San-Tsai Sun

According to our database1, San-Tsai Sun authored at least 13 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Decoupling data-at-rest encryption and smartphone locking with wearable devices.
Pervasive Mob. Comput., 2016

2015
Android Rooting: Methods, Detection, and Evasion.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2013
Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model.
ACM Trans. Internet Techn., 2013

2012
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures.
Comput. Secur., 2012

The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
What makes users refuse web single sign-on?: an empirical investigation of OpenID.
Proceedings of the Symposium On Usable Privacy and Security, 2011

OpenID-enabled browser: towards usable and secure web single sign-on.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks.
Int. J. Secur. Softw. Eng., 2010

A billion keys, but few locks: the crisis of web single sign-on.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

2009
Open Problems in Web 2.0 User Content Sharing.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Secure Web 2.0 Content Sharing Beyond Walled Gardens.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009


  Loading...