scispace - formally typeset
N

Nadarajah Asokan

Researcher at University of Waterloo

Publications -  329
Citations -  14076

Nadarajah Asokan is an academic researcher from University of Waterloo. The author has contributed to research in topics: Authentication & Mobile device. The author has an hindex of 58, co-authored 327 publications receiving 11947 citations. Previous affiliations of Nadarajah Asokan include Helsinki University of Technology & Syracuse University.

Papers
More filters
Proceedings ArticleDOI

Oblivious Neural Network Predictions via MiniONN Transformations

TL;DR: MiniONN is presented, the first approach for transforming an existing neural network to an oblivious neural network supporting privacy-preserving predictions with reasonable efficiency and it is shown that MiniONN outperforms existing work in terms of response latency and message sizes.
Proceedings ArticleDOI

Optimistic protocols for fair exchange

TL;DR: A generic protocol for fair exchange of electronic goods with non-repudiation that does not involve a third party in the exchange in the fault-less case but only for recovery.
Proceedings ArticleDOI

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

TL;DR: IoT Sentinel is presented, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise.
Journal ArticleDOI

Key agreement in ad hoc networks

TL;DR: This paper considers a problem: a group of people in a meeting room do not have access to public key infrastructure or third party key management service, and they do not share any other prior electronic context, and how can they set up a secure session among their computers?
Proceedings ArticleDOI

Asynchronous protocols for optimistic fair exchange

TL;DR: A set of optimistic fair exchange protocols which tolerate temporary failures in the communication channels to the third party, and a central feature of the protocols is that either player can asynchronously and unilaterally bring a protocol run to completion.