-
1
-
-
84899867860
-
-
Oauth 2.0
-
Oauth 2.0.
-
-
-
-
2
-
-
84899837705
-
-
Openssl: The open source toolkit for ssl/tls
-
Openssl: The open source toolkit for ssl/tls.
-
-
-
-
3
-
-
84899879831
-
-
Qt project
-
Qt project.
-
-
-
-
4
-
-
84899814751
-
-
Qt web-portable web browser
-
Qt web-portable web browser.
-
-
-
-
5
-
-
84899886008
-
-
Tpm
-
Tpm Tpm.
-
-
-
-
6
-
-
84899785247
-
-
U-boot\-The universal boot loader
-
U-boot\-The universal boot loader.
-
-
-
-
7
-
-
84869430752
-
Strengthening user authentication through opportunistic cryptographic identity assertions
-
A. Czeskis, M. Dietz, T. Kohno, D. Wallach, and D. Balfanz. Strengthening user authentication through opportunistic cryptographic identity assertions. In CCS, 2012.
-
(2012)
CCS
-
-
Czeskis, A.1
Dietz, M.2
Kohno, T.3
Wallach, D.4
Balfanz, D.5
-
8
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
C. Herley and P. C. van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security &Privacy, 10(1), 2012.
-
(2012)
IEEE Security &Privacy
, vol.10
, Issue.1
-
-
Herley, C.1
Van Oorschot, P.C.2
-
10
-
-
84881187703
-
Screenpass: Secure password entry on touchscreen devices
-
D. Liu, E. Cuervo, V. Pistol, R. Scudellari, and L. P. Cox. Screenpass: Secure password entry on touchscreen devices. In MobiSys, 2013.
-
(2013)
MobiSys
-
-
Liu, D.1
Cuervo, E.2
Pistol, V.3
Scudellari, R.4
Cox, L.P.5
-
12
-
-
84885595267
-
Cloud terminal: Secure access to sensitive applications from untrusted systems
-
L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica. Cloud terminal: secure access to sensitive applications from untrusted systems. In USENIX ATC, 2012.
-
(2012)
USENIX ATC
-
-
Martignoni, L.1
Poosankam, P.2
Zaharia, M.3
Han, J.4
McCamant, S.5
Song, D.6
Paxson, V.7
Perrig, A.8
Shenker, S.9
Stoica, I.10
-
13
-
-
77952132371
-
Flicker: An execution infrastructure for tcb minimization
-
ACM
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for tcb minimization. In Operating Systems Review, volume 42. ACM, 2008.
-
(2008)
Operating Systems Review
, vol.42
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
14
-
-
84860709376
-
Trusted language runtime (tlr): Enabling trusted applications on smartphones
-
N. Santos, H. Raj, S. Saroiu, and A. Wolman. Trusted language runtime (tlr): enabling trusted applications on smartphones. In HotMobile. ACM, 2011.
-
(2011)
HotMobile. ACM
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
16
-
-
84899880505
-
-
A. S. Technology. Building a secure system using trustzone technology
-
A. S. Technology. Building a secure system using trustzone technology.
-
-
-
-
18
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In IEEE Security and Privacy, 2012.
-
(2012)
IEEE Security and Privacy
-
-
Zhou, Y.1
Jiang, X.2
|