer and communications security (2011)
On the privacy of web search based on query obfuscation: a case study of TrackMeNot
Sai Teja Peddinti;Nitesh Saxena.
privacy enhancing technologies (2010)
Caveat eptor: A comparative study of secure device pairing methods
Arun Kumar;Nitesh Saxena;Gene Tsudik;Ersin Uzun.
ieee international conference on pervasive computing and communications (2009)
University of California, Irvine
University of Waterloo
University of California, Irvine
Rutgers, The State University of New Jersey
Algorand Foundation
Indraprastha Institute of Information Technology Delhi
New York University
Aalto University
Carleton University
University of Alabama
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: