Nome |
# |
Internet of Things: A survey on the security of IoT frameworks, file e3835195-3b51-72ef-e053-3705fe0ad821
|
2.585
|
ANSWERAUTH: A bimodal behavioral biometric-based user authentication scheme for smartphones, file e3835195-3b4f-72ef-e053-3705fe0ad821
|
811
|
SµV - the Security MicroVisor: a virtualisation-based security middleware for the Internet of Things, file e3835194-5461-72ef-e053-3705fe0ad821
|
346
|
SPEED: Secure provable erasure for class-1 IoT devices, file e3835195-3b53-72ef-e053-3705fe0ad821
|
290
|
Polyglot cerberOS: Resource security, interoperability and multi-tenancy for IoT services on a multilingual platform, file e3835195-3c1e-72ef-e053-3705fe0ad821
|
202
|
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware, file e3835191-c778-72ef-e053-3705fe0ad821
|
183
|
Generative adversarial networks for subdomain enumeration, file 9faff425-6d2c-4607-864c-d3148ebb6fbe
|
176
|
DriverAuth: Behavioral Biometric-based Driver Authentication Mechanism for On-demand Ride and Ridesharing Infrastructure, file e3835195-6c4f-72ef-e053-3705fe0ad821
|
172
|
slimIoT: Scalable Lightweight Attestation Protocol For the Internet of Things, file e3835195-3c21-72ef-e053-3705fe0ad821
|
169
|
null, file e3835195-3af1-72ef-e053-3705fe0ad821
|
151
|
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms, file e3835198-613e-72ef-e053-3705fe0ad821
|
148
|
Time in Privacy Preserving LBSs: An Overlooked Dimension, file e3835191-c77a-72ef-e053-3705fe0ad821
|
147
|
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-metal Embedded Devices, file e3835199-2f90-72ef-e053-3705fe0ad821
|
115
|
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access, file e3835194-b09a-72ef-e053-3705fe0ad821
|
107
|
Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme, file e3835198-5967-72ef-e053-3705fe0ad821
|
95
|
null, file e3835197-1041-72ef-e053-3705fe0ad821
|
64
|
A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems, file ff436583-dd41-4896-be4f-677e6339ac35
|
38
|
Web Cache Deception Escalates!, file c74748e6-be84-42a5-8abc-cd8f28568ca1
|
29
|
Large-Scale Analysis of Style Injection by Relative Path Overwrite, file e3835197-ffb2-72ef-e053-3705fe0ad821
|
23
|
PISTIS: Trusted Computing Architecture for Low-end Embedded Systems, file f67a1579-6dbe-4a04-87a0-f190a8a7e461
|
21
|
Large-Scale Analysis of Style Injection by Relative Path Overwrite, file e3835197-ffb3-72ef-e053-3705fe0ad821
|
20
|
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials, file f690f81f-cf5c-46cd-ba3e-d2b4966aabc2
|
18
|
Design and implementation of a confidentiality and access control solution for publish/subscribe systems, file e3835191-c774-72ef-e053-3705fe0ad821
|
13
|
Reasoning about Relation Based Access Control, file ed0dab4d-2e15-4eb3-ab1b-38203ac5eb90
|
10
|
Mind the CORS, file ee4ab170-cc8b-41b2-985e-40002eb5113c
|
10
|
Relation Based Access Control: Logic and Policies, file 1665bc93-4be6-4e74-ae9a-780517784f8c
|
9
|
PISTIS: Trusted Computing Architecture for Low-end Embedded Systems, file e3835199-57df-72ef-e053-3705fe0ad821
|
9
|
Using Description Logics in Relation Based Access Control, file 42f8f181-be6f-4493-91c3-3e00d070d9d4
|
6
|
Design and Run Time Reasoning with RelBAC, file 59adefc5-9a05-4115-baa3-5946ebd56fe4
|
6
|
Reasoning about Relation Based Access Control, file 906808ac-b8bf-489d-b270-4664b2206742
|
6
|
TruStore: Implementing a Trusted Store for Android, file bb1fd6a6-29ff-4a7c-ab9a-1fa1acbaf9f2
|
6
|
A survey of runtime policy enforcement techniques and implementations, file ce936ac0-e37f-4855-8af1-6404dce91d25
|
6
|
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, file e3835192-4bb4-72ef-e053-3705fe0ad821
|
6
|
SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme, file e3835195-da22-72ef-e053-3705fe0ad821
|
6
|
SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things, file e3835198-142e-72ef-e053-3705fe0ad821
|
6
|
OAuth 2.0 Redirect URI Validation Falls Short, Literally, file f849b095-f1b3-4b15-9e05-4d88c2efc2ec
|
6
|
RelBAC: Relation Based Access Control, file 0bcb4bbf-4dbf-4a6e-a1d8-92a6757a36ee
|
5
|
A Formal Perspective on Relation Based Access Control, file 2911bf85-06f2-4215-950f-9af0b60753ff
|
5
|
Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme, file 7284ffd6-eb22-4562-9433-b691b9421eda
|
5
|
Ontology Driven Community Access Control, file bd7950ae-dd11-4244-8475-d075e0709e9b
|
5
|
Dialerauth: A motion-assisted touch-based smartphone user authentication scheme, file e3835195-fcaf-72ef-e053-3705fe0ad821
|
5
|
OAuth 2.0 Redirect URI Validation Falls Short, Literally, file b509e005-69be-453d-9996-2b4f27d3bdea
|
4
|
Access Control via Lightweight Ontologies, file b6d90a6a-96d4-43d6-b592-b56fe1ed9f87
|
4
|
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call, file e3835192-4f20-72ef-e053-3705fe0ad821
|
4
|
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms, file e3835198-33d7-72ef-e053-3705fe0ad821
|
4
|
Ontology Driven Community Access Control, file 7833de9f-c6d7-47a7-b410-ebcf1274aadd
|
3
|
WiP: Metamodel for Continuous Authorisation and Usage Control, file 7d3abec4-a1c2-47af-9305-d5dc10be6f10
|
3
|
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android, file e3835191-c775-72ef-e053-3705fe0ad821
|
3
|
Efficient run-time solving of RBAC user authorization queries: pushing the envelope., file e3835191-c776-72ef-e053-3705fe0ad821
|
3
|
Mobile biometrics: Towards a comprehensive evaluation methodology, file e3835194-526f-72ef-e053-3705fe0ad821
|
3
|
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks, file e3835191-d1f1-72ef-e053-3705fe0ad821
|
2
|
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement, file e3835192-5289-72ef-e053-3705fe0ad821
|
2
|
Providing Source Location Privacy in Wireless Sensor Networks: A Survey, file e3835192-52e7-72ef-e053-3705fe0ad821
|
2
|
NoisyKey: Tolerating Keyloggers via Keystrokes Hiding, file e3835192-531b-72ef-e053-3705fe0ad821
|
2
|
Virtual private social networks and a facebook implementation, file e3835192-53dc-72ef-e053-3705fe0ad821
|
2
|
Estimating the assessment difficulty of CVSS environmental metrics: An experiment, file e3835194-3f0a-72ef-e053-3705fe0ad821
|
2
|
Security and privacy in vehicular communications: Challenges and opportunities, file e3835194-51c1-72ef-e053-3705fe0ad821
|
2
|
DLoc: Distributed Auditing for Data Location Compliance in Cloud, file e3835194-593b-72ef-e053-3705fe0ad821
|
2
|
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective), file e3835195-3c1a-72ef-e053-3705fe0ad821
|
2
|
Internet of Things: A survey on the security of IoT frameworks, file e3835195-4c53-72ef-e053-3705fe0ad821
|
2
|
slimIoT: Scalable Lightweight Attestation Protocol For the Internet of Things, file e3835197-09d8-72ef-e053-3705fe0ad821
|
2
|
Mind the CORS, file fd80ff18-a510-4e0e-b478-2645ecc106e8
|
2
|
SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things, file 1110053f-1971-4102-bfcd-e60df333e351
|
1
|
The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse, file a9b8689b-ac6c-4b20-99b3-cb3eef9583db
|
1
|
CRePE: Context-Related Policy Enforcement for Android, file e3835192-3c98-72ef-e053-3705fe0ad821
|
1
|
MOSES: Supporting and Enforcing Security Profiles on Smartphones, file e3835192-4bcb-72ef-e053-3705fe0ad821
|
1
|
Unprivileged Black-Box Detection of User-Space Keyloggers., file e3835192-4f8e-72ef-e053-3705fe0ad821
|
1
|
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment., file e3835192-4f92-72ef-e053-3705fe0ad821
|
1
|
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload., file e3835192-4f95-72ef-e053-3705fe0ad821
|
1
|
CerberOS: A Resource-Secure OS for Sharing IoT Devices, file e3835194-5369-72ef-e053-3705fe0ad821
|
1
|
Evaluation of Motion-based Touch-typing Biometrics for online Banking, file e3835194-5677-72ef-e053-3705fe0ad821
|
1
|
PrivICN: Privacy-preserving content retrieval in information-centric networking, file e3835195-3a0f-72ef-e053-3705fe0ad821
|
1
|
Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns, file e3835195-51ea-72ef-e053-3705fe0ad821
|
1
|
Please hold on: Unobtrusive user authentication using smartphone's built-in sensors, file e3835195-9aee-72ef-e053-3705fe0ad821
|
1
|
AirSign: A Gesture-Based Smartwatch User Authentication, file e3835195-9aef-72ef-e053-3705fe0ad821
|
1
|
A Perspective Study Towards Biometric-based Rider Authentication Schemes For Driverless Taxis, file efc396f4-9664-4a31-ab1e-c46629585ed8
|
1
|
Totale |
6.109 |