Seguir
Jonathan Voris
Título
Citado por
Citado por
Año
Bait and snitch: Defending computer systems with decoys
JA Voris, J Jermyn, AD Keromytis, S Stolfo
1392013
Accelerometers and randomness: Perfect together
J Voris, N Saxena, T Halevi
Proceedings of the fourth ACM conference on Wireless network security, 115-126, 2011
742011
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags
N Saxena, MB Uddin, J Voris, N Asokan
2011 IEEE International Conference on Pervasive Computing and Communications …, 2011
572011
Driver identification and authentication with active behavior modeling
A Burton, T Parikh, S Mascarenhas, J Zhang, J Voris, NS Artan, W Li
2016 12th International Conference on Network and Service Management (CNSM …, 2016
512016
Lost in translation: Improving decoy documents via automated translation
J Voris, N Boggs, SJ Stolfo
2012 IEEE Symposium on Security and Privacy Workshops, 129-133, 2012
482012
Data remanence effects on memory-based entropy collection for RFID systems
N Saxena, J Voris
International Journal of Information Security 10, 213-222, 2011
482011
Universal device pairing using an auxiliary device
N Saxena, MB Uddin, J Voris
Proceedings of the 4th symposium on Usable privacy and security, 56-67, 2008
472008
Fox in the trap: Thwarting masqueraders via automated decoy document deployment
J Voris, J Jermyn, N Boggs, S Stolfo
Proceedings of the eighth European workshop on system security, 1-7, 2015
432015
Still and silent: Motion detection for enhanced rfid security and privacy without changing the usage model
N Saxena, J Voris
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
382010
Context-aware defenses to RFID unauthorized reading and relay attacks
T Halevi, H Li, D Ma, N Saxena, J Voris, T Xiang
IEEE Transactions on Emerging Topics in Computing 1 (2), 307-318, 2013
352013
We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags
N Saxena, J Voris
Proceedings of the Conference on RFID Security, 2009
292009
Active authentication using file system decoys and user behavior modeling: results of a large scale study
J Voris, Y Song, MB Salem, S Hershkop, S Stolfo
Computers & Security 87, 101412, 2019
222019
Treat'em like other devices: user authentication of multiple personal RFID tags.
N Saxena, MB Uddin, J Voris
SOUPS 9, 1-1, 2009
192009
Sensing-enabled defenses to rfid unauthorized reading and relay attacks without changing the usage model
T Halevi, S Lin, D Ma, AK Prasad, N Saxena, J Voris, T Xiang
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
152012
Pairing devices with good quality output interfaces
N Saxena, J Voris
2008 The 28th International Conference on Distributed Computing Systems …, 2008
152008
Print me if you dare: Firmware modification attacks and the rise of printer malware
A Cui, S Stolfo
132011
Exploring extrinsic motivation for better security: A usability study of scoring-enhanced device pairing
A Gallego, N Saxena, J Voris
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
122013
Performance evaluation of privacy-preserving policy reconciliation protocols
J Voris, S Ioannidis, S Wetzel, U Meyer
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
92007
Playful security: A computer game for secure wireless device pairing
A Gallego, N Saxena, J Voris
2011 16th International Conference on Computer Games (CGAMES), 177-184, 2011
82011
You are what you use: An initial study of authenticating mobile users via application usage
J Voris, Y Song, M Ben Salem, S Stolfo
Proceedings of the 8th EAI International Conference on Mobile Computing …, 2016
72016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20