Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols | 0 | 0.34 | 2021 |
Transparency Of Sim Profiles For The Consumer Remote Sim Provisioning Protocol | 0 | 0.34 | 2021 |
Credential Provisioning and Device Configuration with EAP | 0 | 0.34 | 2021 |
XSS Vulnerabilities in Cloud-Application Add-Ons. | 0 | 0.34 | 2020 |
Formal verification of misbinding attacks on secure device pairing and bootstrapping | 0 | 0.34 | 2020 |
Evaluation of Out-of-Band Channels for IoT Security. | 0 | 0.34 | 2020 |
Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB. | 0 | 0.34 | 2020 |
XSS Vulnerabilities in Cloud-Application Add-Ons | 0 | 0.34 | 2020 |
Misbinding Attacks on Secure Device Pairing. | 0 | 0.34 | 2019 |
Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet | 0 | 0.34 | 2019 |
Misbinding Attacks on Secure Device Pairing and Bootstrapping. | 0 | 0.34 | 2019 |
Misbinding Attacks on Secure Device Pairing and Bootstrapping. | 1 | 0.35 | 2019 |
Analysis Of Topology Poisoning Attacks In Software-Defined Networking | 0 | 0.34 | 2019 |
Client-Side Vulnerabilities In Commercial Vpns | 0 | 0.34 | 2019 |
Watch your step! Detecting stepping stones in programmable networks | 0 | 0.34 | 2019 |
Application of Public Ledgers to Revocation in Distributed Access Control. | 0 | 0.34 | 2018 |
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure | 0 | 0.34 | 2018 |
Automated analysis of freeware installers promoted by download portals. | 0 | 0.34 | 2018 |
GPASS: A Password Manager with Group-Based Access Control. | 0 | 0.34 | 2017 |
SynAPTIC: Secure And Persistent connecTIvity for Containers. | 1 | 0.36 | 2017 |
Malware distributions and graph structure of the Web. | 0 | 0.34 | 2017 |
A Large-Scale Analysis of Download Portals and Freeware Installers. | 0 | 0.34 | 2017 |
Correlating file-based malware graphs against the empirical ground truth of DNS graphs. | 1 | 0.36 | 2016 |
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study. | 2 | 0.36 | 2016 |
We know where you are! | 4 | 0.63 | 2016 |
The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs | 1 | 0.36 | 2016 |
A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet. | 0 | 0.34 | 2016 |
Secure and low-power authentication for resource-constrained devices | 1 | 0.34 | 2015 |
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access | 0 | 0.34 | 2015 |
Flexible Management of Cloud-Connected Digital Signage | 0 | 0.34 | 2015 |
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access | 5 | 0.83 | 2015 |
Domain Isolation in a Multi-tenant Software-Defined Network | 1 | 0.35 | 2015 |
Electronic Citizen Identities and Strong Authentication. | 1 | 0.43 | 2015 |
Commitment-Based Device Pairing With Synchronized Drawing | 7 | 0.46 | 2014 |
MoCHA: Augmenting pervasive displays through mobile devices and web-based technologies | 8 | 0.66 | 2014 |
Logout in single sign-on systems: Problems and solutions | 2 | 0.39 | 2014 |
Secure bootstrapping of cloud-managed ubiquitous displays | 5 | 0.49 | 2014 |
Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch. | 18 | 0.83 | 2014 |
Adaptive and context-aware privacy preservation exploiting user interactions in smart environments. | 10 | 0.54 | 2014 |
Denial-of-Service Mitigation for Internet Services. | 3 | 0.42 | 2014 |
Logout in Single Sign-on Systems. | 3 | 0.41 | 2013 |
Strong authentication with mobile phone | 2 | 0.38 | 2012 |
Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers | 20 | 1.24 | 2012 |
Applicability analysis of grid security mechanisms on cloud networking. | 0 | 0.34 | 2011 |
Performance analysis of HIP diet exchange for WSN security establishment. | 12 | 0.86 | 2011 |
Forwarding anomalies in Bloom filter-based multicast | 29 | 1.16 | 2011 |
Security Analysis of Leap-of-Faith Protocols. | 1 | 0.38 | 2011 |
Symbian OS Platform Security Model. | 0 | 0.34 | 2010 |
Can hand-held computers still be better smart cards? | 4 | 0.49 | 2010 |
How to share your favourite search results while preserving privacy and quality | 5 | 0.40 | 2010 |