Bruno Crispo
Person information
- affiliation: VU University Amsterdam, Netherlands
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j32]Mahmoud Ammar, Giovanni Russello, Bruno Crispo:
Internet of Things: A survey on the security of IoT frameworks. J. Inf. Sec. Appl. 38: 8-27 (2018) - [j31]Sandeep Gupta, Attaullah Buriro, Bruno Crispo:
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access. Mobile Information Systems 2018: 2649598:1-2649598:16 (2018) - [c116]Mahmoud Ammar, Wilfried Daniels, Bruno Crispo, Danny Hughes:
SPEED: Secure Provable Erasure for Class-1 IoT Devices. CODASPY 2018: 111-118 - [c115]Attaullah Buriro, Bruno Crispo, Sandeep Gupta, Filippo Del Frari:
DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme. CODASPY 2018: 267-276 - [c114]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. WWW 2018: 237-246 - 2017
- [j30]Mojtaba Eskandari, Bruno Kessler, Maqsood Ahmad, Anderson Santana de Oliveira, Bruno Crispo:
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps. PoPETs 2017(1): 118-131 (2017) - [j29]César Bernardini, Muhammad Rizwan Asghar, Bruno Crispo:
Security and privacy in vehicular communications: Challenges and opportunities. Vehicular Communications 10: 13-28 (2017) - [c113]Attaullah Buriro, Sandeep Gupta, Bruno Crispo:
Evaluation of Motion-Based Touch-Typing Biometrics for Online Banking. BIOSIG 2017: 219-226 - [c112]Mojtaba Eskandari, Bruno Crispo, Anderson Santana de Oliveira:
DLoc: Distributed Auditing for Data Location Compliance in Cloud. DPM/CBT@ESORICS 2017: 202-218 - [c111]Sven Akkermans, Wilfried Daniels, Gowri Sankar Ramachandran, Bruno Crispo, Danny Hughes:
CerberOS: A Resource-Secure OS for Sharing IoT Devices. EWSN 2017: 96-107 - [c110]Luca Allodi, Silvio Biagioni, Bruno Crispo, Katsiaryna Labunets, Fabio Massacci, Wagner Santos:
Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment. FDSE 2017: 23-39 - [c109]Zahid Akhtar, Attaullah Buriro, Bruno Crispo, Tiago H. Falk:
Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns. GlobalSIP 2017: 1368-1372 - [c108]Attaullah Buriro, Zahid Akhtar, Bruno Crispo, Sandeep Gupta:
Mobile biometrics: Towards a comprehensive evaluation methodology. ICCST 2017: 1-6 - [c107]Attaullah Buriro, Bruno Crispo, Yury Zhauniarovich:
Please hold on: Unobtrusive user authentication using smartphone's built-in sensors. ISBA 2017: 1-8 - [c106]Wilfried Daniels, Danny Hughes, Mahmoud Ammar, Bruno Crispo, Nelson Matthys, Wouter Joosen:
SμV - the security microvisor: a virtualisation-based security middleware for the internet of things. Middleware Industry 2017: 36-42 - [c105]Maqsood Ahmad, Valerio Costamagna, Bruno Crispo, Francesco Bergadano:
TeICC: targeted execution of inter-component communications in Android. SAC 2017: 1747-1752 - 2016
- [j28]Alvaro Cardenas, Bruno Crispo:
Cyber-Physical Security and Privacy [Guest editors' introduction]. IEEE Internet Computing 20(5): 6-8 (2016) - [c104]Attaullah Buriro, Zahid Akhtar, Bruno Crispo, Filippo Del Frari:
Age, Gender and Operating-Hand Estimation on Smart Mobile Devices. BIOSIG 2016: 273-280 - [c103]Muhammad Rizwan Asghar, César Bernardini, Bruno Crispo:
PROTECTOR: Privacy-preserving information lookup in content-centric networks. ICC 2016: 1-7 - [c102]César Bernardini, Bruno Crispo:
Analyzing Gateways' Impact on Caching for Micro CDNs based on CCN. DCNET 2016: 19-26 - [c101]Maqsood Ahmad, Bruno Crispo, Teklay Gebremichael:
Empirical Analysis on the Use of Dynamic Code Updates in Android and Its Security Implications. NordSec 2016: 119-134 - [c100]Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Konrad S. Wrona:
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. IEEE Symposium on Security and Privacy Workshops 2016: 276-285 - 2015
- [j27]Mauro Conti, Bruno Crispo, Daniele Diodati, Jukka K. Nurminen, Cristina M. Pinotti, Taavi Teemaa:
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones. IEEE Trans. Parallel Distrib. Syst. 26(10): 2778-2790 (2015) - [c99]Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
Towards Black Box Testing of Android Apps. ARES 2015: 501-510 - [c98]Yury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. CODASPY 2015: 37-48 - [c97]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo:
E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud. FiCloud 2015: 135-144 - [c96]Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Konrad S. Wrona:
Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics. ICIAP Workshops 2015: 27-34 - [c95]Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Jeffrey Klardie, Konrad S. Wrona:
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones. PASSWORDS 2015: 45-61 - [e15]Javier Lopez, Indrajit Ray, Bruno Crispo:
Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8924, Springer 2015, ISBN 978-3-319-17126-5 [contents] - 2014
- [j26]Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes:
MOSES: Supporting and Enforcing Security Profiles on Smartphones. IEEE Trans. Dependable Sec. Comput. 11(3): 211-223 (2014) - [c94]Amir Herzberg, Haya Shulman, Bruno Crispo:
Less is more: cipher-suite negotiation for DNSSEC. ACSAC 2014: 346-355 - [c93]Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello:
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. AsiaCCS 2014: 135-146 - [c92]Mojtaba Eskandari, Anderson Santana de Oliveira, Bruno Crispo:
VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud. CloudCom 2014: 86-94 - [c91]Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser:
FSquaDRA: Fast Detection of Repackaged Applications. DBSec 2014: 130-145 - 2013
- [j25]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOONERBAC: Enforcing security policies in outsourced environments. Computers & Security 35: 2-24 (2013) - [j24]Mauro Conti, Jeroen Willemsen, Bruno Crispo:
Providing Source Location Privacy in Wireless Sensor Networks: A Survey. IEEE Communications Surveys and Tutorials 15(3): 1238-1280 (2013) - [j23]Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Windows Mobile LiveSD Forensics. J. Network and Computer Applications 36(2): 677-684 (2013) - [j22]Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo:
Unprivileged Black-Box Detection of User-Space Keyloggers. IEEE Trans. Dependable Sec. Comput. 10(1): 40-52 (2013) - [j21]Earlence Fernandes, Bruno Crispo, Mauro Conti:
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment. IEEE Trans. Information Forensics and Security 8(6): 1027-1037 (2013) - [j20]Bruno P. S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo:
Hybrid Static-Runtime Information Flow and Declassification Enforcement. IEEE Trans. Information Forensics and Security 8(8): 1294-1305 (2013) - [j19]Kemal Bicakci, Bruno Crispo, Gabriele Oligeri:
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload. ACM Trans. Internet Techn. 13(2): 5:1-5:27 (2013) - [j18]Mauro Conti, Arbnor Hasani, Bruno Crispo:
Virtual private social networks and a facebook implementation. TWEB 7(3): 14:1-14:31 (2013) - [c90]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, Mihaela Ion:
Supporting complex queries and access policies for multi-user encrypted databases. CCSW 2013: 77-88 - [c89]Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo:
Enabling trusted stores for android. ACM Conference on Computer and Communications Security 2013: 1345-1348 - [c88]Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
CREPUSCOLO: A collusion resistant privacy preserving location verification system. CRiSIS 2013: 1-9 - [c87]Maarten Decat, Bert Lagaisse, Wouter Joosen, Bruno Crispo:
Introducing concurrency in policy-based access control. MW4NextGen@Middleware 2013: 3:1-3:6 - [c86]Maarten Decat, Bert Lagaisse, Dimitri Van Landuyt, Bruno Crispo, Wouter Joosen:
Federated Authorization for Software-as-a-Service Applications. OTM Conferences 2013: 342-359 - [e14]Bruno Crispo, Ravi S. Sandhu, Nora Cuppens-Boulahia, Mauro Conti, Jean-Louis Lanet:
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013. IEEE 2013 [contents] - [i7]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. CoRR abs/1306.4828 (2013) - [i6]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments. CoRR abs/1308.3489 (2013) - [i5]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. IACR Cryptology ePrint Archive 2013: 277 (2013) - [i4]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments. IACR Cryptology ePrint Archive 2013: 587 (2013) - 2012
- [j17]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Design and implementation of a confidentiality and access control solution for publish/subscribe systems. Computer Networks 56(7): 2014-2037 (2012) - [j16]Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android. IEEE Trans. Information Forensics and Security 7(5): 1426-1438 (2012) - [c85]Cristiano Giuffrida, Stefano Ortolani, Bruno Crispo:
Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions. AsiaCCS 2012: 10-11 - [c84]Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
Demonstrating the effectiveness of MOSES for separation of execution modes. ACM Conference on Computer and Communications Security 2012: 998-1000 - [c83]Alessandro Armando, Silvio Ranise, Fatih Turkmen, Bruno Crispo:
Efficient run-time solving of RBAC user authorization queries: pushing the envelope. CODASPY 2012: 241-248 - [c82]Mauro Conti, Daniele Diodati, Cristina M. Pinotti, Bruno Crispo:
Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption. GreenCom 2012: 269-276 - [c81]Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes:
MOSES: supporting operation modes on smartphones. SACMAT 2012: 3-12 - [c80]Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. Security Protocols Workshop 2012: 199-213 - [c79]
- [e13]Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello:
Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 375, Springer 2012, ISBN 978-3-642-31667-8 [contents] - 2011
- [c78]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. ARES 2011: 99-108 - [c77]Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo:
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. AsiaCCS 2011: 249-259 - [c76]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo:
Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC. ACM Conference on Computer and Communications Security 2011: 841-844 - [c75]
- [c74]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
Securing Data Provenance in the Cloud. iNetSeC 2011: 145-160 - [c73]Gabriela Gheorghe, Bruno Crispo, Roberto Carbone, Lieven Desmet, Wouter Joosen:
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement. Middleware 2011: 350-369 - [c72]Fatih Turkmen, Eunjin Jung, Bruno Crispo:
Towards Run-Time Verification in Access Control. POLICY 2011: 25-32 - [c71]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Enforcing Multi-user Access Policies to Encrypted Cloud Databases. POLICY 2011: 175-177 - [c70]Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo:
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware. RAID 2011: 81-100 - [c69]Fausto Giunchiglia, Bruno Crispo, Rui Zhang:
Access Control via Lightweight Ontologies. ICSC 2011: 352-355 - [c68]Giovanni Russello, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
YAASE: Yet Another Android Security Extension. SocialCom/PASSAT 2011: 1033-1040 - [c67]Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Events privacy in WSNs: A new model and its application. WOWMOM 2011: 1-9 - [e12]Bruce Christianson, Bruno Crispo, James A. Malcolm, Frank Stajano:
Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7114, Springer 2011, ISBN 978-3-642-25866-4 [contents] - [i3]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. IACR Cryptology ePrint Archive 2011: 25 (2011) - 2010
- [j15]Rui Zhang, Fausto Giunchiglia, Bruno Crispo, Lingyang Song:
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment. Wireless Personal Communications 55(1): 5-17 (2010) - [c66]Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti:
A Secure and Scalable Grid-Based Content Management System. ARES 2010: 404-409 - [c65]Mihaela Ion, Giovanni Russello, Bruno Crispo:
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health. ACM Conference on Computer and Communications Security 2010: 696-698 - [c64]Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti:
Time Warp: How Time Affects Privacy in LBSs. ICICS 2010: 325-339 - [c63]Gabriela Gheorghe, Bruno Crispo, Daniel Schleicher, Tobias Anstett, Frank Leymann, Ralph Mietzner, Ganna Monakova:
Combining Enforcement Strategies in Service Oriented Architectures. ICSOC 2010: 288-302 - [c62]Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Event Handoff Unobservability in WSN. iNetSec 2010: 20-28 - [c61]Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo:
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement. IFIPTM 2010: 63-78 - [c60]Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo:
CRePE: Context-Related Policy Enforcement for Android. ISC 2010: 331-345 - [c59]Alessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih Turkmen, Rui Zhang:
Reasoning about Relation Based Access Control. NSS 2010: 231-238 - [c58]Gabriela Gheorghe, Paolo Mori, Bruno Crispo, Fabio Martinelli:
Enforcing UCON Policies on the Enterprise Service Bus. OTM Conferences (2) 2010: 876-893 - [c57]Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo:
Bait Your Hook: A Novel Detection Technique for Keyloggers. RAID 2010: 198-217 - [c56]Fatih Turkmen, Bruno Crispo, Pietro Mazzoleni:
A service-based context management framework for cross-enterprise collaboration. SAC 2010: 2443-2450 - [c55]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Providing Confidentiality in Content-based Publish/subscribe Systems. SECRYPT 2010: 287-292 - [c54]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. SecureComm 2010: 272-289 - [c53]Bruno Crispo, Gabriela Gheorghe, Valentina Di Giacomo, Domenico Presenza:
MASTER as a Security Management Tool for Policy Compliance. ServiceWave 2010: 213-214 - [c52]Stefano Ortolani, Mauro Conti, Bruno Crispo:
Censorship-Resilient Communications through Information Scattering. Security Protocols Workshop 2010: 82-89 - [e11]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Lecture Notes in Computer Science 5964, Springer 2010, ISBN 978-3-642-17772-9 [contents]
2000 – 2009
- 2009
- [j14]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
Efficient integration of fine-grained access control and resource brokering in grid. The Journal of Supercomputing 49(1): 108-126 (2009) - [c51]Rui Zhang, Alessandro Artale, Fausto Giunchiglia, Bruno Crispo:
Using Description Logics in Relation Based Access Control. Description Logics 2009 - [c50]Eunjin Jung, Bruno Crispo, Lasantha Ranaweera:
An efficient and scalable algorithm for policy compatibility in service virtualization. GRID 2009: 58-65 - [c49]Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. SEC 2009: 342-352 - [c48]Mouna Kacimi, Stefano Ortolani, Bruno Crispo:
Anonymous opinion exchange over untrusted social networks. SNS 2009: 26-32 - [e10]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Lecture Notes in Computer Science 5087, Springer 2009, ISBN 978-3-642-04903-3 [contents] - 2008
- [j13]Srijith Krishnan Nair, Ron Gerrits, Bruno Crispo, Andrew S. Tanenbaum:
Turning Teenagers into Stores. IEEE Computer 41(2): 58-62 (2008) - [j12]Srijith Krishnan Nair, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum:
A Virtual Machine Based Information Flow Control System for Policy Enforcement. Electr. Notes Theor. Comput. Sci. 197(1): 3-16 (2008) - [j11]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
XACML Policy Integration Algorithms. ACM Trans. Inf. Syst. Secur. 11(1): 4:1-4:29 (2008) - [c47]Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo:
Enforcing DRM policies across applications. Digital Rights Management Workshop 2008: 87-94 - [c46]Srijith Krishnan Nair, Erik Zentveld, Bruno Crispo, Andrew S. Tanenbaum:
Floodgate: A Micropayment Incentivized P2P Content Delivery Network. ICCCN 2008: 291-297 - [c45]Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino:
P-CDN: Extending access control capabilities of P2P systems to provide CDN services. ISCC 2008: 480-486 - [c44]Mario Gerla, Roberto G. Cascella, Zhen Cao, Bruno Crispo, Roberto Battiti:
An efficient weak secrecy scheme for network coding data dissemination in VANET. PIMRC 2008: 1-5 - [c43]
- [c42]
- [i2]Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. IACR Cryptology ePrint Archive 2008: 87 (2008) - 2007
- [j10]Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker:
Design and implementation of a secure wide-area object middleware. Computer Networks 51(10): 2484-2513 (2007) - [c41]Iulia Ion, Boris Dragovic, Bruno Crispo:
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. ACSAC 2007: 233-242 - [c40]Damiano Bolzoni, Bruno Crispo, Sandro Etalle:
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. LISA 2007: 141-152 - [c39]Srijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum:
A Hybrid PKI-IBC Based Ephemerizer System. SEC 2007: 241-252 - [c38]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Instructions to Reviewers. Security Protocols Workshop 2007: 256 - [c37]Srijith Krishnan Nair, Ivan Djordjevic, Bruno Crispo, Theodosis Dimitrakos:
Secure web service federation management using tpm virtualisation. SWS 2007: 73-82 - [e9]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers. Lecture Notes in Computer Science 4631, Springer 2007, ISBN 978-3-540-77155-5 [contents] - 2006
- [j9]Andrew S. Tanenbaum, Chandana Gamage, Bruno Crispo:
Taking Sensor Networks from the Lab to the Jungle. IEEE Computer 39(8): 98-100 (2006) - [j8]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
RFID malware: truth vs. myth. IEEE Security & Privacy 4(4): 70-72 (2006) - [j7]Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum:
RFID malware: Design principles and examples. Pervasive and Mobile Computing 2(4): 405-426 (2006) - [j6]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
The Evolution of RFID Security. IEEE Pervasive Computing 5(1): 62-69 (2006) - [c36]Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Security for the Mythical Air-Dropped Sensor Network. ISCC 2006: 41-47 - [c35]Melanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum:
A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). LISA 2006: 89-102 - [c34]Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
Is Your Cat Infected with a Computer Virus?. PerCom 2006: 169-179 - [c33]Pietro Mazzoleni, Elisa Bertino, Bruno Crispo:
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! SACMAT 2006: 219-227 - [c32]Chandana Gamage, Ben Gras, Bruno Crispo, Andrew S. Tanenbaum:
An Identity-based Ring Signature Scheme with Enhanced Privacy. SecureComm 2006: 1-5 - [c31]Srijith K. Nair, Bruno Crispo, Andrew S. Tanenbaum:
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. Security Protocols Workshop 2006: 26-31 - [e8]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers. Lecture Notes in Computer Science 3957, Springer 2006, ISBN 3-540-40925-4 [contents] - [i1]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes. IACR Cryptology ePrint Archive 2006: 212 (2006) - 2005
- [c30]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. IEEE SCC 2005: 77-86 - [c29]