Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Mark Toleman
Clayton D. Scott
muljowidodo kartidjo
Sariya Karimova
Duzgun, H.Sebnem
Jean Jourdan
Alexander Peysakhovich
Roland Zumkeller
Maximilian Dürr
Dan Graur
Home
/
Author
/
TZIPORA HALEVI
Author Info
Open Visualization
Name
Affiliation
Papers
TZIPORA HALEVI
Polytechnic Institute of New York University, Brooklyn, NY, USA
22
Collaborators
Citations
PageRank
35
161
11.97
Referers
Referees
References
450
366
166
Search Limit
100
450
Publications (22 rows)
Collaborators (35 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Mpc-Friendly Symmetric Cryptography From Alternating Moduli: Candidates, Protocols, And Applications
0
0.34
2021
Homomorphic Training of 30, 000 Logistic Regression Models.
0
0.34
2019
Feasibility Assessment of Cloud SaaS Enabled Collaboration and Information Confidentiality for the Public Accounting Industry.
0
0.34
2019
Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation.
7
0.57
2018
Cultural and psychological factors in cyber-security.
0
0.34
2017
Implementing BP-Obfuscation Using Graph-Induced Encoding.
7
0.43
2017
Leap Motion Controller for Authentication via Hand Geometry and Gestures
6
0.66
2015
Glass OTP: Secure and Convenient User Authentication on Google Glass.
8
0.46
2015
Cybersecurity Competitions: The Human Angle
0
0.34
2015
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios.
7
0.45
2015
Touchpad Input For Continuous Biometric Authentication
2
0.43
2014
An HMM-based behavior modeling approach for continuous mobile authentication
10
0.63
2014
A pilot study of cyber security and privacy related behavior and personality traits
18
0.79
2013
Phishing, Personality Traits and Facebook
2
0.42
2013
Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks
4
0.46
2013
Sensing-Enabled Defenses To Rfid Unauthorized Reading And Relay Attacks Without Changing The Usage Model
8
0.54
2012
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data.
36
1.34
2012
Tree-based HB protocols for privacy-preserving authentication of RFID tags
6
0.43
2011
Accelerometers and randomness: perfect together
6
0.60
2011
Eavesdropping over Random Passwords via Keyboard Acoustic Emanations.
0
0.34
2010
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping
23
1.17
2010
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
11
0.55
2009
1