• 2017

    • Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures
      Song Gao, Manar Mohamed, Nitesh Saxena, and Chengcui Zhang
      In IEEE Transactions on Dependable and Secure Computing (TDSC), 2017.
    • An Offensive and Defensive Exposition of Wearable Computing
      Prakash Shrestha and Nitesh Saxena
      In ACM Computing Surveys (CSUR), 2017.
    • Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones: Defeating Humans and Machines
      Maliheh Shirvanian, Dibya Mukhopadhyay and Nitesh Saxena
      In  Journal of Computer Security (JCS), 2017.
    • On the Security and Usability of Dynamic Cognitive Game CAPTCHAs.
      Manar Mohamed, Song Gao, Niharika Sachdeva, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru and Paul van Oorschot
      In  Journal of Computer Security (JCS), 2017.
  • 2012

  • 2007

    • Threshold Cryptography in P2P and MANETs: the Case of Access Control
      Nitesh Saxena, Gene Tsudik and Jeong H. Yi,
      Elsevier Computer Networks, Volume 51 , Issue 12, August 2007
    • Robust Self-Keying Mobile Ad Hoc Networks,
      Claude Castellucia, Nitesh Saxena, and Jeong H. Yi,
      Elsevier Computer Networks, Volume 51, Issue 4, March 2007




  • Decentralized Security Services (Nominated for the ACM Doctoral Dissertation Award!)

    Nitesh Saxena,
    Ph.D Dissertation, UC Irvine, August 2006

  • Cryptanalysis of the Schlusselzusatz

    Nitesh Saxena,
    M.S. Dissertation, UC Santa Barbara, March 2002
    Also appears in the chapter on “The Emergence of Cipher Machines” of the book Computer Security and Crypgraphy, by Alan G. Konheim