Rahul Chatterjee
Rahul Chatterjee
Verified email at cs.wisc.edu - Homepage
Cited by
Cited by
Cracking-resistant password vaults using natural language encoders
R Chatterjee, J Bonneau, A Juels, T Ristenpart
2015 IEEE Symposium on Security and Privacy, 481-498, 2015
The spyware used in intimate partner violence
R Chatterjee, P Doerfler, H Orgad, S Havron, J Palmer, D Freed, K Levy, ...
2018 IEEE Symposium on Security and Privacy (SP), 441-458, 2018
The Pythia {PRF} Service
A Everspaugh, R Chaterjee, S Scott, A Juels, T Ristenpart
24th {USENIX} Security Symposium ({USENIX} Security 15), 547-562, 2015
pASSWORD tYPOS and How to Correct Them Securely
R Chatterjee, A Athalye, D Akhawe, A Juels, T Ristenpart
https://www.cs.cornell.edu/~rahul/papers/pwtypos.pdf, 2016
A new distribution-sensitive secure sketch and popularity-proportional hashing
J Woodage, R Chatterjee, Y Dodis, A Juels, T Ristenpart
Annual International Cryptology Conference, 682-710, 2017
Unsupervised and supervised classification of hyperspectral imaging data using projection pursuit and Markov random field segmentation
A Sarkar, A Vulimiri, S Paul, MJ Iqbal, A Banerjee, R Chatterjee, SS Ray
International Journal of Remote Sensing 33 (18), 5799-5818, 2012
The typtop system: Personalized typo-tolerant password checking
R Chatterjee, J Woodage, Y Pnueli, A Chowdhury, T Ristenpart
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Clinical computer security for victims of intimate partner violence
S Havron, D Freed, R Chatterjee, D McCoy, N Dell, T Ristenpart
28th {USENIX} Security Symposium ({USENIX} Security 19), 105-122, 2019
Protocols for checking compromised credentials
L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Beyond credential stuffing: Password similarity models using neural networks
B Pal, T Daniel, R Chatterjee, T Ristenpart
2019 IEEE Symposium on Security and Privacy (SP), 417-434, 2019
" Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
D Freed, S Havron, E Tseng, A Gallardo, R Chatterjee, T Ristenpart, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-24, 2019
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms
R Chatterjee, MS Riazi, T Chowdhury, E Marasco, F Koushanfar, A Juels
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
SLAM Using relational trees and semantics
A Sarkar, R Reiger, S Roy, R Chaterjee, A Datta, JP Gupta, A Sowmyan
Advanced Materials Research 452, 648-653, 2012
MAESTRO: making art-enabled sketches through randomized operations
S Roy, R Chatterjee, P Bhowmick, R Klette
International Conference on Computer Analysis of Images and Patterns, 318-326, 2011
How Secure are our Computer Systems Courses?
M Almansoori, J Lam, E Fang, K Mulligan, AG Soosai Raj, R Chatterjee
Proceedings of the 2020 ACM Conference on International Computing Education …, 2020
Next Generation Password-Based Authentication Systems
R Chatterjee
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.
J Woodage, R Chatterjee, Y Dodis, A Juels, T Ristenpart
IACR Cryptol. ePrint Arch. 2017, 542, 2017
Modeling Password Vaults
M Bernstein, R Chatterjee
Generating Smart Tags and Descriptions for Images from Metadata and WEB
SB A. Sood, P. Bansal, R. Chatterjee, T. Swaroop
A simulation of realistic sketching by randomized pencil strokes
R Chatterjee, S Roy, P Bhowmick
IEEE Technology Students' Symposium, 29-34, 2011
The system can't perform the operation now. Try again later.
Articles 1–20