Author image not provided
 Ehsan Toreini

 Home Page

  Affiliation history
Bibliometrics: publication history
Average citations per article1.60
Citation Count8
Publication count5
Publication years2013-2017
Available for download2
Average downloads per article124.50
Downloads (cumulative)249
Downloads (12 Months)107
Downloads (6 Weeks)5
Arrow RightAuthor only

See all colleagues of this author


5 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 5 of 5
Sort by:

1 published by ACM
August 2017 ACM Transactions on Privacy and Security (TOPS): Volume 20 Issue 3, August 2017
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 58,   Downloads (Overall): 58

Full text available: PDFPDF
In this article, we propose a novel paper fingerprinting technique based on analyzing the translucent patterns revealed when a light source shines through the paper. These patterns represent the inherent texture of paper, formed by the random interleaving of wooden particles during the manufacturing process. We show that these patterns ...
Keywords: physical unclonable function, Paper fingerprint, biometrics, counterfeiting

April 2017 International Journal of Information Security: Volume 16 Issue 2, April 2017
Publisher: Springer-Verlag
Citation Count: 0

This paper introduces pictorial intelligent system for human identification (PiSHi), an image-based captcha which uses three human cognitive abilities to distinguish humans from machines. The first is the human ability to easily recognise the image's upright orientation. The second is the human brain's ability in recognising a picture's content when ...
Keywords: Security, Usability, Decision making, Image CAPTCHA, User interaction patterns

3 published by ACM
April 2015 ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
Publisher: ACM
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 49,   Downloads (Overall): 191

Full text available: PDFPDF
Conforming to the recent W3C specifications (, modern mobile web browsers generally allow JavaScript code in a web page to access motion and orientation sensor data without the user's permission. The associated risks to user privacy are however not considered in W3C specifications. In this work, for the first time, ...
Keywords: javascript attack, mobile sensors, user privacy, classifier, touch actions, mobile browser

February 2014 Journal of Information Security and Applications: Volume 19 Issue 1, February, 2014
Publisher: Elsevier Science Inc.
Citation Count: 4

Private browsing has been a popular privacy feature built into mainstream browsers since 2005. However, despite the prevalent use, the security of this feature has received little attention from the research community. To the best of our knowledge, no study has existed that systematically evaluates the security of private browsing ...
Keywords: Private browsing, System security, User privacy, Web security

September 2013 Revised Selected Papers of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security - Volume 8247
Publisher: Springer-Verlag New York, Inc.
Citation Count: 0

Private browsing has been a popular privacy feature built into all mainstream browsers since 2005. However, despite its prevalent use, the security of this feature has received little attention from the research community. In this paper, we present an up-to-date and comprehensive analysis of private browsing across four most popular ...

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us