Jonathan Voris
Заглавие
Позовавания
Позовавания
Година
Bait and snitch: Defending computer systems with decoys
JA Voris, J Jermyn, AD Keromytis, S Stolfo
572013
Accelerometers and randomness: Perfect together
J Voris, N Saxena, T Halevi
Proceedings of the fourth ACM conference on Wireless network security, 115-126, 2011
532011
Data remanence effects on memory-based entropy collection for RFID systems
N Saxena, J Voris
International Journal of Information Security 10 (4), 213, 2011
432011
Universal device pairing using an auxiliary device
N Saxena, MB Uddin, J Voris
Proceedings of the 4th symposium on Usable privacy and security, 56-67, 2008
432008
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags
N Saxena, MB Uddin, J Voris, N Asokan
2011 IEEE International Conference on Pervasive Computing and Communications …, 2011
402011
Still and silent: motion detection for enhanced RFID security and privacy without changing the usage model
N Saxena, J Voris
International Workshop on Radio Frequency Identification: Security and …, 2010
352010
Lost in translation: Improving decoy documents via automated translation
J Voris, N Boggs, SJ Stolfo
2012 IEEE Symposium on Security and Privacy Workshops, 129-133, 2012
322012
We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags
N Saxena, J Voris
Proceedings of the Conference on RFID Security, 2009
262009
Context-aware defenses to RFID unauthorized reading and relay attacks
T Halevi, H Li, D Ma, N Saxena, J Voris, T Xiang
IEEE Transactions on Emerging Topics in Computing 1 (2), 307-318, 2013
242013
Fox in the trap: thwarting masqueraders via automated decoy document deployment
J Voris, J Jermyn, N Boggs, S Stolfo
Proceedings of the Eighth European Workshop on System Security, 1-7, 2015
222015
Driver identification and authentication with active behavior modeling
A Burton, T Parikh, S Mascarenhas, J Zhang, J Voris, NS Artan, W Li
2016 12th International Conference on Network and Service Management (CNSM …, 2016
182016
Treat'em like other devices: user authentication of multiple personal RFID tags.
N Saxena, MB Uddin, J Voris
SOUPS 9, 1-1, 2009
152009
Sensing-enabled defenses to rfid unauthorized reading and relay attacks without changing the usage model
T Halevi, S Lin, D Ma, AK Prasad, N Saxena, J Voris, T Xiang
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
132012
Exploring extrinsic motivation for better security: A usability study of scoring-enhanced device pairing
A Gallego, N Saxena, J Voris
International Conference on Financial Cryptography and Data Security, 60-68, 2013
122013
Pairing devices with good quality output interfaces
N Saxena, J Voris
2008 The 28th International Conference on Distributed Computing Systems …, 2008
122008
Print me if you dare: Firmware modification attacks and the rise of printer malware
A Cui, S Stolfo
112011
Performance evaluation of privacy-preserving policy reconciliation protocols
J Voris, S Ioannidis, S Wetzel, U Meyer
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
92007
Playful security: A computer game for secure wireless device pairing
A Gallego, N Saxena, J Voris
2011 16th International Conference on Computer Games (CGAMES), 177-184, 2011
72011
Active authentication using file system decoys and user behavior modeling: results of a large scale study
J Voris, Y Song, MB Salem, S Hershkop, S Stolfo
Computers & Security 87, 101412, 2019
52019
Accelerometer based random number generation on RFID tags
N Saxena, J Voris
WISP Summit, 2009
52009
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20