Publication statistics

Pub. period:2008-2011
Pub. count:5
Number of co-authors:7



Co-authors

Number of publications with 3 favourite co-authors:

Ersin Uzun:2
Jonathan Voris:2
Md. Borhan Uddin:2

 

 

Productive colleagues

Nitesh Saxena's 3 most productive colleagues in number of publications:

Arun Kumar:13
Gene Tsudik:7
Ersin Uzun:3
 
 
 

Upcoming Courses

go to course
UI Design Patterns for Successful Software
Starts the day after tomorrow !
go to course
Affordances: Designing Intuitive User Interfaces
92% booked. Starts in 3 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Nitesh Saxena

 

Publications by Nitesh Saxena (bibliography)

 what's this?
2011
 
Edit | Del

Uzun, Ersin, Saxena, Nitesh and Kumar, Arun (2011): Pairing devices for social interactions: a comparative usability evaluation. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 2315-2324. Available online

When users wish to establish wireless radio communication between/among their devices, the channel has to be bootstrapped first. The process of setting up a secure communication channel between two previously unassociated devices is referred to as "Secure Device Pairing". The focus of prior research on this topic has mostly been limited to "personal pairing" scenarios, whereby a single user controls both the devices. In this paper, we instead consider "social pairing" scenarios, whereby two different users establish pairing between their respective devices. We present a comprehensive study to identify methods suitable for social pairing, and comparatively evaluate the usability and security of these methods. Our results identify methods best-suited for users, in terms of efficiency, error-tolerance and of course, usability. Our work provides insights on the applicability and usability of methods for emerging social pairing scenarios, a topic largely ignored so far.

© All rights reserved Uzun et al. and/or their publisher

 
Edit | Del

Peddinti, Sai Teja and Saxena, Nitesh (2011): On the limitations of query obfuscation techniques for location privacy. In: Proceedings of the 2011 International Conference on Uniquitous Computing 2011. pp. 187-196. Available online

A promising approach to location privacy is query obfuscation, which involves reporting k-1 false locations along with the real location. In this paper, we examine the level of privacy protection provided by the current query obfuscation techniques against adversarial location service providers. As a representative and realistic implementation of query obfuscation, we focus on SybilQuery. We present two types of attacks depending upon whether or not a short-term query history is available. When history is available, using machine learning, we were able to identify 93.67% of user trips, with only 2.02% of fake trips misclassified, for the security parameter k = 5. In the absence of history, we used trip correlations to form a smaller set of trips effectively

© All rights reserved Peddinti and Saxena and/or ACM Press

2010
 
Edit | Del

Nithyanand, Rishab, Saxena, Nitesh, Tsudik, Gene and Uzun, Ersin (2010): Groupthink: usability of secure group association for wireless devices. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 331-340. Available online

A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devices) have no prior association, a new security context must be established. In order to prevent potential attacks, the initial context (association) establishment process must involve only the intended devices and their users. A number of methods for initial secure association of two devices have been proposed; their usability factors have been explored and compared extensively. However, a more challenging problem of initial secure association of a group of devices (and users) has not received much attention. Although a few secure group association methods have been proposed, their usability aspects have not been studied, especially, in a comparative manner. This paper discusses desirable features and evaluation criteria for secure group association, identifies suitable methods and presents a comparative usability study. Results show that some simple methods (e.g., peer- or leader-based number comparisons) are quite attractive for small groups, being fast, reasonably secure and well-received by users.

© All rights reserved Nithyanand et al. and/or their publisher

2009
 
Edit | Del

Saxena, Nitesh, Uddin, Md. Borhan and Voris, Jonathan (2009): Treat 'em like other devices: user authentication of multiple personal RFID tags. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 34. Available online

2008
 
Edit | Del

Saxena, Nitesh, Uddin, Md. Borhan and Voris, Jonathan (2008): Universal device pairing using an auxiliary device. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 56-67. Available online

The operation of achieving authenticated key agreement between two human-operated devices over a short-range wireless communication channel (such as Bluetooth or WiFi) is referred to as "Pairing". The devices in such a scenario are ad hoc in nature, i.e., they can neither be assumed to have a prior context (such as pre-shared secrets) with each other nor do they share a common trusted on- or off-line authority. However, the devices can generally be connected using auxiliary physical channel(s) (such as audio, visual, etc.) that can be authenticated by the device user(s) and thus form a basis for pairing. One of the main challenges of secure device pairing is the lack of good quality output interfaces as well as corresponding receivers on devices. In [13], we presented a pairing scheme which is universally applicable to any pair of devices (such as a WiFi AP and a laptop, a Bluetooth keyboard and a desktop, etc.). The scheme is based upon the device user(s) comparing short and simple synchronized audiovisual patterns, such as "beeping" and "blinking". In this paper, we automate the (manual) scheme of [13] by making use of an auxiliary, commonly available device such as a personal camera phone. Based on a preliminary user study we conducted, we show that the automated scheme is generally faster and more user-friendly relative to the manual scheme. More importantly, the proposed scheme turns out to be quite accurate in the detection of any possible attacks.

© All rights reserved Saxena et al. and/or ACM Press

 
Add publication
Show list on your website
 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/nitesh_saxena.html