
Education
University of California, Irvine, Class of 2006
Doctor of Philosophy, Information and Computer Science
University of California, Santa Barbara, Class of 2002
Master of Science, Computer Science
Indian Institute of Technology, Kharagpur, India, Class of 2000
Bachelor of Science, Mathematics and Computing
Courses Taught
- Spring 2011: CS 6903: Modern Cryptography
- Fall 2010: CS392/6813: Computer Security
- Spring 2010: CS 6903: Modern Cryptography
- Fall 2009: CS392/6813: Computer Security
- Spring 2009: CS 6903: Modern Cryptography
- Fall 2008: CS392/6813: Computer Security
- Spring 2008: CS 6903: Modern Cryptography
- Fall 2007: CS392/6813: Computer Security
- Spring 2007: CS 996: Modern Cryptography
- Fall 2006: CS392/681: Computer Security
Research Interests
- Computer and Network Security
- Applied Cryptography
Awards + Distinctions
- ACM Dissertation Award Nomination, 2006
- Best Student Paper Award at the Applied Cryptography and Network Security (ACNS) conference, 2006
Event Participation
Affiliations
General / Collaborative Research
Journal Articles
- T. Perkovic, M. Cagalj, T. Mastelic, N. Saxena, D. Begusic. Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User. IEEE Transactions on Mobile Computing (TMC), to appear, 2011.
- N. Saxena, J. Ekberg, K. Kostiainen, and N. Asokan. Secure Device Pairing based on a Visual Channel: Design and Usability Study. IEEE Transactions on Information Forensics and Security (TIFS), to appear, 2011.
- T. Halevi, N. Saxena and S. Halevi. Tree-based HB Protocols for Privacy-Preserving Authentication of RFID Tags. Journal of Computer Security (JCS) -- Special Issue on RFID System Security, to appear, 2010.
- S. Jarecki and N. Saxena. On the Insecurity of the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol. In IEEE Transactions on Information Forensics and Security (TIFS), Volume 5, Issue 4, December, 2010.
- N. Saxena, and J. H. Yi. Non-Interactive Self-Certification for Long-Lived MobileAd Hoc Networks. In IEEE Transactions on Information Forensics and Security (TIFS), Volume 4, Issue 4, December 2009.
- A. Kumar, N. Saxena, G. Tsudik and E. Uzun. A Comparative Study of Secure Device Pairing Methods. In Elsevier Pervasive and Mobile Computing Journal (PMC), Volume 5, Issue 6, December 2009.
- N. Saxena, G. Tsudik, and J. H. Yi. Efficient Node Admission and Public Key Cryptography in Ad Hoc Networks. In IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 20 No. 2, February 2009.
Other Publications
- A. Bagherzandi, S. Jarecki, N. Saxena and Y. Liu. Password-Protected Secret Sharing. In ACM Conference on Computer and Communications Security (CCS), to appear, October 2011.
- S. T. Peddinti and N. Saxena. On the Limitations of Query Obfuscation Techniques for Location Privacy. In International Conference on Ubiquitous Computing (Ubicomp), September 2011.
- J. Voris, N. Saxena and T. Halevi. Accelerometers and Randomness: Perfect Together. In ACM Conference on Wireless Network Security (WiSec), June 2011.
- N. Saxena, Md.B. Uddin, J. Voris and N. Asokan. Vibrate-to-Unlock: Mobile Phone Assisted User Authentication to Multiple Personal RFID Tags. In International Conference on Pervasive Computing and Communications (PerCom), March 2011.
- A. Kumar, N. Saxena and E. Uzun. Pairing Devices for Social Interactions: A Comparative Usability Evaluation. ACM Conference on Human Factors in Computing Systems (CHI), May 2011.
- T. Halevi and N. Saxena. On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels: The Case of Acoustic Eavesdropping. ACM Conference on Computer and Communications Security (CCS), October 2010
- D. Wu, C. Tang, P. Dhungel, N. Saxena and K. W. Ross. On the Privacy of Peer-Assisted Distribution of Security Patches. IEEE International Conference on Peer-to-Peer Computing (P2P), August 2010.
- R. Nithyanand, N. Saxena, G. Tsudik and E. Uzun. Groupthink: On the Usability of Secure Group Association of Wireless Devices. International Conference on Ubiquitous Computing (Ubicomp), to appear, September 2010.
- S. T. Peddinti and N. Saxena. On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot. Privacy Enhancing Technologies Symposium (PETS), to appear, July 2010.
- A. Kumar, N. Saxena, G. Tsudik and E. Uzun. Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. International Conference on Pervasive Computing and Communications (PerCom), March 2009.
- N. Saxena, Md.B. Uddin and J. Voris. Universal Device Pairing using an Auxiliary Device. In Symposium On Usable Privacy and Security (SOUPS), July 2008.
- N. Saxena. Public Key Cryptography sans Certificates in Ad Hoc Networks. In Applied Cryptography and Network Security (ACNS), June 2006 (Best Student Paper)
- N. Saxena, J. Ekberg, K. Kostiainen, and N. Asokan. Secure Device Pairing based on Visual Channel. In IEEE Symposium on Security and Privacy (S&P), Oakland, extended abstract (6 pages), May 2006.
- N. Saxena, G. Tsudik, and J. H. Yi. Efficient Node Admission for Short-lived MobileAd Hoc Networks. In International Conference on Networking Protocols (ICNP), November 2005.
- S. Jarecki and N. Saxena. Further Simplifications in Proactive RSA Signatures. In Theory of Cryptography Conference (TCC), February 2005.
- N. Saxena, G. Tsudik, and J. H. Yi. Admission Control in Peer-to-Peer: Design and Performance Evaluation. In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) October 2003.
- N. Saxena, G. Tsudik, and J. H. Yi. Admission Control in Peer-to-Peer: Design and Performance Evaluation. In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) October 2003.
Biography
Nitesh Saxena is a Research Professor in the Department of Computer Science and Engineering at Polytechnic Institute of New York University (formerly Polytechnic University). He is also an Assistant Professor in the Department of Computer and Information Sciences at the University of Alabama, Birmingham. He works in the areas of computer and network security, and applied cryptography.
In the year 2011 alone, as a co-author, his articles have or are scheduled to appear in a number of reputed journals and conferences, including: IEEE Transactions on Information Forensics and Security (TIFS), IEEE Transactions on Mobile Computing (TMC), Journal of Computer Security (JCS), ACM Conference on Computer and Communications Security (CCS), International Conference on Ubiquitous Computing (Ubicomp), ACM Conference on Wireless Network Security (WiSec), International Conference on Pervasive Computing and Communications (PerCom), and ACM Conference on Human Factors in Computing Systems (CHI), among others. Prof. Saxena has presented at numerous security and cryptography conferences and workshops. He serves or has served on various program committees, including NDSS, WiSec, PKC, ACNS, SecureComm, RFIDSec, CoNext, ISC, CANS, and Globecom.
Prof. Saxena obtained his PhD in Information and Computer Science from UC Irvine. He holds an MS in Computer Science from UC Santa Barbara, and a Bachelor's degree in Mathematics and Computing from the Indian Institute of Technology, Kharagpur, India. Prof. Saxena's PhD dissertation on "Decentralized Security Services" was nominated for the ACM Dissertation Award, 2006. He is the recipient of the Best Student Paper Award at the Applied Cryptography and Network Security (ACNS) conference 2006. Prof. Saxena's current research is externally supported via multiple grants from NSF, Google, Intel, Nokia and Research in Motion. On the educational front, he was the principal architect and a co-director of NYU-Poly's M.S. Program in Cyber-Security.