Jonathan Voris

Orcid: 0000-0003-0899-5674

According to our database1, Jonathan Voris authored at least 24 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Active authentication using file system decoys and user behavior modeling: results of a large scale study.
Comput. Secur., 2019

2018
Measuring How We Play: Authenticating Users with Touchscreen Gameplay.
Proceedings of the Mobile Computing, Applications, and Services, 2018

2017
Touchscreen Biometrics Across Multiple Devices.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Exploring Games for Improved Touchscreen Authentication on Mobile Devices.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Can mobile device users be identified by how they play a game?
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

Driver identification and authentication with active behavior modeling.
Proceedings of the 12th International Conference on Network and Service Management, 2016

2015
Fox in the trap: thwarting masqueraders via automated decoy document deployment.
Proceedings of the Eighth European Workshop on System Security, 2015

2013
Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks.
IEEE Trans. Emerg. Top. Comput., 2013

Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Lost in Translation: Improving Decoy Documents via Automated Translation.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

Exploring Mobile Proxies for Better Password Authentication.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Data remanence effects on memory-based entropy collection for RFID systems.
Int. J. Inf. Sec., 2011

Accelerometers and randomness: perfect together.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Playful security: A computer game for secure wireless device pairing.
Proceedings of the 16th International Conference on Computer Games, 2011

2010
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
CoRR, 2010

Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

2009
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
CoRR, 2009

Treat 'em like other devices: user authentication of multiple personal RFID tags.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

2008
Universal device pairing using an auxiliary device.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Pairing Devices with Good Quality Output Interfaces.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007


  Loading...