default search action
Bruno Crispo
Person information
- affiliation: University of Trento, DISI, Povo, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo:
FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems. ACM Trans. Internet Things 5(3): 19:1-19:29 (2024) - [c155]Matteo Golinelli, Bruno Crispo:
Hidden Web Caches Discovery. RAID 2024: 65-76 - [c154]Hussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo Dimitrakos, Bruno Crispo:
Obligation Management Framework for Usage Control. SACMAT 2024 - [i14]Bruno Crispo, Marco Roveri, Sandro Pinto, Tiago Gomes, Aljosa Pasic, Ákos Milánkovich, David Puron, Ainara Garcia, Ziga Putrle, Peter Ten, Malvina Catalano:
CROSSCON: Cross-platform Open Security Stack for Connected Devices. CoRR abs/2406.03401 (2024) - [i13]Matteo Golinelli, Bruno Crispo:
Hidden Web Caches Discovery. CoRR abs/2407.16303 (2024) - 2023
- [j48]Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo:
AI-enabled IoT penetration testing: state-of-the-art and research challenges. Enterp. Inf. Syst. 17(9) (2023) - [j47]Sandeep Gupta, Carsten Maple, Bruno Crispo, Kiran B. Raja, Artsiom Yautsiukhin, Fabio Martinelli:
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes. Pattern Recognit. 139: 109453 (2023) - [j46]Majid Salehi, Luca Degani, Marco Roveri, Danny Hughes, Bruno Crispo:
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices. IEEE Trans. Dependable Secur. Comput. 20(2): 1124-1138 (2023) - [c153]Tommaso Innocenti, Matteo Golinelli, Kaan Onarlioglu, Seyed Ali Mirheidari, Bruno Crispo, Engin Kirda:
OAuth 2.0 Redirect URI Validation Falls Short, Literally. ACSAC 2023: 256-267 - [c152]Luca Degani, Majid Salehi, Fabio Martinelli, Bruno Crispo:
μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems. ESORICS (4) 2023: 311-331 - [c151]Matteo Golinelli, Francesco Bonomi, Bruno Crispo:
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse. ESORICS Workshops (2) 2023: 459-475 - [c150]Maqsood Ahmad, Francesco Bergadano, Valerio Costamagna, Bruno Crispo, Giovanni Russello:
AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions. ISCC 2023: 1-7 - [c149]Sandeep Gupta, Bruno Crispo:
Device Behavioral Profiling for Autonomous Protection Using Deep Neural Networks. ISCC 2023: 474-478 - [c148]Matteo Golinelli, Elham Arshad, Dmytro Kashchuk, Bruno Crispo:
Mind the CORS. TPS-ISA 2023: 213-221 - [i12]Matteo Golinelli, Francesco Bonomi, Bruno Crispo:
The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse. CoRR abs/2309.07782 (2023) - 2022
- [j45]Majid Salehi, Gilles De Borger, Danny Hughes, Bruno Crispo:
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting. Comput. Networks 205: 108744 (2022) - [j44]Sandeep Gupta, Mouna Kacimi, Bruno Crispo:
Step & turn - A novel bimodal behavioral biometric-based user verification scheme for physical access control. Comput. Secur. 118: 102722 (2022) - [j43]Elham Arshad, Michele Benolli, Bruno Crispo:
Practical attacks on Login CSRF in OAuth. Comput. Secur. 121: 102859 (2022) - [j42]Sandeep Gupta, Kiran B. Raja, Fabio Martinelli, Bruno Crispo:
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis. J. Inf. Secur. Appl. 71: 103357 (2022) - [j41]Sandeep Gupta, Rajesh Kumar, Mouna Kacimi, Bruno Crispo:
IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones. Pattern Recognit. Lett. 157: 8-15 (2022) - [j40]Michele Grisafi, Mahmoud Ammar, Kasim Sinan Yildirim, Bruno Crispo:
MPI: Memory Protection for Intermittent Computing. IEEE Trans. Inf. Forensics Secur. 17: 3597-3610 (2022) - [c147]Michele Grisafi, Mahmoud Ammar, Bruno Crispo:
On the (in)security of Memory Protection Units : A Cautionary Note. CSR 2022: 157-162 - [c146]Elham Arshad, Giuliano Turri, Bruno Crispo:
Mollywood: Subtitles as an attack vector. ISCC 2022: 1-7 - [c145]Sandeep Gupta, Tommaso Sacchetti, Bruno Crispo:
End-to-End Encryption for Securing Communications in Industry 4.0. MENACOMM 2022: 153-158 - [c144]Luca Degani, Francesco Bergadano, Seyed Ali Mirheidari, Fabio Martinelli, Bruno Crispo:
Generative adversarial networks for subdomain enumeration. SAC 2022: 1636-1645 - [c143]Ali Hariri, Amjad Ibrahim, Theo Dimitrakos, Bruno Crispo:
WiP: Metamodel for Continuous Authorisation and Usage Control. SACMAT 2022: 43-48 - [c142]Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo:
Web Cache Deception Escalates! USENIX Security Symposium 2022: 179-196 - [c141]Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo:
PISTIS: Trusted Computing Architecture for Low-end Embedded Systems. USENIX Security Symposium 2022: 3843-3860 - [e16]Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo:
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers. Communications in Computer and Information Science 1557, Springer 2022, ISBN 978-981-19-0467-7 [contents] - 2021
- [j39]Attaullah Buriro, Sandeep Gupta, Artsiom Yautsiukhin, Bruno Crispo:
Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme. J. Signal Process. Syst. 93(9): 989-1006 (2021) - [c140]Tommaso Innocenti, Seyed Ali Mirheidari, Amin Kharraz, Bruno Crispo, Engin Kirda:
You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures. DIMVA 2021: 1-20 - [c139]Michele Benolli, Seyed Ali Mirheidari, Elham Arshad, Bruno Crispo:
The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild. DIMVA 2021: 21-41 - [c138]Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan:
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. SEC 2021: 36-50 - [c137]Mahmoud Ammar, Bruno Crispo, Ivan De Oliveira Nunes, Gene Tsudik:
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation. WISEC 2021: 37-47 - [c136]Attaullah Buriro, Francesco Ricci, Bruno Crispo:
SWIPEGAN: Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User Authentication. WiseML@WiSec 2021: 85-90 - 2020
- [j38]Maqsood Ahmad, Valerio Costamagna, Bruno Crispo, Francesco Bergadano, Yury Zhauniarovich:
StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications. J. Syst. Softw. 159 (2020) - [j37]Mahmoud Ammar, Bruno Crispo:
WISE: A Lightweight Intelligent Swarm Attestation Scheme for the Internet of Things. ACM Trans. Internet Things 1(3): 19:1-19:30 (2020) - [c135]Mahmoud Ammar, Bruno Crispo:
Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices. ACSAC 2020: 717-732 - [c134]Mahmoud Ammar, Bruno Crispo, Gene Tsudik:
SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices. ICCPS 2020: 247-258 - [c133]Majid Salehi, Danny Hughes, Bruno Crispo:
μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability. RAID 2020: 381-395 - [c132]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson:
Cached and Confused: Web Cache Deception in the Wild. USENIX Security Symposium 2020: 665-682
2010 – 2019
- 2019
- [j36]César Bernardini, Samuel Marchal, Muhammad Rizwan Asghar, Bruno Crispo:
PrivICN: Privacy-preserving content retrieval in information-centric networking. Comput. Networks 149: 13-28 (2019) - [j35]Sandeep Gupta, Attaullah Buriro, Bruno Crispo:
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms. Comput. Secur. 83: 122-139 (2019) - [j34]Sandeep Gupta, Attaullah Buriro, Bruno Crispo:
DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure. ICT Express 5(1): 16-20 (2019) - [j33]Attaullah Buriro, Bruno Crispo, Mauro Conti:
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones. J. Inf. Secur. Appl. 44: 89-103 (2019) - [j32]Mahmoud Ammar, Bruno Crispo, Bart Jacobs, Danny Hughes, Wilfried Daniels:
SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things. IEEE Trans. Dependable Secur. Comput. 16(5): 885-901 (2019) - [c131]Ashok Samraj Thangarajan, Mahmoud Ammar, Bruno Crispo, Danny Hughes:
Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs. CAVS 2019: 1-5 - [c130]Majid Salehi, Danny Hughes, Bruno Crispo:
MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks. DSC 2019: 1-8 - [c129]Sandeep Gupta, Attaullah Buriro, Bruno Crispo:
A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices. ETAA@ESORICS 2019: 156-170 - [c128]Sandeep Gupta, Attaullah Buriro, Bruno Crispo:
SmartHandle: A Novel Behavioral Biometric-based Authentication Scheme for Smart Lock Systems. ICBEA 2019: 15-22 - [c127]Majid Salehi, Morteza Amini, Bruno Crispo:
Detecting malicious applications using system services request behavior. MobiQuitous 2019: 200-209 - [c126]Hassaan Janjua, Mahmoud Ammar, Bruno Crispo, Danny Hughes:
Towards a standards-compliant pure-software trusted execution environment for resource-constrained embedded devices. SysTEX@SOSP 2019: 6:1-6:6 - [c125]Mohammed B. M. Kamel, Bruno Crispo, Péter Ligeti:
A Decentralized and Scalable Model for Resource Discovery in IoT Network. WiMob 2019: 1-4 - [i11]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William K. Robertson:
Cached and Confused: Web Cache Deception in the Wild. CoRR abs/1912.10190 (2019) - 2018
- [j31]Mahmoud Ammar, Giovanni Russello, Bruno Crispo:
Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38: 8-27 (2018) - [j30]Sandeep Gupta, Attaullah Buriro, Bruno Crispo:
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access. Mob. Inf. Syst. 2018: 2649598:1-2649598:16 (2018) - [c124]Mahmoud Ammar, Wilfried Daniels, Bruno Crispo, Danny Hughes:
SPEED: Secure Provable Erasure for Class-1 IoT Devices. CODASPY 2018: 111-118 - [c123]Attaullah Buriro, Bruno Crispo, Sandeep Gupta, Filippo Del Frari:
DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme. CODASPY 2018: 267-276 - [c122]Mahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo:
SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of Things. DSC 2018: 1-8 - [c121]Attaullah Buriro, Bruno Crispo, Mojtaba Eskandari, Sandeep Gupta, Athar Mahboob, Rutger Van Acker:
SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme. ETAA@ESORICS 2018: 30-37 - [c120]Attaullah Buriro, Rutger Van Acker, Bruno Crispo, Athar Mahboob:
AirSign: A Gesture-Based Smartwatch User Authentication. ICCST 2018: 1-5 - [c119]Sven Akkermans, Bruno Crispo, Wouter Joosen, Danny Hughes:
Polyglot CerberOS: Resource Security, Interoperability and Multi-Tenancy for IoT Services on a Multilingual Platform. MobiQuitous 2018: 59-68 - [c118]Mahmoud Ammar, Mahdi Washha, Bruno Crispo:
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective). WiMob 2018: 1-8 - [c117]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. WWW 2018: 237-246 - [i10]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. CoRR abs/1811.00917 (2018) - [i9]Mahmoud Ammar, Mahdi Washha, Bruno Crispo:
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective). CoRR abs/1811.07366 (2018) - [i8]Mahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo:
slimIoT: Scalable Lightweight Attestation Protocol For the Internet of Things. CoRR abs/1811.07367 (2018) - 2017
- [j29]Mojtaba Eskandari, Bruno Kessler, Maqsood Ahmad, Anderson Santana de Oliveira, Bruno Crispo:
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps. Proc. Priv. Enhancing Technol. 2017(1): 118-131 (2017) - [j28]César Bernardini, Muhammad Rizwan Asghar, Bruno Crispo:
Security and privacy in vehicular communications: Challenges and opportunities. Veh. Commun. 10: 13-28 (2017) - [c116]Attaullah Buriro, Sandeep Gupta, Bruno Crispo:
Evaluation of Motion-Based Touch-Typing Biometrics for Online Banking. BIOSIG 2017: 219-226 - [c115]Mojtaba Eskandari, Bruno Crispo, Anderson Santana de Oliveira:
DLoc: Distributed Auditing for Data Location Compliance in Cloud. DPM/CBT@ESORICS 2017: 202-218 - [c114]Sven Akkermans, Wilfried Daniels, Gowri Sankar Ramachandran, Bruno Crispo, Danny Hughes:
CerberOS: A Resource-Secure OS for Sharing IoT Devices. EWSN 2017: 96-107 - [c113]Luca Allodi, Silvio Biagioni, Bruno Crispo, Katsiaryna Labunets, Fabio Massacci, Wagner Santos:
Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment. FDSE 2017: 23-39 - [c112]Zahid Akhtar, Attaullah Buriro, Bruno Crispo, Tiago H. Falk:
Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns. GlobalSIP 2017: 1368-1372 - [c111]Attaullah Buriro, Zahid Akhtar, Bruno Crispo, Sandeep Gupta:
Mobile biometrics: Towards a comprehensive evaluation methodology. ICCST 2017: 1-6 - [c110]Attaullah Buriro, Bruno Crispo, Yury Zhauniarovich:
Please hold on: Unobtrusive user authentication using smartphone's built-in sensors. ISBA 2017: 1-8 - [c109]Wilfried Daniels, Danny Hughes, Mahmoud Ammar, Bruno Crispo, Nelson Matthys, Wouter Joosen:
SμV - the security microvisor: a virtualisation-based security middleware for the internet of things. Middleware Industry 2017: 36-42 - [c108]Maqsood Ahmad, Valerio Costamagna, Bruno Crispo, Francesco Bergadano:
TeICC: targeted execution of inter-component communications in Android. SAC 2017: 1747-1752 - 2016
- [j27]Alvaro A. Cárdenas, Bruno Crispo:
Cyber-Physical Security and Privacy [Guest editors' introduction]. IEEE Internet Comput. 20(5): 6-8 (2016) - [c107]Attaullah Buriro, Zahid Akhtar, Bruno Crispo, Filippo Del Frari:
Age, Gender and Operating-Hand Estimation on Smart Mobile Devices. BIOSIG 2016: 273-280 - [c106]Muhammad Rizwan Asghar, César Bernardini, Bruno Crispo:
PROTECTOR: Privacy-preserving information lookup in content-centric networks. ICC 2016: 1-7 - [c105]César Bernardini, Bruno Crispo:
Analyzing Gateways' Impact on Caching for Micro CDNs based on CCN. DCNET 2016: 19-26 - [c104]Maqsood Ahmad, Bruno Crispo, Teklay Gebremichael:
Empirical Analysis on the Use of Dynamic Code Updates in Android and Its Security Implications. NordSec 2016: 119-134 - [c103]Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Konrad S. Wrona:
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. IEEE Symposium on Security and Privacy Workshops 2016: 276-285 - 2015
- [j26]Mauro Conti, Bruno Crispo, Daniele Diodati, Jukka K. Nurminen, Cristina M. Pinotti, Taavi Teemaa:
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones. IEEE Trans. Parallel Distributed Syst. 26(10): 2778-2790 (2015) - [c102]Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
Towards Black Box Testing of Android Apps. ARES 2015: 501-510 - [c101]Yury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. CODASPY 2015: 37-48 - [c100]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo:
E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud. FiCloud 2015: 135-144 - [c99]Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Konrad S. Wrona:
Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics. ICIAP Workshops 2015: 27-34 - [c98]Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Jeffrey Klardie, Konrad S. Wrona:
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones. PASSWORDS 2015: 45-61 - [e15]Javier López, Indrajit Ray, Bruno Crispo:
Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8924, Springer 2015, ISBN 978-3-319-17126-5 [contents] - 2014
- [j25]Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes:
MOSES: Supporting and Enforcing Security Profiles on Smartphones. IEEE Trans. Dependable Secur. Comput. 11(3): 211-223 (2014) - [c97]Amir Herzberg, Haya Schulmann, Bruno Crispo:
Less is more: cipher-suite negotiation for DNSSEC. ACSAC 2014: 346-355 - [c96]Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello:
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. AsiaCCS 2014: 135-146 - [c95]Mojtaba Eskandari, Anderson Santana de Oliveira, Bruno Crispo:
VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud. CloudCom 2014: 86-94 - [c94]Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser:
FSquaDRA: Fast Detection of Repackaged Applications. DBSec 2014: 130-145 - 2013
- [j24]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOONERBAC: Enforcing security policies in outsourced environments. Comput. Secur. 35: 2-24 (2013) - [j23]Mauro Conti, Jeroen Willemsen, Bruno Crispo:
Providing Source Location Privacy in Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutorials 15(3): 1238-1280 (2013) - [j22]Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Windows Mobile LiveSD Forensics. J. Netw. Comput. Appl. 36(2): 677-684 (2013) - [j21]Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo:
Unprivileged Black-Box Detection of User-Space Keyloggers. IEEE Trans. Dependable Secur. Comput. 10(1): 40-52 (2013) - [j20]Earlence Fernandes, Bruno Crispo, Mauro Conti:
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment. IEEE Trans. Inf. Forensics Secur. 8(6): 1027-1037 (2013) - [j19]Bruno P. S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo:
Hybrid Static-Runtime Information Flow and Declassification Enforcement. IEEE Trans. Inf. Forensics Secur. 8(8): 1294-1305 (2013) - [j18]Kemal Bicakci, Bruno Crispo, Gabriele Oligeri:
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload. ACM Trans. Internet Techn. 13(2): 5:1-5:27 (2013) - [j17]Mauro Conti, Arbnor Hasani, Bruno Crispo:
Virtual private social networks and a facebook implementation. ACM Trans. Web 7(3): 14:1-14:31 (2013) - [c93]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, Mihaela Ion:
Supporting complex queries and access policies for multi-user encrypted databases. CCSW 2013: 77-88 - [c92]Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo:
Enabling trusted stores for android. CCS 2013: 1345-1348 - [c91]Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
CREPUSCOLO: A collusion resistant privacy preserving location verification system. CRiSIS 2013: 1-9 - [c90]Maarten Decat, Bert Lagaisse, Wouter Joosen, Bruno Crispo:
Introducing concurrency in policy-based access control. MW4NextGen@Middleware 2013: 3:1-3:6 - [c89]Maarten Decat, Bert Lagaisse, Dimitri Van Landuyt, Bruno Crispo, Wouter Joosen:
Federated Authorization for Software-as-a-Service Applications. OTM Conferences 2013: 342-359 - [e14]Bruno Crispo, Ravi S. Sandhu, Nora Cuppens-Boulahia, Mauro Conti, Jean-Louis Lanet:
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013. IEEE Computer Society 2013 [contents] - [i7]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. CoRR abs/1306.4828 (2013) - [i6]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments. CoRR abs/1308.3489 (2013) - [i5]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. IACR Cryptol. ePrint Arch. 2013: 277 (2013) - [i4]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments. IACR Cryptol. ePrint Arch. 2013: 587 (2013) - 2012
- [j16]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Design and implementation of a confidentiality and access control solution for publish/subscribe systems. Comput. Networks 56(7): 2014-2037 (2012) - [j15]Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android. IEEE Trans. Inf. Forensics Secur. 7(5): 1426-1438 (2012) - [c88]Cristiano Giuffrida, Stefano Ortolani, Bruno Crispo:
Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions. AsiaCCS 2012: 10-11 - [c87]Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
Demonstrating the effectiveness of MOSES for separation of execution modes. CCS 2012: 998-1000 - [c86]Alessandro Armando, Silvio Ranise, Fatih Turkmen, Bruno Crispo:
Efficient run-time solving of RBAC user authorization queries: pushing the envelope. CODASPY 2012: 241-248 - [c85]Mauro Conti, Daniele Diodati, Cristina M. Pinotti, Bruno Crispo:
Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption. GreenCom 2012: 269-276 - [c84]Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes:
MOSES: supporting operation modes on smartphones. SACMAT 2012: 3-12 - [c83]Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. Security Protocols Workshop 2012: 199-213 - [c82]Stefano Ortolani, Bruno Crispo:
NoisyKey: Tolerating Keyloggers via Keystrokes Hiding. HotSec 2012 - [e13]Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello:
Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 375, Springer 2012, ISBN 978-3-642-31667-8 [contents] - 2011
- [c81]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. ARES 2011: 99-108 - [c80]Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo:
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. AsiaCCS 2011: 249-259 - [c79]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo:
Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC. CCS 2011: 841-844 - [c78]Mauro Conti, Arbnor Hasani, Bruno Crispo:
Virtual private social networks. CODASPY 2011: 39-50 - [c77]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
Securing Data Provenance in the Cloud. iNetSeC 2011: 145-160 - [c76]Gabriela Gheorghe, Bruno Crispo, Roberto Carbone, Lieven Desmet, Wouter Joosen:
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement. Middleware 2011: 350-369 - [c75]Fatih Turkmen, Eunjin Jung, Bruno Crispo:
Towards Run-Time Verification in Access Control. POLICY 2011: 25-32 - [c74]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Enforcing Multi-user Access Policies to Encrypted Cloud Databases. POLICY 2011: 175-177 - [c73]Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo:
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware. RAID 2011: 81-100 - [c72]Fausto Giunchiglia, Bruno Crispo, Rui Zhang:
Access Control via Lightweight Ontologies. ICSC 2011: 352-355 - [c71]Giovanni Russello, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
YAASE: Yet Another Android Security Extension. SocialCom/PASSAT 2011: 1033-1040 - [c70]Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Events privacy in WSNs: A new model and its application. WOWMOM 2011: 1-9 - [e12]Bruce Christianson, Bruno Crispo, James A. Malcolm, Frank Stajano:
Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7114, Springer 2011, ISBN 978-3-642-25866-4 [contents] - [i3]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. IACR Cryptol. ePrint Arch. 2011: 25 (2011) - 2010
- [j14]Rui Zhang, Fausto Giunchiglia, Bruno Crispo, Lingyang Song:
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment. Wirel. Pers. Commun. 55(1): 5-17 (2010) - [c69]Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti:
A Secure and Scalable Grid-Based Content Management System. ARES 2010: 404-409 - [c68]Mihaela Ion, Giovanni Russello, Bruno Crispo:
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health. CCS 2010: 696-698 - [c67]Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti:
Time Warp: How Time Affects Privacy in LBSs. ICICS 2010: 325-339 - [c66]Gabriela Gheorghe, Bruno Crispo, Daniel Schleicher, Tobias Anstett, Frank Leymann, Ralph Mietzner, Ganna Monakova:
Combining Enforcement Strategies in Service Oriented Architectures. ICSOC 2010: 288-302 - [c65]Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Event Handoff Unobservability in WSN. iNetSec 2010: 20-28 - [c64]Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo:
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement. IFIPTM 2010: 63-78 - [c63]Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo:
CRePE: Context-Related Policy Enforcement for Android. ISC 2010: 331-345 - [c62]Alessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih Turkmen, Rui Zhang:
Reasoning about Relation Based Access Control. NSS 2010: 231-238 - [c61]Gabriela Gheorghe, Paolo Mori, Bruno Crispo, Fabio Martinelli:
Enforcing UCON Policies on the Enterprise Service Bus. OTM Conferences (2) 2010: 876-893 - [c60]Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo:
Bait Your Hook: A Novel Detection Technique for Keyloggers. RAID 2010: 198-217 - [c59]Fatih Turkmen, Bruno Crispo, Pietro Mazzoleni:
A service-based context management framework for cross-enterprise collaboration. SAC 2010: 2443-2450 - [c58]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Providing Confidentiality in Content-based Publish/subscribe Systems. SECRYPT 2010: 287-292 - [c57]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. SecureComm 2010: 272-289 - [c56]Bruno Crispo, Gabriela Gheorghe, Valentina Di Giacomo, Domenico Presenza:
MASTER as a Security Management Tool for Policy Compliance. ServiceWave 2010: 213-214 - [c55]Stefano Ortolani, Mauro Conti, Bruno Crispo:
Censorship-Resilient Communications through Information Scattering. Security Protocols Workshop 2010: 82-89 - [e11]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Lecture Notes in Computer Science 5964, Springer 2010, ISBN 978-3-642-17772-9 [contents]
2000 – 2009
- 2009
- [j13]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
Efficient integration of fine-grained access control and resource brokering in grid. J. Supercomput. 49(1): 108-126 (2009) - [c54]Rui Zhang, Alessandro Artale, Fausto Giunchiglia, Bruno Crispo:
Using Description Logics in Relation Based Access Control. Description Logics 2009 - [c53]Fausto Giunchiglia, Rui Zhang, Bruno Crispo:
Ontology Driven Community Access Control. SPOT@ESWC 2009 - [c52]Eunjin Jung, Bruno Crispo, Lasantha Ranaweera:
An efficient and scalable algorithm for policy compatibility in service virtualization. GRID 2009: 58-65 - [c51]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. SEC 2009: 342-352 - [c50]Mouna Kacimi, Stefano Ortolani, Bruno Crispo:
Anonymous opinion exchange over untrusted social networks. SNS 2009: 26-32 - [e10]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Lecture Notes in Computer Science 5087, Springer 2009, ISBN 978-3-642-04903-3 [contents] - 2008
- [j12]Srijith Krishnan Nair, Ron Gerrits, Bruno Crispo, Andrew S. Tanenbaum:
Turning Teenagers into Stores. Computer 41(2): 58-62 (2008) - [j11]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
XACML Policy Integration Algorithms. ACM Trans. Inf. Syst. Secur. 11(1): 4:1-4:29 (2008) - [c49]Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo:
Enforcing DRM policies across applications. Digital Rights Management Workshop 2008: 87-94 - [c48]Srijith Krishnan Nair, Erik Zentveld, Bruno Crispo, Andrew S. Tanenbaum:
Floodgate: A Micropayment Incentivized P2P Content Delivery Network. ICCCN 2008: 291-297 - [c47]Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino:
P-CDN: Extending access control capabilities of P2P systems to provide CDN services. ISCC 2008: 480-486 - [c46]Mario Gerla, Roberto G. Cascella, Zhen Cao, Bruno Crispo, Roberto Battiti:
An efficient weak secrecy scheme for network coding data dissemination in VANET. PIMRC 2008: 1-5 - [c45]Fausto Giunchiglia, Rui Zhang, Bruno Crispo:
RelBAC: Relation Based Access Control. SKG 2008: 3-11 - [c44]Fatih Turkmen, Bruno Crispo:
Performance evaluation of XACML PDP implementations. SWS 2008: 37-44 - [c43]Roberto G. Cascella, Zhen Cao, Mario Gerla, Bruno Crispo, Roberto Battiti:
Weak data secrecy via obfuscation in network coding based content distribution. Wireless Days 2008: 1-5 - [i2]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. IACR Cryptol. ePrint Arch. 2008: 87 (2008) - 2007
- [j10]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker:
Design and implementation of a secure wide-area object middleware. Comput. Networks 51(10): 2484-2513 (2007) - [c42]Iulia Ion, Boris Dragovic, Bruno Crispo:
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. ACSAC 2007: 233-242 - [c41]Damiano Bolzoni, Bruno Crispo, Sandro Etalle:
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. LISA 2007: 141-152 - [c40]Srijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum:
A Hybrid PKI-IBC Based Ephemerizer System. SEC 2007: 241-252 - [c39]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Instructions to Reviewers. Security Protocols Workshop 2007: 256 - [c38]Srijith Krishnan Nair, Ivan Djordjevic, Bruno Crispo, Theodosis Dimitrakos:
Secure web service federation management using tpm virtualisation. SWS 2007: 73-82 - [c37]Srijith Krishnan Nair, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum:
A Virtual Machine Based Information Flow Control System for Policy Enforcement. REM@ESORICS 2007: 3-16 - [e9]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers. Lecture Notes in Computer Science 4631, Springer 2007, ISBN 978-3-540-77155-5 [contents] - 2006
- [j9]Andrew S. Tanenbaum, Chandana Gamage, Bruno Crispo:
Taking Sensor Networks from the Lab to the Jungle. Computer 39(8): 98-100 (2006) - [j8]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
RFID malware: truth vs. myth. IEEE Secur. Priv. 4(4): 70-72 (2006) - [j7]Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum:
RFID malware: Design principles and examples. Pervasive Mob. Comput. 2(4): 405-426 (2006) - [j6]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
The Evolution of RFID Security. IEEE Pervasive Comput. 5(1): 62-69 (2006) - [c36]Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Security for the Mythical Air-Dropped Sensor Network. ISCC 2006: 41-47 - [c35]Melanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum:
A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). LISA 2006: 89-102 - [c34]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
Is Your Cat Infected with a Computer Virus?. PerCom 2006: 169-179 - [c33]Pietro Mazzoleni, Elisa Bertino, Bruno Crispo:
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! SACMAT 2006: 219-227 - [c32]Chandana Gamage, Ben Gras, Bruno Crispo, Andrew S. Tanenbaum:
An Identity-based Ring Signature Scheme with Enhanced Privacy. SecureComm 2006: 1-5 - [c31]Srijith K. Nair, Bruno Crispo, Andrew S. Tanenbaum:
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. Security Protocols Workshop 2006: 26-31 - [e8]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers. Lecture Notes in Computer Science 3957, Springer 2006, ISBN 3-540-40925-4 [contents] - [i1]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes. IACR Cryptol. ePrint Arch. 2006: 212 (2006) - 2005
- [c30]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. IEEE SCC 2005: 77-86 - [c29]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. ACISP 2005: 184-194 - [c28]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Counting Abuses Using Flexible Off-line Credentials. ACISP 2005: 548-559 - [c27]Bruno Crispo, Swaminathan Sivasubramanian, Pietro Mazzoleni, Elisa Bertino:
P-Hera: Scalable fine-grained access control for P2P infrastructures. ICPADS (1) 2005: 585-591 - [c26]Bogdan C. Popescu, Maarten van Steen, Bruno Crispo, Andrew S. Tanenbaum, Jan Sacha, Ihor Kuz:
Securely Replicated Web Documents. IPDPS 2005 - [c25]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
How to incorporate revocation status information into the trust metrics for public-key certification. SAC 2005: 1594-1598 - [c24]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. Security Protocols Workshop 2005: 51-59 - [c23]Srijith Krishnan Nair, Bogdan C. Popescu, Chandana Gamage, Bruno Crispo, Andrew S. Tanenbaum:
Enabling DRM-Preserving Digital Content Redistribution. CEC 2005: 151-158 - [e7]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers. Lecture Notes in Computer Science 3364, Springer 2005, ISBN 3-540-28389-7 [contents] - 2004
- [c22]Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum:
Symmetric Key Authentication Services Revisited. ACISP 2004: 248-261 - [c21]Elisa Bertino, Bruno Crispo, Pietro Mazzoleni:
Supporting Multi-Dimensional Trustworthiness for Grid Workflows. DELOS 2004: 195-204 - [c20]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Frank Kamperman:
A DRM security architecture for home networks. Digital Rights Management Workshop 2004: 1-10 - [c19]Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elena Ferrari:
Towards Supporting Fine-Grained Access Control for Grid Resources. FTDCS 2004: 59-65 - [c18]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum:
Support for multi-level security policies in DRM architectures. NSPW 2004: 3-9 - [c17]Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu:
Security for grid-based computing systems issues and challenges. SACMAT 2004: 125 - [c16]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum:
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. Security Protocols Workshop 2004: 213-220 - [e6]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers. Lecture Notes in Computer Science 2845, Springer 2004, ISBN 3-540-20830-5 [contents] - 2003
- [c15]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum:
Secure Data Replication over Untrusted Hosts. HotOS 2003: 121-126 - [c14]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum:
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. ISCC 2003: 225-231 - [c13]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman:
Enforcing Security Policies for Distributed Objects Applications. Security Protocols Workshop 2003: 119-130 - 2002
- [j5]Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Individual Authentication in Multiparty Communications. Comput. Secur. 21(8): 719-735 (2002) - [e5]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers. Lecture Notes in Computer Science 2467, Springer 2002, ISBN 3-540-44263-4 [contents] - 2001
- [c12]Bruno Crispo, Giancarlo Ruffo:
Reasoning about Accountability within Delegation. ICICS 2001: 251-260 - [c11]Bruno Crispo:
Delegation Protocols for Electronic Commerce. ISCC 2001: 674-679 - [e4]Bruce Christianson, Bruno Crispo, Michael Roe:
Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers. Lecture Notes in Computer Science 2133, Springer 2001, ISBN 3-540-42566-7 [contents] - 2000
- [j4]Bruno Crispo, Peter Landrock, Václav Matyás Jr.:
WWW security and trusted third party services. Future Gener. Comput. Syst. 16(4): 331-341 (2000) - [c10]Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Individual Single Source Authentication on the MBone. IEEE International Conference on Multimedia and Expo (I) 2000: 541-544 - [c9]Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Chained Stream Authentication. Selected Areas in Cryptography 2000: 144-157 - [c8]Bruce Christianson, Bruno Crispo, James A. Malcolm:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Security Protocols Workshop 2000: 182-183 - [e3]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings. Lecture Notes in Computer Science 1796, Springer 2000, ISBN 3-540-67381-4 [contents]
1990 – 1999
- 1999
- [b1]Bruno Crispo:
Delegation of responsibility. University of Cambridge, UK, 1999 - [c7]Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Issues in Multicast Security. Security Protocols Workshop 1999: 119-139 - [e2]Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe:
Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings. Lecture Notes in Computer Science 1550, Springer 1999, ISBN 3-540-65663-4 [contents] - 1998
- [j3]Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham:
A New Family of Authentication Protocols. ACM SIGOPS Oper. Syst. Rev. 32(4): 9-20 (1998) - [j2]Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo:
High Dictionary Compression for Proactive Password Checking. ACM Trans. Inf. Syst. Secur. 1(1): 3-25 (1998) - [c6]Bruno Crispo:
Delegation of Responsibility (Position Paper). Security Protocols Workshop 1998: 118-124 - [c5]Bruno Crispo:
Delegation of Responsibility (Transcript of Discussion). Security Protocols Workshop 1998: 125-130 - [c4]Francesco Bergadano, Bruno Crispo, M. Eccettuato:
Secure WWW Transactions Using Standard HTTP and Java Applets. USENIX Workshop on Electronic Commerce 1998 - [e1]Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe:
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings. Lecture Notes in Computer Science 1361, Springer 1998, ISBN 3-540-64040-1 [contents] - 1997
- [j1]Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas:
Strong Authentication and Privacy with Standard Browsers. J. Comput. Secur. 5(3): 191-212 (1997) - [c3]Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo:
Proactive Password Checking with Decision Trees. CCS 1997: 67-77 - [c2]Bruno Crispo:
How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. Security Protocols Workshop 1997: 53-65 - 1996
- [c1]Bruno Crispo, T. Mark A. Lomas:
A Certification Scheme for Electronic Commerce. Security Protocols Workshop 1996: 19-32
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint