Nome |
# |
Usable security for QR code, file e4239dde-a7bc-7180-e053-3705fe0a3322
|
688
|
Usable Cryptographic QR Codes, file e4239ddd-fcde-7180-e053-3705fe0a3322
|
547
|
Mind Your Keys? A Security Evaluation of Java Keystores, file e4239ddc-92b3-7180-e053-3705fe0a3322
|
316
|
Surviving the Web: A Journey into Web Session Security, file e4239ddc-3895-7180-e053-3705fe0a3322
|
291
|
Formal Analysis of Key Integrity in PKCS#11, file e4239ddb-5ae5-7180-e053-3705fe0a3322
|
285
|
Match It or Die: Proving Integrity by Equality, file e4239ddb-5ae6-7180-e053-3705fe0a3322
|
247
|
Development of security extensions based on Chrome APIs, file e4239ddb-bbf3-7180-e053-3705fe0a3322
|
229
|
CookiExt: Patching the browser against session hijacking attacks, file e4239ddd-f61b-7180-e053-3705fe0a3322
|
227
|
Run-Time Attack Detection in Cryptographic APIs, file e4239ddc-7fab-7180-e053-3705fe0a3322
|
211
|
Run-time analysis of PKCS#11 attacks, file e4239ddb-8d18-7180-e053-3705fe0a3322
|
207
|
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks, file e4239ddd-8d08-7180-e053-3705fe0a3322
|
207
|
Channel Abstractions for Network Security, file e4239ddb-30fa-7180-e053-3705fe0a3322
|
192
|
Practical Padding Oracle Attacks on RSA, file e4239ddb-3f05-7180-e053-3705fe0a3322
|
189
|
Formal methods for web security, file e4239ddc-3567-7180-e053-3705fe0a3322
|
177
|
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem, file e4239ddd-1569-7180-e053-3705fe0a3322
|
174
|
Efficient Padding Oracle Attacks on Cryptographic Hardware, file e4239ddb-41ce-7180-e053-3705fe0a3322
|
154
|
Fixing PKCS#11 by key-diversification, file e4239ddb-2b6e-7180-e053-3705fe0a3322
|
138
|
Firewall management with FireWall synthesizer, file e4239ddc-da91-7180-e053-3705fe0a3322
|
125
|
Type-Based Analysis of Generic Key Management APIs, file e4239dde-6f55-7180-e053-3705fe0a3322
|
105
|
Secure your PKCS#11 token against API attacks!, file e4239ddb-2c54-7180-e053-3705fe0a3322
|
102
|
A hard lesson: Assessing the HTTPS deployment of Italian university websites, file e4239dde-3832-7180-e053-3705fe0a3322
|
72
|
Localizing Security for Distributed Firewalls, file e4239ddb-da31-7180-e053-3705fe0a3322
|
42
|
Gathering of robots in a ring with mobile faults, file e4239ddd-ffd4-7180-e053-3705fe0a3322
|
26
|
Localizing Firewall Security Policies, file e4239dde-026a-7180-e053-3705fe0a3322
|
22
|
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring, file e4239ddc-dafe-7180-e053-3705fe0a3322
|
17
|
FWS: Analyzing, maintaining and transcompiling firewalls, file e4239dde-0ff3-7180-e053-3705fe0a3322
|
12
|
Guessing Bank PINs by Winning a Mastermind Game, file e4239ddb-2b76-7180-e053-3705fe0a3322
|
8
|
Secure Key Management Policies in Strand Spaces, file e4239dde-81a7-7180-e053-3705fe0a3322
|
8
|
The Revenge of Password Crackers: Automated Training of Password Cracking Tools, file cb642f2b-b7e5-40c2-9511-d6f2832b2dbf
|
7
|
Usable security for QR code, file e4239ddd-f694-7180-e053-3705fe0a3322
|
7
|
Don't Get Stranded: Secure and Dynamic Key Management Policies with Strand Spaces, file 5c993aea-daaa-46d4-b643-29bad1331942
|
6
|
Type-based Analysis of Key Management in PKCS#11 cryptographic devices, file e4239ddb-42e6-7180-e053-3705fe0a3322
|
6
|
Mignis: A semantic based tool for firewall configuration, file e4239ddb-d546-7180-e053-3705fe0a3322
|
6
|
Gathering of robots in a ring with mobile faults, file e4239ddc-0849-7180-e053-3705fe0a3322
|
5
|
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study, file e4239ddc-66ed-7180-e053-3705fe0a3322
|
5
|
Surviving the Web: A Journey into Web Session Security, file e4239ddd-eb2c-7180-e053-3705fe0a3322
|
5
|
Design and Implementation of Fast and Cost-Effective FPGA-Based Fuzzy Rainbow Tradeoffs, file 7d877085-ab6e-499c-befb-9fdd24e3c6e5
|
4
|
Automated Learning and Verification of Embedded Security Architectures, file b0a799bb-7bdb-4920-8551-f9522dbcc06a
|
4
|
A Recipe for Cost-Effective Secure IoT: the SAFE PLACE Project Case Study, file b765d22c-ddde-46ff-8e3c-5ac90d2866c4
|
4
|
Gran: model checking grsecurity RBAC policies, file e4239ddb-47ce-7180-e053-3705fe0a3322
|
4
|
APDU-Level Attacks in PKCS#11 Devices, file e4239ddc-0e05-7180-e053-3705fe0a3322
|
4
|
Automated Analysis of PUF-based Protocols, file e4239ddd-a933-7180-e053-3705fe0a3322
|
4
|
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring, file e4239ddd-fb9c-7180-e053-3705fe0a3322
|
4
|
Localizing Firewall Security Policies, file e4239dde-0269-7180-e053-3705fe0a3322
|
4
|
Firmware Extraction from Real IoT Devices through Power Analysis of AES, file e4239dde-6ca8-7180-e053-3705fe0a3322
|
4
|
Provably Sound Browser-Based Enforcement of Web Session Integrity, file e4239ddb-6ea7-7180-e053-3705fe0a3322
|
3
|
Micro-Policies for Web Session Security, file e4239ddc-2f8d-7180-e053-3705fe0a3322
|
3
|
Usable Cryptographic QR Codes, file e4239ddd-fcdd-7180-e053-3705fe0a3322
|
3
|
Gathering of robots in a ring with mobile faults, file e4239ddd-ffd3-7180-e053-3705fe0a3322
|
3
|
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs, file e4239dde-8ecb-7180-e053-3705fe0a3322
|
3
|
Unwinding in Information Flow Security, file e4239ddb-2e02-7180-e053-3705fe0a3322
|
2
|
A semantic based tool for firewall configuration, file e4239ddb-3a3c-7180-e053-3705fe0a3322
|
2
|
Automatic and robust client-side protection for cookie-based sessions, file e4239ddb-3cf4-7180-e053-3705fe0a3322
|
2
|
Fast SQL Blind Injections in High Latency Networks., file e4239ddb-4368-7180-e053-3705fe0a3322
|
2
|
Types for security protocols, file e4239ddb-bab5-7180-e053-3705fe0a3322
|
2
|
Neural-Cryptanalysis of Classical Ciphers, file e4239ddc-da71-7180-e053-3705fe0a3322
|
2
|
A hard lesson: Assessing the HTTPS deployment of Italian university websites, file e4239ddd-b603-7180-e053-3705fe0a3322
|
2
|
Formal methods for web security, file e4239ddd-f5a0-7180-e053-3705fe0a3322
|
2
|
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem, file e4239ddd-f5f3-7180-e053-3705fe0a3322
|
2
|
CookiExt: Patching the browser against session hijacking attacks, file e4239dde-00db-7180-e053-3705fe0a3322
|
2
|
A formally verified configuration for Hardware Security Modules in the cloud, file e4239dde-a560-7180-e053-3705fe0a3322
|
2
|
Secure recharge of disposable RFID tickets, file e4239ddb-2b6f-7180-e053-3705fe0a3322
|
1
|
Information Flow Security in Dynamic Contexts, file e4239ddb-2dfc-7180-e053-3705fe0a3322
|
1
|
Blunting Differential Attacks on PIN Processing APIs, file e4239ddb-31a8-7180-e053-3705fe0a3322
|
1
|
Improving PIN Processing API Security, file e4239ddb-4e5d-7180-e053-3705fe0a3322
|
1
|
Secure upgrade of hardware security modules in bank networks, file e4239ddb-504f-7180-e053-3705fe0a3322
|
1
|
Static Evidences for Attack Reconstruction, file e4239ddc-0f63-7180-e053-3705fe0a3322
|
1
|
BANANA: A tool for Boundary Ambients Nesting ANAlysis, file e4239ddc-99ef-7180-e053-3705fe0a3322
|
1
|
Surviving the Web: A Journey into Web Session Security, file e4239ddd-b9ff-7180-e053-3705fe0a3322
|
1
|
Totale |
5.146 |