Internet of Things: A survey on the security of IoT frameworks M Ammar, G Russello, B Crispo Journal of Information Security and Applications 38, 8-27, 2018 | 1055 | 2018 |
The evolution of RFID security MR Rieback, B Crispo, AS Tanenbaum IEEE Pervasive Computing 5 (01), 62-69, 2006 | 391 | 2006 |
Crepe: Context-related policy enforcement for android M Conti, VTN Nguyen, B Crispo Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 385 | 2011 |
Is your cat infected with a computer virus? MR Rieback, B Crispo, AS Tanenbaum Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006 | 313 | 2006 |
RFID Guardian: A battery-powered mobile device for RFID privacy management MR Rieback, B Crispo, AS Tanenbaum Australasian Conference on Information Security and Privacy, 184-194, 2005 | 297 | 2005 |
Providing source location privacy in wireless sensor networks: A survey M Conti, J Willemsen, B Crispo IEEE Communications Surveys & Tutorials 15 (3), 1238-1280, 2013 | 217 | 2013 |
A new family of authentication protocols R Anderson, F Bergadano, B Crispo, JH Lee, C Manifavas, R Needham ACM SIGOPS Operating Systems Review 32 (4), 9-20, 1998 | 215 | 1998 |
MOSES: supporting and enforcing security profiles on smartphones Y Zhauniarovich, G Russello, M Conti, B Crispo, E Fernandes IEEE Transactions on Dependable and Secure Computing 11 (3), 211-223, 2014 | 188* | 2014 |
Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call M Conti, I Zachia-Zlatea, B Crispo Proceedings of the 6th ACM symposium on information, computer and …, 2011 | 179 | 2011 |
A DRM security architecture for home networks BC Popescu, B Crispo, AS Tanenbaum, FLAJ Kamperman Proceedings of the 4th ACM workshop on Digital rights management, 1-10, 2004 | 167 | 2004 |
Safe and private data sharing with turtle: friends team-up and beat the system (transcript of discussion) B Popescu International Workshop on Security Protocols, 221-230, 2004 | 161 | 2004 |
XACML policy integration algorithms P Mazzoleni, B Crispo, S Sivasubramanian, E Bertino ACM Transactions on Information and System Security (TISSEC) 11 (1), 1-29, 2008 | 156 | 2008 |
Taking sensor networks from the lab to the jungle AS Tanenbaum, C Gamage, B Crispo Computer 39 (8), 98-100, 2006 | 134 | 2006 |
A virtual machine based information flow control system for policy enforcement SK Nair, PND Simpson, B Crispo, AS Tanenbaum Electronic Notes in Theoretical Computer Science 197 (1), 3-16, 2008 | 133* | 2008 |
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 129 | 2015 |
Hold and sign: A novel behavioral biometrics for smartphone user authentication A Buriro, B Crispo, F Delfrari, K Wrona 2016 IEEE security and privacy workshops (SPW), 276-285, 2016 | 117 | 2016 |
An identity-based ring signature scheme with enhanced privacy C Gamage, B Gras, B Crispo, AS Tanenbaum 2006 Securecomm and Workshops, 1-5, 2006 | 117 | 2006 |
A platform for RFID security and privacy administration MR Rieback, G Gaydadjiev, B Crispo, RFH Hofman, AS Tanenbaum USENIX LISA, 89-102, 2006 | 112 | 2006 |
Crêpe: A system for enforcing fine-grained context-related policies on android M Conti, B Crispo, E Fernandes, Y Zhauniarovich IEEE Transactions on Information Forensics and Security 7 (5), 1426-1438, 2012 | 109 | 2012 |
Security and privacy in vehicular communications: Challenges and opportunities C Bernardini, MR Asghar, B Crispo Vehicular Communications 10, 13-28, 2017 | 108 | 2017 |