Nome |
# |
Usable security for QR code, file e4239dde-a7bc-7180-e053-3705fe0a3322
|
697
|
Usable Cryptographic QR Codes, file e4239ddd-fcde-7180-e053-3705fe0a3322
|
566
|
Type-Based Analysis of Generic Key Management APIs, file e4239dde-6f55-7180-e053-3705fe0a3322
|
105
|
Localizing Security for Distributed Firewalls, file e4239ddb-da31-7180-e053-3705fe0a3322
|
42
|
Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors, file e4239dde-01f1-7180-e053-3705fe0a3322
|
29
|
Gathering of robots in a ring with mobile faults, file e4239ddd-ffd4-7180-e053-3705fe0a3322
|
26
|
Localizing Firewall Security Policies, file e4239dde-026a-7180-e053-3705fe0a3322
|
22
|
Mobile Agents Rendezvous in spite of a Malicious Agent., file e4239ddd-ff70-7180-e053-3705fe0a3322
|
14
|
FWS: Analyzing, maintaining and transcompiling firewalls, file e4239dde-0ff3-7180-e053-3705fe0a3322
|
12
|
Guessing Bank PINs by Winning a Mastermind Game, file e4239ddb-2b76-7180-e053-3705fe0a3322
|
8
|
Secure Key Management Policies in Strand Spaces, file e4239dde-81a7-7180-e053-3705fe0a3322
|
8
|
The Revenge of Password Crackers: Automated Training of Password Cracking Tools, file cb642f2b-b7e5-40c2-9511-d6f2832b2dbf
|
7
|
Modelling Volo, an Augmentative and Alternative Communication application, file e4239ddb-aa4a-7180-e053-3705fe0a3322
|
7
|
Usable security for QR code, file e4239ddd-f694-7180-e053-3705fe0a3322
|
7
|
Don't Get Stranded: Secure and Dynamic Key Management Policies with Strand Spaces, file 5c993aea-daaa-46d4-b643-29bad1331942
|
6
|
Type-based Analysis of Key Management in PKCS#11 cryptographic devices, file e4239ddb-42e6-7180-e053-3705fe0a3322
|
6
|
Mignis: A semantic based tool for firewall configuration, file e4239ddb-d546-7180-e053-3705fe0a3322
|
6
|
Gathering of robots in a ring with mobile faults, file e4239ddc-0849-7180-e053-3705fe0a3322
|
5
|
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study, file e4239ddc-66ed-7180-e053-3705fe0a3322
|
5
|
Design and Implementation of Fast and Cost-Effective FPGA-Based Fuzzy Rainbow Tradeoffs, file 7d877085-ab6e-499c-befb-9fdd24e3c6e5
|
4
|
Automated Learning and Verification of Embedded Security Architectures, file b0a799bb-7bdb-4920-8551-f9522dbcc06a
|
4
|
A Recipe for Cost-Effective Secure IoT: the SAFE PLACE Project Case Study, file b765d22c-ddde-46ff-8e3c-5ac90d2866c4
|
4
|
Designing Tourism Websites for Children: Guidelines and Experimental Results, file e4239ddc-dcd5-7180-e053-3705fe0a3322
|
4
|
Automated Analysis of PUF-based Protocols, file e4239ddd-a933-7180-e053-3705fe0a3322
|
4
|
Localizing Firewall Security Policies, file e4239dde-0269-7180-e053-3705fe0a3322
|
4
|
Firmware Extraction from Real IoT Devices through Power Analysis of AES, file e4239dde-6ca8-7180-e053-3705fe0a3322
|
4
|
Accessible and Usable Websites and Mobile Applications for People with Autism Spectrum Disorders: a Comparative Study, file e4239ddc-494f-7180-e053-3705fe0a3322
|
3
|
Evaluating Security, Privacy and Usability Features of QR Code Readers, file e4239ddc-ff51-7180-e053-3705fe0a3322
|
3
|
Design and implementation of an airport chatbot, file e4239ddd-359e-7180-e053-3705fe0a3322
|
3
|
Learning Sign Language from a Sanbot Robot, file e4239ddd-b481-7180-e053-3705fe0a3322
|
3
|
Usable Cryptographic QR Codes, file e4239ddd-fcdd-7180-e053-3705fe0a3322
|
3
|
Gathering of robots in a ring with mobile faults, file e4239ddd-ffd3-7180-e053-3705fe0a3322
|
3
|
Broadcasting with Mobile Agents in Dynamic Networks, file e4239dde-0538-7180-e053-3705fe0a3322
|
3
|
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs, file e4239dde-8ecb-7180-e053-3705fe0a3322
|
3
|
Sorting and Election in Anonymous Asynchronous Rings, file e4239ddb-2ec5-7180-e053-3705fe0a3322
|
2
|
A semantic based tool for firewall configuration, file e4239ddb-3a3c-7180-e053-3705fe0a3322
|
2
|
PIN Cracking is a Guessing Game, file e4239ddb-3b6e-7180-e053-3705fe0a3322
|
2
|
Fast SQL Blind Injections in High Latency Networks., file e4239ddb-4368-7180-e053-3705fe0a3322
|
2
|
A review of Websites and Mobile Applications for People with Autism Spectrum Disorders: Towards Shared Guidelines, file e4239ddc-1dc1-7180-e053-3705fe0a3322
|
2
|
Usable and Accessible Tourism Websites for Children: a Case Study of a Naturalistic Oasis, file e4239ddc-969a-7180-e053-3705fe0a3322
|
2
|
Neural-Cryptanalysis of Classical Ciphers, file e4239ddc-da71-7180-e053-3705fe0a3322
|
2
|
Gathering of Robots in a Grid with Mobile Faults, file e4239ddd-0899-7180-e053-3705fe0a3322
|
2
|
Accessible Tourism for Users with Hearing Loss, file e4239ddd-0c27-7180-e053-3705fe0a3322
|
2
|
Security and privacy of QR code applications: A comprehensive study, general guidelines and solutions, file e4239ddd-a92b-7180-e053-3705fe0a3322
|
2
|
Mobile Agents Rendezvous in spite of a Malicious Agent., file e4239ddd-ff6f-7180-e053-3705fe0a3322
|
2
|
Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors, file e4239dde-01f0-7180-e053-3705fe0a3322
|
2
|
Decontamination of Chordal Rings and Tori, file e4239dde-6803-7180-e053-3705fe0a3322
|
2
|
Sorting Multisets in Anonymous Rings, file e4239dde-6bb4-7180-e053-3705fe0a3322
|
2
|
A formally verified configuration for Hardware Security Modules in the cloud, file e4239dde-a560-7180-e053-3705fe0a3322
|
2
|
Secure recharge of disposable RFID tickets, file e4239ddb-2b6f-7180-e053-3705fe0a3322
|
1
|
Blunting Differential Attacks on PIN Processing APIs, file e4239ddb-31a8-7180-e053-3705fe0a3322
|
1
|
Security and Privacy in Mobile Information and Communication SystemsThird International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers, file e4239ddb-4757-7180-e053-3705fe0a3322
|
1
|
Improving PIN Processing API Security, file e4239ddb-4e5d-7180-e053-3705fe0a3322
|
1
|
Secure upgrade of hardware security modules in bank networks, file e4239ddb-504f-7180-e053-3705fe0a3322
|
1
|
Webpage Accessibility and Usability for Autistic Users: a Case Study on a Tourism Website, file e4239ddc-0c58-7180-e053-3705fe0a3322
|
1
|
A New Actor-Based Structure for Distributed Systems, file e4239ddc-1d77-7180-e053-3705fe0a3322
|
1
|
Fault-tolerant support for reliable multicast in Mobile Wireless Systems: Design and Evaluation, file e4239ddc-1e08-7180-e053-3705fe0a3322
|
1
|
A Formal Model for Supporting the Adaptive Access to Virtual Museums, file e4239ddc-1e63-7180-e053-3705fe0a3322
|
1
|
Formalizing a model to represent and visualize concept spaces in e-learning environments, file e4239ddc-1e9e-7180-e053-3705fe0a3322
|
1
|
Intruder Capture in Sierpinski Graphs., file e4239ddc-1fbf-7180-e053-3705fe0a3322
|
1
|
Web accessibility recommendations for the design of tourism websites for people with autism spectrum disorders, file e4239ddc-2823-7180-e053-3705fe0a3322
|
1
|
BANANA: A tool for Boundary Ambients Nesting ANAlysis, file e4239ddc-99ef-7180-e053-3705fe0a3322
|
1
|
Learning distributed algorithms by programming robots, file e4239ddd-3964-7180-e053-3705fe0a3322
|
1
|
Contiguous Search in the Hypercube for Capturing an Intruder, file e4239dde-67c1-7180-e053-3705fe0a3322
|
1
|
Totale |
1.675 |