What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nasir D. Memon
Google Scholar
ORCID:
0000-0002-0103-9762
51
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response.
Govind Mittal
Arthur Jakobsson
Kelly O. Marshall
Chinmay Hegde
Nasir D. Memon
2024
conf/eurosp
Gotcha: Real-Time Video Deepfake Detection via Challenge-Response.
Govind Mittal
Chinmay Hegde
Nasir D. Memon
2023
journals/tifs
Dictionary Attacks on Speaker Verification.
Mirko Marras
Pawel Korus
Anubhav Jain
Nasir D. Memon
2023
journals/tifs
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter.
Saffet Vatansever
Ahmet Emir Dirik
Nasir D. Memon
2022
journals/tifs
Computational Sensor Fingerprints.
Pawel Korus
Nasir D. Memon
2021
journals/tifs
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks.
Govind Mittal
Pawel Korus
Nasir D. Memon
2021
conf/nspw
COLBAC: Shifting Cybersecurity from Hierarchical to Horizontal Designs.
Kevin Gallagher
Santiago Torres-Arias
Nasir D. Memon
Jessica Feldman
2020
journals/tifs
Camera Fingerprint Extraction via Spatial Domain Averaged Frames.
Samet Taspinar
Manoranjan Mohanty
Nasir D. Memon
2019
journals/compsec
Kid on the phone! Toward automatic detection of children on mobile devices.
Toan Nguyen
Aditi Roy
Nasir D. Memon
2019
journals/tifs
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments.
Emre Durmus
Pawel Korus
Nasir D. Memon
2019
journals/tifs
Analysis of Rolling Shutter Effect on ENF-Based Video Forensics.
Saffet Vatansever
Ahmet Emir Dirik
Nasir D. Memon
2018
journals/compsec
Tap-based user authentication for smartwatches.
Toan Nguyen
Nasir D. Memon
2018
conf/ccs
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.
Kevin Gallagher
Sameer Patil
Brendan Dolan-Gavitt
Damon McCoy
Nasir D. Memon
2017
journals/compsec
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices.
Toan Van Nguyen
Napa Sae-Bae
Nasir D. Memon
2017
journals/compsec
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool.
Masooda N. Bashir
Colin Wee
Nasir D. Memon
Boyi Guo
2017
journals/compsec
Mind your SMSes: Mitigating social engineering in second factor authentication.
Hossein Siadati
Toan Nguyen
Payas Gupta
Markus Jakobsson
Nasir D. Memon
2017
journals/tifs
PRNU-Based Camera Attribution From Multiple Seam-Carved Images.
Samet Taspinar
Manoranjan Mohanty
Nasir D. Memon
2017
journals/tifs
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images.
Athanasios Papadopoulos
Toan Nguyen
Emre Durmus
Nasir D. Memon
2017
journals/tifs
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems.
Aditi Roy
Nasir D. Memon
Arun Ross
2017
conf/ccs
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization.
Giovanni Di Crescenzo
Jeyavijayan Rajendran
Ramesh Karri
Nasir D. Memon
2017
conf/ccs
Detecting Structurally Anomalous Logins Within Enterprise Networks.
Hossein Siadati
Nasir D. Memon
2017
conf/fc
X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper.
Hossein Siadati
Toan Nguyen
Nasir D. Memon
2017
conf/soups
Smartwatches Locking Methods: A Comparative Study.
Toan Nguyen
Nasir D. Memon
2017
conf/soups
New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network.
Kevin Gallagher
Sameer Patil
Nasir D. Memon
2017
conf/ndss
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Claude Fachkha
Elias Bou-Harb
Anastasis Keliris
Nasir D. Memon
Mustaque Ahamad
2016
conf/uss
Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes.
Jian Ming Colin Wee
Masooda N. Bashir
Nasir D. Memon
2016
conf/soups
The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers.
Colin Wee
Masooda N. Bashir
Nasir D. Memon
2015
journals/tifs
Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing.
Sevinc Bayram
Husrev Taha Sencar
Nasir D. Memon
2015
conf/fc
Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass.
Dhruv Kumar Yadav
Beatrice Ionascu
Sai Vamsi Krishna Ongole
Aditi Roy
Nasir D. Memon
2015
conf/fc
Glass OTP: Secure and Convenient User Authentication on Google Glass.
Pan Chan
Tzipora Halevi
Nasir D. Memon
2014
journals/tifs
Multitouch Gesture-Based Authentication.
Napa Sae-Bae
Nasir D. Memon
Katherine Isbister
Kowsar Ahmed
2014
journals/tifs
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution.
Ahmet Emir Dirik
Hüsrev T. Sencar
Nasir D. Memon
2014
journals/tifs
Online Signature Verification on Mobile Devices.
Napa Sae-Bae
Nasir D. Memon
2012
journals/tifs
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization.
Sevinç Bayram
Hüsrev T. Sencar
Nasir D. Memon
2010
conf/acsac
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts.
Baris Coskun
Sven Dietrich
Nasir D. Memon
2009
journals/tifs
Editorial.
Nasir D. Memon
2009
conf/acsac
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection.
Baris Coskun
Nasir D. Memon
2008
journals/tifs
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust.
Ahmet Emir Dirik
Husrev T. Sencar
Nasir D. Memon
2007
journals/tifs
Protecting Biometric Templates With Sketch: Theory and Practice.
Yagiz Sutcu
Qiming Li
Nasir D. Memon
2007
journals/tifs
Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks.
Husrev T. Sencar
Nasir D. Memon
2007
conf/soups
Modeling user choice in the PassPoints graphical password scheme.
Ahmet Emir Dirik
Nasir D. Memon
Jean-Camille Birget
2007
conf/acsac
Efficient Detection of Delay-Constrained Relay Nodes.
Baris Coskun
Nasir D. Memon
2006
journals/tifs
Graphical passwords based on robust discretization.
Jean-Camille Birget
Dawei Hong
Nasir D. Memon
2006
conf/iciss
Network Monitoring for Security and Forensics.
Kulesh Shanmugasundaram
Nasir D. Memon
2006
conf/asiacrypt
Secure Sketch for Biometric Templates.
Qiming Li
Yagiz Sutcu
Nasir D. Memon
2005
conf/soups
Authentication using graphical passwords: effects of tolerance and image choice.
Susan Wiedenbeck
Jim Waters
Jean-Camille Birget
Alex Brodskiy
Nasir D. Memon
2004
conf/ccs
Payload attribution via hierarchical bloom filters.
Kulesh Shanmugasundaram
Hervé Brönnimann
Nasir D. Memon
2004
conf/acsac
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type.
Kulesh Shanmugasundaram
Mehdi Kharrazi
Nasir D. Memon
2003
conf/acsac
Automatic Reassembly of Document Fragments via Context Based Statistical Models.
Kulesh Shanmugasundaram
Nasir D. Memon
1992
journals/joc
Algebraic Properties of Cryptosystem PGM.
Spyros S. Magliveras
Nasir D. Memon
1989
conf/crypto
Properties of Cryptosystem PGM.
Spyros S. Magliveras
Nasir D. Memon
Coauthors
Aditi Roy
(3)
Ahmet Emir Dirik
(5)
Alex Brodskiy
(1)
Anastasis Keliris
(1)
Anubhav Jain
(1)
Arthur Jakobsson
(1)
Arun Ross
(1)
Athanasios Papadopoulos
(1)
Baris Coskun
(3)
Beatrice Ionascu
(1)
Boyi Guo
(1)
Brendan Dolan-Gavitt
(1)
Chinmay Hegde
(2)
Claude Fachkha
(1)
Colin Wee
(2)
Damon McCoy
(1)
Dawei Hong
(1)
Dhruv Kumar Yadav
(1)
Elias Bou-Harb
(1)
Emre Durmus
(2)
Giovanni Di Crescenzo
(1)
Govind Mittal
(3)
Hervé Brönnimann
(1)
Hossein Siadati
(3)
Hüsrev T. Sencar
(4)
Husrev Taha Sencar
(1)
Jean-Camille Birget
(3)
Jessica Feldman
(1)
Jeyavijayan Rajendran
(1)
Jian Ming Colin Wee
(1)
Jim Waters
(1)
Katherine Isbister
(1)
Kelly O. Marshall
(1)
Kevin Gallagher
(3)
Kowsar Ahmed
(1)
Kulesh Shanmugasundaram
(4)
Manoranjan Mohanty
(2)
Markus Jakobsson
(1)
Masooda N. Bashir
(3)
Mehdi Kharrazi
(1)
Mirko Marras
(1)
Mustaque Ahamad
(1)
Napa Sae-Bae
(3)
Nasir D. Memon
(51)
Pan Chan
(1)
Pawel Korus
(4)
Payas Gupta
(1)
Qiming Li
(2)
Ramesh Karri
(1)
Saffet Vatansever
(2)
Sai Vamsi Krishna Ongole
(1)
Sameer Patil
(2)
Samet Taspinar
(2)
Santiago Torres-Arias
(1)
Sevinc Bayram
(2)
Spyros S. Magliveras
(2)
Susan Wiedenbeck
(1)
Sven Dietrich
(1)
Toan Nguyen
(6)
Toan Van Nguyen
(1)
Tzipora Halevi
(1)
Yagiz Sutcu
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to