Bruno Crispo
Internet of Things: A survey on the security of IoT frameworks
M Ammar, G Russello, B Crispo
Journal of Information Security and Applications 38, 8-27, 2018
The evolution of RFID security
MR Rieback, B Crispo, AS Tanenbaum
IEEE Pervasive Computing 5 (01), 62-69, 2006
Crepe: Context-related policy enforcement for android
M Conti, VTN Nguyen, B Crispo
International Conference on Information Security, 331-345, 2010
Is your cat infected with a computer virus?
MR Rieback, B Crispo, AS Tanenbaum
Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006
RFID Guardian: A battery-powered mobile device for RFID privacy management
MR Rieback, B Crispo, AS Tanenbaum
Australasian Conference on Information Security and Privacy, 184-194, 2005
A new family of authentication protocols
R Anderson, F Bergadano, B Crispo, JH Lee, C Manifavas, R Needham
ACM SIGOPS Operating Systems Review 32 (4), 9-20, 1998
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
Providing source location privacy in wireless sensor networks: A survey
M Conti, J Willemsen, B Crispo
IEEE Communications Surveys & Tutorials 15 (3), 1238-1280, 2013
Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call
M Conti, I Zachia-Zlatea, B Crispo
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
Safe and private data sharing with turtle: friends team-up and beat the system (transcript of discussion)
B Popescu
International Workshop on Security Protocols, 221-230, 2004
A DRM security architecture for home networks
BC Popescu, B Crispo, AS Tanenbaum, FLAJ Kamperman
Proceedings of the 4th ACM workshop on Digital rights management, 1-10, 2004
XACML policy integration algorithms
P Mazzoleni, B Crispo, S Sivasubramanian, E Bertino
ACM Transactions on Information and System Security (TISSEC) 11 (1), 1-29, 2008
Taking sensor networks from the lab to the jungle
AS Tanenbaum, C Gamage, B Crispo
Computer 39 (8), 98-100, 2006
A virtual machine based information flow control system for policy enforcement
SK Nair, PND Simpson, B Crispo, AS Tanenbaum
Electronic Notes in Theoretical Computer Science 197 (1), 3-16, 2008
MOSES: supporting operation modes on smartphones
G Russello, M Conti, B Crispo, E Fernandes
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications
Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
A platform for RFID security and privacy administration
MR Rieback, G Gaydadjiev, B Crispo, RFH Hofman, AS Tanenbaum
USENIX LISA, 89-102, 2006
Crêpe: A system for enforcing fine-grained context-related policies on android
M Conti, B Crispo, E Fernandes, Y Zhauniarovich
IEEE Transactions on Information Forensics and Security 7 (5), 1426-1438, 2012
RFID malware: Design principles and examples
MR Rieback, PND Simpson, B Crispo, AS Tanenbaum
Pervasive and mobile computing 2 (4), 405-426, 2006
An identity-based ring signature scheme with enhanced privacy
C Gamage, B Gras, B Crispo, AS Tanenbaum
2006 Securecomm and Workshops, 1-5, 2006
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20