Ron Poet

According to our database1, Ron Poet authored at least 35 papers between 1986 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Permission Management and User Privacy Based On Android: Permission Management On Android.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Creating Graphical Passwords on a Mobile Phone: Graphical Passwords on a Mobile.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

2019
Is it better to choose seen or unseen distracters for graphical passwords.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

2016
A Security-Oriented Workflow Framework for Collaborative Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Architectural Patterns for Security-Oriented Workflows in Collaborative Environments.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Service-Oriented Workflow Executability from a Security Perspective.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Security-enabled Enactment of Decentralized Workflows.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Formalising Identity Management protocols.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
Managing Dynamic Identity Federations using Security Assertion Markup Language.
J. Theor. Appl. Electron. Commer. Res., 2015

The use of mobile devices in authentication.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Mathematical Modelling of Trust Issues in Federated Identity Management.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

A Hybrid Model of Attribute Aggregation in Federated Identity Management.
Proceedings of the Enterprise Security - Second International Workshop, 2015

2014
CAFS: A Framework for Context-Aware Federated Services.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Mathematical Modelling of Identity, Identity Management and Other Related Topics.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Exploring the Guessability of Image Passwords.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

A study of mnemonic image passwords.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Do Graphical Authentication Systems Solve the Password Memorability Problem?
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Passhint: memorable and secure authentication.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Portable Personal Identity Provider in Mobile Phones.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Exploring the Guessability of Image Passwords Using Verbal Descriptions.
Proceedings of the 12th IEEE International Conference on Trust, 2013

The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Analysing attribute aggregation models in federated identity management.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

A Comprehensive Study of the Usability of Multiple Graphical Passwords.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Dynamic Identity Federation Using Security Assertion Markup Language (SAML).
Proceedings of the Policies and Research in Identity Management, 2013

Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

2012
The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A comparative analysis of Identity Management Systems.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

2011
Measuring the revised guessability of graphical passwords.
Proceedings of the 5th International Conference on Network and System Security, 2011

Towards a metric for recognition-based graphical password security.
Proceedings of the 5th International Conference on Network and System Security, 2011

2009
A Mechanism for Filtering Distractors for Doodle Passwords.
Int. J. Pattern Recognit. Artif. Intell., 2009

1986
Displaying Relevant Features of Protein Molecules.
Comput. Graph. Forum, 1986


  Loading...