scispace - formally typeset
N

Nadarajah Asokan

Researcher at University of Waterloo

Publications -  329
Citations -  14076

Nadarajah Asokan is an academic researcher from University of Waterloo. The author has contributed to research in topics: Authentication & Mobile device. The author has an hindex of 58, co-authored 327 publications receiving 11947 citations. Previous affiliations of Nadarajah Asokan include Helsinki University of Technology & Syracuse University.

Papers
More filters
Posted Content

Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?

TL;DR: Current style transformation methods fail to achieve reliable obfuscation while simultaneously ensuring semantic faithfulness to the original text, and it is proposed that future work in style transformation should pay particular attention to disallowing semantically drastic changes.
Proceedings ArticleDOI

Remote Storage for Mobile Devices

TL;DR: The design and implementation of a remote storage client framework on Symbian OS, the leading smart phone OS on the market, is described and the advanced features supported by the framework include disconnected operation with whole-file caching and immediate file access.
Proceedings ArticleDOI

Issues in initializing security

TL;DR: Three sources of difficulty in initializing security are identified: (1) basing initialization on real-world identities is expensive, (2) some usage scenarios require new types of indexical prior contexts, and in certain systems, there may not be any real world prior context to link to.
Patent

Authenticating security parameters

TL;DR: In this article, a method for authenticating communicating parties is presented, in which biometric information associated with a first party is generated based on a recording of the first party presenting a predefined input parameter.
Patent

Method and system for establishing a trustworthy connection between a user and a terminal

TL;DR: In this article, a personal device is connected to a terminal and being equipped with a computerized method for establishing a trustworthy connection between a user via said device and the terminal which is connected and authenticatable by at least one server which is authenticated by the device.