Jonathan Voris
Orcid: 0000-0003-0899-5674
According to our database1,
Jonathan Voris
authored at least 24 papers
between 2007 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Active authentication using file system decoys and user behavior modeling: results of a large scale study.
Comput. Secur., 2019
2018
Proceedings of the Mobile Computing, Applications, and Services, 2018
2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016
Proceedings of the 12th International Conference on Network and Service Management, 2016
2015
Proceedings of the Eighth European Workshop on System Security, 2015
2013
IEEE Trans. Emerg. Top. Comput., 2013
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing.
Proceedings of the Financial Cryptography and Data Security, 2013
2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
Int. J. Inf. Sec., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the 16th International Conference on Computer Games, 2011
2010
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
CoRR, 2010
Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
2009
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
CoRR, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007