scispace - formally typeset
N

Nadarajah Asokan

Researcher at University of Waterloo

Publications -  329
Citations -  14076

Nadarajah Asokan is an academic researcher from University of Waterloo. The author has contributed to research in topics: Authentication & Mobile device. The author has an hindex of 58, co-authored 327 publications receiving 11947 citations. Previous affiliations of Nadarajah Asokan include Helsinki University of Technology & Syracuse University.

Papers
More filters
Proceedings ArticleDOI

STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification

TL;DR: STASH is a system for relay-resilient transparent authentication in which the prover does proximity verification by comparing its approach trajectory towards the intended verifier, with known authorized reference trajectories.
Posted Content

Contextual Proximity Detection in the Face of Context-Manipulating Adversaries.

TL;DR: This work shows that it is feasible to manipulate, consistently control and stabilize the readings of different acoustic and physical environment sensors (and even multiple sensors simultaneously) using low-cost, off-the-shelf equipment and shows that an attacker who can manipulate the context gains a significant advantage in defeating context-based co-presence detection.
Patent

Method, system and devices for protection of a communication or session

TL;DR: In this paper, a method, system, program and devices such as a user equipment, terminal, smart card, for protection of a communication or session, in particular in an IMS, is described.
Posted Content

Citizen Electronic Identities using TPM 2.0

TL;DR: In this paper, the authors propose an eID architecture based on the new, rich authorization model introduced in the TCGs TPM 2.0, which improves the overall security and usability compared to traditional smart card-based solutions.
Posted Content

Security of OS-level virtualization technologies: Technical report.

TL;DR: A comparative study of several OS-level virtualization systems is conducted, discussing their security and identifying some gaps in current solutions.