Artikkelit, joihin on yleisen käytön mandaatti - Frank StajanoLisätietoja
Saatavilla jossain: 18
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
Mandaatit: Natural Sciences and Engineering Research Council of Canada, European Commission
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Proceedings of the 2nd ACM workshop on Online social networks, 1-6, 2009
Mandaatit: Research Foundation (Flanders)
Sensors on the Brain Implantable wireless monitors give researchers a new look inside the human body
G Mone
Communications of the ACM 60 (4), 12-14, 2017
Mandaatit: US National Science Foundation, US National Aeronautics and Space …
Password-manager friendly (PMF): Semantic annotations to improve the effectiveness of password managers
F Stajano, M Spencer, G Jenkinson, Q Stafford-Fraser
Technology and Practice of Passwords: International Conference on Passwords …, 2015
Mandaatit: European Commission
Bootstrapping adoption of the pico password replacement system
F Stajano, G Jenkinson, J Payne, M Spencer, Q Stafford-Fraser, ...
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
Mandaatit: European Commission
Pico in the wild: Replacing passwords, one site at a time
S Aebischer, C Dettoni, G Jenkinson, KK Krol, D Llewellyn-Jones, T Masui, ...
Internet Society, 2017
Mandaatit: UK Engineering and Physical Sciences Research Council, European Commission
Pico without public keys
F Stajano, B Christianson, M Lomas, G Jenkinson, J Payne, M Spencer, ...
Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March …, 2015
Mandaatit: European Commission
I bought a new security token and all I got was this lousy phish—Relay attacks on visual code authentication schemes
G Jenkinson, M Spencer, C Warrington, F Stajano
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
Mandaatit: European Commission
To have and have not: Variations on secret sharing to model user presence
Q Stafford-Fraser, F Stajano, C Warrington, G Jenkinson, M Spencer, ...
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
Mandaatit: European Commission
User authentication for the internet of things
F Stajano, M Lomas
Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March …, 2018
Mandaatit: European Commission
Low-cost mitigation against cold boot attacks for an authentication token
I Goldberg, G Jenkinson, F Stajano
Applied Cryptography and Network Security: 14th International Conference …, 2016
Mandaatit: Natural Sciences and Engineering Research Council of Canada, European Commission
Seamless authentication with Pico
KK Krol, S Aebischer, D Llewellyn-Jones, C Dettoni, F Stajano
Mandaatit: European Commission
Deploying authentication in the wild: towards greater ecological validity in security usability studies
S Aebischer, C Dettoni, G Jenkinson, K Krol, D Llewellyn-Jones, T Masui, ...
Journal of Cybersecurity 6 (1), tyaa010, 2020
Mandaatit: UK Engineering and Physical Sciences Research Council, European Commission …
Intentionality and agency in security
K Krol, D Llewellyn-Jones, S Aebischer, C Dettoni, F Stajano
Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March …, 2018
Mandaatit: European Commission
Explicit Delegation using Configurable Cookies
D Llewellyn-Jones, G Jenkinson, F Stajano
Security Protocols XXIV: 24th International Workshop, Brno, Czech Republic …, 2017
Mandaatit: European Commission
Red Button and Yellow Button: Usable Security for Lost Security Tokens
I Goldberg, G Jenkinson, D Llewellyn-Jones, F Stajano
Security Protocols XXIV: 24th International Workshop, Brno, Czech Republic …, 2017
Mandaatit: Natural Sciences and Engineering Research Council of Canada, European Commission
Pico without public keys
B Christianson, F Stajano, M Lomas, G Jenkinson, P Jeunese, ...
Security Protocols XXIII 23rd International Workshop, 195-211, 2015
Mandaatit: European Commission
SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper)
J Millican, F Stajano
International Conference on Passwords, 146-152, 2014
Mandaatit: European Commission
Tietokoneohjelma arvioi ja määrittää julkaisu- ja rahoitustiedot automaattisesti