94 results on '"Ron Poet"'
Search Results
2. Permission Management and User Privacy Based On Android: Permission Management On Android.
3. Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords.
4. Is it better to choose seen or unseen distracters for graphical passwords.
5. Formalising Identity Management protocols.
6. A Security-Oriented Workflow Framework for Collaborative Environments.
7. Security-enabled Enactment of Decentralized Workflows.
8. Architectural Patterns for Security-Oriented Workflows in Collaborative Environments.
9. Service-Oriented Workflow Executability from a Security Perspective.
10. Mathematical Modelling of Trust Issues in Federated Identity Management.
11. A Hybrid Model of Attribute Aggregation in Federated Identity Management.
12. A study of mnemonic image passwords.
13. CAFS: A Framework for Context-Aware Federated Services.
14. Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords.
15. Do Graphical Authentication Systems Solve the Password Memorability Problem?
16. Passhint: memorable and secure authentication.
17. Managing Dynamic Identity Federations using Security Assertion Markup Language.
18. The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom.
19. Portable Personal Identity Provider in Mobile Phones.
20. Exploring the Guessability of Image Passwords Using Verbal Descriptions.
21. Dynamic Identity Federation Using Security Assertion Markup Language (SAML).
22. A Comprehensive Study of the Usability of Multiple Graphical Passwords.
23. Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication Systems.
24. Analysing attribute aggregation models in federated identity management.
25. A comparative analysis of Identity Management Systems.
26. The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords.
27. Measuring the revised guessability of graphical passwords.
28. Towards a metric for recognition-based graphical password security.
29. Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies
30. A Mechanism for Filtering Distractors for Doodle Passwords.
31. The use of mobile devices in authentication.
32. Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords.
33. Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks.
34. Mathematical Modelling of Identity, Identity Management and Other Related Topics.
35. Exploring the Guessability of Image Passwords.
36. Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model
37. Permission Management and User Privacy Based On Android
38. Creating Graphical Passwords on a Mobile Phone
39. Hacking Passwords that Satisfy Common Password Policies
40. Is it better to choose seen or unseen distracters for graphical passwords
41. How Dangerous Permissions are Described in Android Apps' Privacy Policies?
42. Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices
43. Formalising identity management protocols
44. A hybrid model of attribute aggregation in federated identity management
45. A Security-Oriented Workflow Framework for Collaborative Environments
46. Security-enabled Enactment of Decentralized Workflows
47. Service-Oriented Workflow Executability from a Security Perspective
48. Analysing Power Consumption Of Different Browsers & Identity Management Systems In Mobile Phones
49. An Algorithm for Automatically Choosing Distractors for Recognition Based Authentication using Minimal Image Types~!2009-05-27~!2009-09-10~!2009-12-24~!
50. Managing Dynamic Identity Federations using Security Assertion Markup Language
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.