[ Publications of Shrirang Mare ]

Thesis (1)
  1. Shrirang Mare. Seamless Authentication for Ubiquitous Devices. PhD thesis, Dartmouth College Computer Science, May 2016.
    Note: Available as Dartmouth Computer Science Technical Report TR2016-793.
    Keywords: techreport. [bibtex-entry]

Articles in journals or book chapters (6)
  1. L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven Myers, Shwetak Patel, and Joshua Streiff. Towards a Secure IoT: Directions for IoT Research. IEEE Security \& Privacy, 2020.
    Note: To appear. [bibtex-entry]

  2. Hilda Hadan, Laura Calloway, Shakthidhar Gopavaram, Shrirang Mare, and L. Jean Camp. Ameriecan Privacy Perceptions in the COVID Pandemic. Annals of Disaster Risk Sciences, 2020. [bibtex-entry]

  3. Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies (PoPETs), 2020(2), 2020.
    Note: To appear. [bibtex-entry]

  4. Hamid Mehmood, Tallal Ahmad, Lubna Razaq, Shrirang Mare, Maryem Zafar Usmani, Richard J. Anderson, and Agha Ali Raza. Towards Digitization of Collaborative Savings Among Low-Income Groups. Proceedings of the ACM on Human-Computer Interaction (PACM HCI), 3(CSCW), November 2019.
    Keywords: referred. [bibtex-entry]

  5. Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. SAW: Wristband-based Authentication for Desktop Computers. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2(3), September 2018.
    Keywords: referred. [bibtex-entry]

  6. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth. Mobile Networks and Applications (MONET), 19(3), 2014. [bibtex-entry]

Conference publications (21)
  1. Jacob Abbott, Jayati Dev, Donginn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. In Proceedings of the 2022 European Symposium on Usable Security, EuroUSEC '22, New York, NY, USA, pages 98–110, 2022. Association for Computing Machinery.
    Keywords: Security, user interviews, smart home, IoT, 2FA, privacy. [bibtex-entry]

  2. Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, and L. Jean Camp. Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. In Proceedings of the IEEE Humans and Cyber Security Workshop, December 2019.
    Keywords: referred. [bibtex-entry]

  3. Fahad Pervaiz, Rai Shah Nawaz, Muhammad Umer Ramzan, Maryem Zafar Usmani, Shrirang Mare, Kurtis Heimerl, Faisal Kamiran, Richard J. Anderson, and Lubna Razaq. An Assessment of SMS Fraud in Pakistan. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), July 2019.
    Keywords: referred. [bibtex-entry]

  4. Aditya Vashistha, Richard J. Anderson, and Shrirang Mare. Examining the Use and Non-Use of Mobile Payment Systems for Merchant Payments in India. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), July 2019.
    Keywords: referred. [bibtex-entry]

  5. Shrirang Mare, Logan Girvin, Franziska Roesner, and Tadayoshi Kohno. Consumer Smart Homes: Where We Are and Where We Need to Go. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2019.
    Keywords: referred. [bibtex-entry]

  6. Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. Continuous Smartphone Authentication using Wristbands. In Proceedings of the Workshop on Usable Security and Privacy (USEC), February 2019.
    Keywords: workshop. [bibtex-entry]

  7. Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, and L Jean Camp. Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019), 2019. IEEE.
    Keywords: 2FA. [bibtex-entry]

  8. Kushal Shah, Shrirang Mare, and Richard J. Anderson. Understanding Mobile Money Grievances from Tweets. In Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD), January 2019.
    Keywords: poster. [bibtex-entry]

  9. Rowan Phipps, Shrirang Mare, Peter Ney, Jennifer Webster, and Kurtis Heimerl. ThinSIM-based Attacks on Mobile Money Systems. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), June 2018.
    Keywords: referred. [bibtex-entry]

  10. Aditya Vashistha, Richard J. Anderson, and Shrirang Mare. Examining Security and Privacy Research in Developing Regions. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), June 2018.
    Keywords: referred. [bibtex-entry]

  11. Shrirang Mare, Richard J. Anderson, and Aditya Vashistha. Security and privacy design considerations for low-literate users in developing regions. In Proceedings of the Workshop on Inclusive Privacy and Security at Symposium On Usable Privacy and Security (SOUPS WIPS), July 2017.
    Keywords: position. [bibtex-entry]

  12. Eric Zheng, Shrirang Mare, and Franziska Roesner. End User Security & Privacy Concerns with Smart Homes. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), July 2017.
    Keywords: referred. [bibtex-entry]

  13. Shrirang Mare, Mary Baker, and Jeremy Gummeson. A Study of Authentication in Daily Life. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), June 2016.
    Keywords: referred. [bibtex-entry]

  14. Shrirang Mare, Andr?s Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. ZEBRA: Zero-Effort Bilateral Recurring Authentication. In Proceedings of the IEEE Symposium on Security and Privacy (S{\& }P), May 2014.
    Note: The project has been renamed SAW.
    Keywords: referred. [bibtex-entry]

  15. Aarathi Prasad, Ronald Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul, and David Kotz. Provenance framework for mHealth. In Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), January 2013.
    Keywords: ists, mhealth, privacy, project-tish, security, wearable. [bibtex-entry]

  16. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Passive Biometrics for Pervasive Wearable Devices (Poster paper). In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: authentication, ists, poster, project-tish, security, sensors, wearable. [bibtex-entry]

  17. Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, and David Kotz. An Amulet for Trustworthy Wearable mHealth. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: ists, mhealth, privacy, project-amulet, security, sensors, wearable. [bibtex-entry]

  18. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Adapt-lite: Privacy-aware, Secure, and Efficient mHealth Sensing. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), October 2011.
    Keywords: ists, mhealth, privacy, project-tish, security, wearable, wifi. [bibtex-entry]

  19. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Adaptive security and privacy for mHealth sensing. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2011.
    Note: Short paper.
    Keywords: ists, mhealth, position, privacy, project-tish, security, wearable, wifi. [bibtex-entry]

  20. Shrirang Mare and David Kotz. Is Bluetooth the right technology for mHealth?. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2010.
    Note: Position paper.
    Keywords: ists, mhealth, position, project-tish, security. [bibtex-entry]

  21. Shrirang Mare, David Kotz, and Anurag Kumar. Experimental Validation of Analytical Performance Models for IEEE 802.11 Networks. In Proceedings of the Workshop on Wireless Systems: Advanced Research and Development (WISARD), January 2010.
    Keywords: mobility, project-wifi, wifi. [bibtex-entry]

Internal reports (3)
  1. Shrirang Mare, Andr?s Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. ZEBRA: Zero-Effort Bilateral Recurring Authentication (Companion report). Technical report TR2014-748, Dartmouth Computer Science, May 2014.
    Note: This project has been renamed SAW.
    Keywords: techreport. [bibtex-entry]

  2. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Vocal resonance as a biometric for pervasive wearable devices. Technical report TR2014-747, Dartmouth Computer Science, February 2014.
    Keywords: authentication, ists, project-tish, security, sensors, wearable. [bibtex-entry]

  3. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Hide-n-Sense: Privacy-aware secure mHealth sensing. Technical report TR2011-702, Dartmouth Computer Science, September 2011.
    Keywords: ignore, ists, mhealth, privacy, project-tish, security, wearable, wifi. [bibtex-entry]

Posters and Presentations (4)
  1. Jeremy Gummeson, Mary Baker, Animesh Srivastava, and Shrirang Mare. Controlling devices based on collocation of the devices on a user. U.S. Patent 10,331,916, June 2019.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-entry]

  2. Andr?s D. Molina-Markham, Shrirang Mare, Ronald Peterson, Jr., and David Kotz. Continuous seamless mobile device authentication using a separate electronic wearable apparatus. U.S. Patent 9,961,547, May 2018.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-entry]

  3. David Kotz, Ryan Halter, Cory Cornelius, Jacob Sorber, Minho Shin, Ronald Peterson, Shrirang Mare, Aarathi Prasad, Joseph Skinner, and Andr?s Molina-Markham. Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric. U.S. Patent 9,936,877; International Patent Application WO2013096954A1, April 2018.
    Keywords: ctbh, ists, mhealth, patent, project-amulet, security, sensors, wearable. [bibtex-entry]

  4. Shrirang Mare, Andr?s Molina-Markham, Ronald Peterson, and David Kotz. System, method and authorization device for biometric access control to digital devices. U.S. Patent 9,832,206; International Patent Application WO2014153528A2, November 2017.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:16 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House