N
Nadarajah Asokan
Researcher at University of Waterloo
Publications - 329
Citations - 14076
Nadarajah Asokan is an academic researcher from University of Waterloo. The author has contributed to research in topics: Authentication & Mobile device. The author has an hindex of 58, co-authored 327 publications receiving 11947 citations. Previous affiliations of Nadarajah Asokan include Helsinki University of Technology & Syracuse University.
Papers
More filters
Posted Content
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?
Tommi Gröndahl,Nadarajah Asokan +1 more
TL;DR: Current style transformation methods fail to achieve reliable obfuscation while simultaneously ensuring semantic faithfulness to the original text, and it is proposed that future work in style transformation should pay particular attention to disallowing semantically drastic changes.
Proceedings ArticleDOI
Remote Storage for Mobile Devices
TL;DR: The design and implementation of a remote storage client framework on Symbian OS, the leading smart phone OS on the market, is described and the advanced features supported by the framework include disconnected operation with whole-file caching and immediate file access.
Proceedings ArticleDOI
Issues in initializing security
Nadarajah Asokan,Lauri Tarkkala +1 more
TL;DR: Three sources of difficulty in initializing security are identified: (1) basing initialization on real-world identities is expensive, (2) some usage scenarios require new types of indexical prior contexts, and in certain systems, there may not be any real world prior context to link to.
Patent
Authenticating security parameters
TL;DR: In this article, a method for authenticating communicating parties is presented, in which biometric information associated with a first party is generated based on a recording of the first party presenting a predefined input parameter.
Patent
Method and system for establishing a trustworthy connection between a user and a terminal
TL;DR: In this article, a personal device is connected to a terminal and being equipped with a computerized method for establishing a trustworthy connection between a user via said device and the terminal which is connected and authenticatable by at least one server which is authenticated by the device.