Bruno Crispo

According to our database1, Bruno Crispo authored at least 152 papers between 1996 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access.
Mobile Information Systems, 2018

Internet of Things: A survey on the security of IoT frameworks.
J. Inf. Sec. Appl., 2018

Large-Scale Analysis of Style Injection by Relative Path Overwrite.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

SPEED: Secure Provable Erasure for Class-1 IoT Devices.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Security and privacy in vehicular communications: Challenges and opportunities.
Vehicular Communications, 2017

Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.
PoPETs, 2017

TeICC: targeted execution of inter-component communications in Android.
Proceedings of the Symposium on Applied Computing, 2017

SμV - the security microvisor: a virtualisation-based security middleware for the internet of things.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017

Please hold on: Unobtrusive user authentication using smartphone's built-in sensors.
Proceedings of the IEEE International Conference on Identity, 2017

Mobile biometrics: Towards a comprehensive evaluation methodology.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

CerberOS: A Resource-Secure OS for Sharing IoT Devices.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

DLoc: Distributed Auditing for Data Location Compliance in Cloud.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Evaluation of Motion-Based Touch-Typing Biometrics for Online Banking.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

2016
Cyber-Physical Security and Privacy [Guest editors' introduction].
IEEE Internet Computing, 2016

Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Empirical Analysis on the Use of Dynamic Code Updates in Android and Its Security Implications.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Analyzing Gateways' Impact on Caching for Micro CDNs based on CCN.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

PROTECTOR: Privacy-preserving information lookup in content-centric networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Age, Gender and Operating-Hand Estimation on Smart Mobile Devices.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

2015
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
IEEE Trans. Parallel Distrib. Syst., 2015

ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics.
Proceedings of the New Trends in Image Analysis and Processing - ICIAP 2015 Workshops, 2015

E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Towards Black Box Testing of Android Apps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
MOSES: Supporting and Enforcing Security Profiles on Smartphones.
IEEE Trans. Dependable Sec. Comput., 2014

FSquaDRA: Fast Detection of Repackaged Applications.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

PIDGIN: privacy-preserving interest and content sharing in opportunistic networks.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Less is more: cipher-suite negotiation for DNSSEC.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Virtual private social networks and a facebook implementation.
TWEB, 2013

LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload.
ACM Trans. Internet Techn., 2013

Hybrid Static-Runtime Information Flow and Declassification Enforcement.
IEEE Trans. Information Forensics and Security, 2013

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
IEEE Trans. Information Forensics and Security, 2013

Unprivileged Black-Box Detection of User-Space Keyloggers.
IEEE Trans. Dependable Sec. Comput., 2013

Windows Mobile LiveSD Forensics.
J. Network and Computer Applications, 2013

ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments.
IACR Cryptology ePrint Archive, 2013

Providing Source Location Privacy in Wireless Sensor Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2013

ESPOONERBAC: Enforcing security policies in outsourced environments.
Computers & Security, 2013

Federated Authorization for Software-as-a-Service Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Introducing concurrency in policy-based access control.
Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing, 2013

CREPUSCOLO: A collusion resistant privacy preserving location verification system.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Enabling trusted stores for android.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Supporting complex queries and access policies for multi-user encrypted databases.
Proceedings of the CCSW'13, 2013

2012
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android.
IEEE Trans. Information Forensics and Security, 2012

Design and implementation of a confidentiality and access control solution for publish/subscribe systems.
Computer Networks, 2012

NoisyKey: Tolerating Keyloggers via Keystrokes Hiding.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
Proceedings of the Security Protocols XX, 2012

MOSES: supporting operation modes on smartphones.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Efficient run-time solving of RBAC user authorization queries: pushing the envelope.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Demonstrating the effectiveness of MOSES for separation of execution modes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Events privacy in WSNs: A new model and its application.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

YAASE: Yet Another Android Security Extension.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Access Control via Lightweight Ontologies.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Towards Run-Time Verification in Access Control.
Proceedings of the POLICY 2011, 2011

Enforcing Multi-user Access Policies to Encrypted Cloud Databases.
Proceedings of the POLICY 2011, 2011

Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011

Securing Data Provenance in the Cloud.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Virtual private social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment.
Wireless Personal Communications, 2010

Censorship-Resilient Communications through Information Scattering.
Proceedings of the Security Protocols XVIII, 2010

MASTER as a Security Management Tool for Policy Compliance.
Proceedings of the Towards a Service-Based Internet - Third European Conference, 2010

Supporting Publication and Subscription Confidentiality in Pub/Sub Networks.
Proceedings of the Security and Privacy in Communication Networks, 2010

Providing Confidentiality in Content-based Publish/subscribe Systems.
Proceedings of the SECRYPT 2010, 2010

A service-based context management framework for cross-enterprise collaboration.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Bait Your Hook: A Novel Detection Technique for Keyloggers.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Enforcing UCON Policies on the Enterprise Service Bus.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

Reasoning about Relation Based Access Control.
Proceedings of the Fourth International Conference on Network and System Security, 2010

CRePE: Context-Related Policy Enforcement for Android.
Proceedings of the Information Security - 13th International Conference, 2010

xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Event Handoff Unobservability in WSN.
Proceedings of the Open Research Problems in Network Security, 2010

Combining Enforcement Strategies in Service Oriented Architectures.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010

Time Warp: How Time Affects Privacy in LBSs.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

An implementation of event and filter confidentiality in pub/sub systems and its application to e-health.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

A Secure and Scalable Grid-Based Content Management System.
Proceedings of the ARES 2010, 2010

2009
Efficient integration of fine-grained access control and resource brokering in grid.
The Journal of Supercomputing, 2009

Anonymous opinion exchange over untrusted social networks.
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009

Towards a Theory of White-Box Security.
Proceedings of the Emerging Challenges for Security, 2009

An efficient and scalable algorithm for policy compatibility in service virtualization.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009

Ontology Driven Community Access Control.
Proceedings of the ESWC2009 Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009) Heraklion, 2009

Using Description Logics in Relation Based Access Control.
Proceedings of the 22nd International Workshop on Description Logics (DL 2009), 2009

2008
XACML Policy Integration Algorithms.
ACM Trans. Inf. Syst. Secur., 2008

A Virtual Machine Based Information Flow Control System for Policy Enforcement.
Electr. Notes Theor. Comput. Sci., 2008

Turning Teenagers into Stores.
IEEE Computer, 2008

Performance evaluation of XACML PDP implementations.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

RelBAC: Relation Based Access Control.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

An efficient weak secrecy scheme for network coding data dissemination in VANET.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

P-CDN: Extending access control capabilities of P2P systems to provide CDN services.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Floodgate: A Micropayment Incentivized P2P Content Delivery Network.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Enforcing DRM policies across applications.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

2007
Design and implementation of a secure wide-area object middleware.
Computer Networks, 2007

Secure web service federation management using tpm virtualisation.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Instructions to Reviewers.
Proceedings of the Security Protocols, 2007

A Hybrid PKI-IBC Based Ephemerizer System.
Proceedings of the New Approaches for Security, 2007

ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
Proceedings of the 21th Large Installation System Administration Conference, 2007

Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
The Evolution of RFID Security.
IEEE Pervasive Computing, 2006

RFID malware: Design principles and examples.
Pervasive and Mobile Computing, 2006

RFID malware: truth vs. myth.
IEEE Security & Privacy, 2006

Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes.
IACR Cryptology ePrint Archive, 2006

Taking Sensor Networks from the Lab to the Jungle.
IEEE Computer, 2006

Towards a Secure Application-Semantic Aware Policy Enforcement Architecture.
Proceedings of the Security Protocols, 2006

An Identity-based Ring Signature Scheme with Enhanced Privacy.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Is Your Cat Infected with a Computer Virus?.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

A Platform for RFID Security and Privacy Administration (Awarded Best Paper!).
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

Security for the Mythical Air-Dropped Sensor Network.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Enabling DRM-Preserving Digital Content Redistribution.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags.
Proceedings of the Security Protocols, 2005

How to incorporate revocation status information into the trust metrics for public-key certification.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Securely Replicated Web Documents.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

P-Hera: Scalable fine-grained access control for P2P infrastructures.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Counting Abuses Using Flexible Off-line Credentials.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Efficient Integration of Fine-grained Access Control in Large-scale Grid Services.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System.
Proceedings of the Security Protocols, 2004

Security for grid-based computing systems issues and challenges.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Support for multi-level security policies in DRM architectures.
Proceedings of the New Security Paradigms Workshop 2004, 2004

Towards Supporting Fine-Grained Access Control for Grid Resources.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

A DRM security architecture for home networks.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Supporting Multi-Dimensional Trustworthiness for Grid Workflows.
Proceedings of the Digital Library Architectures: Peer-to-Peer, 2004

Symmetric Key Authentication Services Revisited.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Enforcing Security Policies for Distributed Objects Applications.
Proceedings of the Security Protocols, 2003

A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Secure Data Replication over Untrusted Hosts.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003

2002
Individual Authentication in Multiparty Communications.
Computers & Security, 2002

2001
Delegation Protocols for Electronic Commerce.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Reasoning about Accountability within Delegation.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
WWW security and trusted third party services.
Future Generation Comp. Syst., 2000

Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.
Proceedings of the Security Protocols, 2000

Chained Stream Authentication.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Individual Single Source Authentication on the MBone.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
Issues in Multicast Security.
Proceedings of the Security Protocols, 1999

1998
High Dictionary Compression for Proactive Password Checking.
ACM Trans. Inf. Syst. Secur., 1998

A New Family of Authentication Protocols.
Operating Systems Review, 1998

Secure WWW Transactions Using Standard HTTP and Java Applets.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Delegation of Responsibility (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

Delegation of Responsibility (Position Paper).
Proceedings of the Security Protocols, 1998

1997
Strong Authentication and Privacy with Standard Browsers.
Journal of Computer Security, 1997

How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments.
Proceedings of the Security Protocols, 1997

Proactive Password Checking with Decision Trees.
Proceedings of the CCS '97, 1997

1996
A Certification Scheme for Electronic Commerce.
Proceedings of the Security Protocols, 1996


  Loading...