Segui
Jonathan Voris
Titolo
Citata da
Citata da
Anno
Bait and snitch: Defending computer systems with decoys
JA Voris, J Jermyn, AD Keromytis, S Stolfo
1362013
Accelerometers and randomness: Perfect together
J Voris, N Saxena, T Halevi
Proceedings of the fourth ACM conference on Wireless network security, 115-126, 2011
732011
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags
N Saxena, MB Uddin, J Voris, N Asokan
2011 IEEE International Conference on Pervasive Computing and Communications …, 2011
572011
Driver identification and authentication with active behavior modeling
A Burton, T Parikh, S Mascarenhas, J Zhang, J Voris, NS Artan, W Li
2016 12th International Conference on Network and Service Management (CNSM …, 2016
512016
Data remanence effects on memory-based entropy collection for RFID systems
N Saxena, J Voris
International Journal of Information Security 10, 213-222, 2011
482011
Lost in translation: Improving decoy documents via automated translation
J Voris, N Boggs, SJ Stolfo
2012 IEEE Symposium on Security and Privacy Workshops, 129-133, 2012
472012
Universal device pairing using an auxiliary device
N Saxena, MB Uddin, J Voris
Proceedings of the 4th symposium on Usable privacy and security, 56-67, 2008
472008
Fox in the trap: Thwarting masqueraders via automated decoy document deployment
J Voris, J Jermyn, N Boggs, S Stolfo
Proceedings of the eighth European workshop on system security, 1-7, 2015
422015
Still and silent: Motion detection for enhanced rfid security and privacy without changing the usage model
N Saxena, J Voris
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
382010
Context-aware defenses to RFID unauthorized reading and relay attacks
T Halevi, H Li, D Ma, N Saxena, J Voris, T Xiang
IEEE Transactions on Emerging Topics in Computing 1 (2), 307-318, 2013
352013
We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags
N Saxena, J Voris
Proceedings of the Conference on RFID Security, 2009
292009
Active authentication using file system decoys and user behavior modeling: results of a large scale study
J Voris, Y Song, MB Salem, S Hershkop, S Stolfo
Computers & Security 87, 101412, 2019
222019
Treat'em like other devices: user authentication of multiple personal RFID tags.
N Saxena, MB Uddin, J Voris
SOUPS 9, 1-1, 2009
192009
Sensing-enabled defenses to rfid unauthorized reading and relay attacks without changing the usage model
T Halevi, S Lin, D Ma, AK Prasad, N Saxena, J Voris, T Xiang
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
152012
Pairing devices with good quality output interfaces
N Saxena, J Voris
2008 The 28th International Conference on Distributed Computing Systems …, 2008
152008
Print me if you dare: Firmware modification attacks and the rise of printer malware
A Cui, S Stolfo
132011
Exploring extrinsic motivation for better security: A usability study of scoring-enhanced device pairing
A Gallego, N Saxena, J Voris
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
122013
Performance evaluation of privacy-preserving policy reconciliation protocols
J Voris, S Ioannidis, S Wetzel, U Meyer
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
92007
Playful security: A computer game for secure wireless device pairing
A Gallego, N Saxena, J Voris
2011 16th International Conference on Computer Games (CGAMES), 177-184, 2011
82011
You are what you use: An initial study of authenticating mobile users via application usage
J Voris, Y Song, M Ben Salem, S Stolfo
Proceedings of the 8th EAI International Conference on Mobile Computing …, 2016
72016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20