What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Maryam Mehrnezhad
Google Scholar
ORCID:
0000-0002-4223-6885
13
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
PhotonKey: A key pairing system for IoT resource and input constrained devices using light sensors.
Danté Gray
Maryam Mehrnezhad
2025
conf/eurosp
Tap, Pay, and Worry: Users' Perceptions of Contactless Payment Attacks Versus Technical Feasibility.
Mahshid Mehr Nezhad
Maryam Mehrnezhad
Timur Yunusov
Feng Hao
2023
conf/eurosp
U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart Campus.
Naoom Abu Abah
Nick Taylor
Charles Morisset
Maryam Mehrnezhad
2023
conf/eurosp
A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards.
Joshua Harrison
Ehsan Toreini
Maryam Mehrnezhad
2023
conf/esorics
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems.
Ehsan Toreini
Maryam Mehrnezhad
Aad van Moorsel
2022
journals/popets
How Can and Would People Protect From Online Tracking?
Maryam Mehrnezhad
Kovila P. L. Coopamootoo
Ehsan Toreini
2022
conf/uss
"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country.
Kovila P. L. Coopamootoo
Maryam Mehrnezhad
Ehsan Toreini
2022
conf/eurosp
Are Our Animals Leaking Information About Us? Security and Privacy Evaluation of Animal-related Apps.
Scott Harper
Maryam Mehrnezhad
Matthew Leach
2022
conf/eurosp
SenSig: Practical IoT Sensor Fingerprinting Using Calibration Data.
Dévanté Gray
Maryam Mehrnezhad
Rishad A. Shafik
2020
conf/eurosp
A Cross-Platform Evaluation of Privacy Notices and Tracking Practices.
Maryam Mehrnezhad
2019
conf/ccs
SSR'19: The 5th Conference on Security Standardisation Research.
Maryam Mehrnezhad
Thyla van der Merwe
Feng Hao
2016
journals/istr
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript.
Maryam Mehrnezhad
Ehsan Toreini
Siamak Fayyaz Shahandashti
Feng Hao
2015
conf/ccs
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript.
Maryam Mehrnezhad
Ehsan Toreini
Siamak Fayyaz Shahandashti
Feng Hao
Coauthors
Aad van Moorsel
(1)
Charles Morisset
(1)
Danté Gray
(1)
Dévanté Gray
(1)
Ehsan Toreini
(6)
Feng Hao
(4)
Joshua Harrison
(1)
Kovila P. L. Coopamootoo
(2)
Mahshid Mehr Nezhad
(1)
Maryam Mehrnezhad
(13)
Matthew Leach
(1)
Naoom Abu Abah
(1)
Nick Taylor
(1)
Rishad A. Shafik
(1)
Scott Harper
(1)
Siamak Fayyaz Shahandashti
(2)
Thyla van der Merwe
(1)
Timur Yunusov
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to