Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Ryan, Peter Y.A."'
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:1581-1604
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:827-841
Publikováno v:
In Computers & Security June 2017 67:291-307
Autor:
Drăgan, Constantin Cătălin, Dupressoir, François, Estaji, Ehsan, Gjøsteen, Kristian, Haines, Thomas, Ryan, Peter Y.A., Rønne, Peter B., Solberg, Morten Rotvold
Publikováno v:
Journal of Computer Security; 2023, Vol. 31 Issue 5, p469-499, 31p
Autor:
Zollinger, Marie-Laure, Distler, Verena, Roenne, Peter B., Ryan, Peter Y.A., Lallemand, Carine, Koenig, Vincent, Krimmer, Robert, Volkamer, Melanie, Beckert, Bernhard
Publikováno v:
Fourth International Joint Conference on Electronic Voting E-Vote-ID 2019 : 1-4 October 2019, Lochau/Bregenz, Austria : Proceedings, 187-202
STARTPAGE=187;ENDPAGE=202;TITLE=Fourth International Joint Conference on Electronic Voting E-Vote-ID 2019 : 1-4 October 2019, Lochau/Bregenz, Austria : Proceedings
STARTPAGE=187;ENDPAGE=202;TITLE=Fourth International Joint Conference on Electronic Voting E-Vote-ID 2019 : 1-4 October 2019, Lochau/Bregenz, Austria : Proceedings
This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::a6613b6b95f9b2709813287f0bfc67bd
https://research.tue.nl/nl/publications/de88cd9e-31ab-4647-9411-16284fdd94ae
https://research.tue.nl/nl/publications/de88cd9e-31ab-4647-9411-16284fdd94ae
Autor:
Jonker, Hugo, Krumnow, Benjamin, Vlot, Gabry, Sako, Kazue, Schneider, Steve, Ryan, Peter Y.A.
Publikováno v:
Jonker, H, Krumnow, B & Vlot, G 2019, Fingerprint Surface-Based Detection of Web Bot Detectors . in K Sako, S Schneider & P Y A Ryan (eds), Computer Security-ESORICS 2019 : 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II . Springer, Cham, Lecture Notes in Computer Science (LNCS), vol. 11736, pp. 586-605 . https://doi.org/10.1007/978-3-030-29962-0_28
Lecture Notes in Computer Science ISBN: 9783030299613
ESORICS (2)
Computer Security-ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II, 586-605
STARTPAGE=586;ENDPAGE=605;TITLE=Computer Security-ESORICS 2019
Lecture Notes in Computer Science ISBN: 9783030299613
ESORICS (2)
Computer Security-ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II, 586-605
STARTPAGE=586;ENDPAGE=605;TITLE=Computer Security-ESORICS 2019
Web bots are used to automate client interactions with websites, which facilitates large-scale web measurements. However, websites may employ web bot detection. When they do, their response to a bot may differ from responses to regular browsers. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::87f62f95c92e6c2044800382ebc3cf2e
https://research.ou.nl/en/publications/7e71fdd1-36c3-4d36-a10f-8ff5729974b3
https://research.ou.nl/en/publications/7e71fdd1-36c3-4d36-a10f-8ff5729974b3
Autor:
Aljohani, Meshari, Alshamrani, Saeed H., Amoroso, Edward G., Amro, Ahmed, Anderson, Richard, Balboni, Paolo, Barata, Martim Taborda, Bardin, Jeffrey S., Basile, Cataldo, Bella, Giampaolo, Braghin, Chiara, Capparelli, Francesco, Casalino, Matteo Maria, Chasdi, Richard J., Chen, Thomas M., Chowdhury, N. M. Istiak, Collins, Lauren, Cremonini, Marco, da Cruz, José de Arimatéia, Day, Christopher, Di Pietro, Roberto, Ellis, Scott R., El Maliki, Tewfiq, Evangelopoulos, Evan, Foresti, Sara, Francis, Kate, Fulp, Errin W., Genovese, Angelo, Gurtu, Anurag, Harmening, Jim, Hasan, Ragib, Hodwitz, Omi, Hoque, Mohammad Aminul, Hossain, Md Ismail, Huseynov, Emin, Katsikas, Sokratis K., Kavallieratos, Georgios, King, Steff, Lambrinoudakis, Costas, Lewis, Keith, Lim, Damien, Livraga, Giovanni, Lombardi, Flavio, McDonald, John, McGowan, John, Mims, Nailah A., Mukkamala, Ravi, Mutti, Simone, Nicoletti, Pete F., Noble, Kevin, Olariu, Stephan, Pandya, Pramod, Paraboschi, Stefano, Patil, Harsh Kupwade, Peacock, Thea, Perkins, Ken, Pitropakis, Nikolaos, Piuri, Vincenzo, Rounsavall, Robert, Ryan, Peter Y.A., Samarati, Pierangela, Schneider, Steve, Scotti, Fabio, Seigneur, Jean-Marc, Signorini, Matteo, Stallings, William, Vimercati, Sabrina De Capitani di, Wing, Dan, Wolf, Brian, Xia, Zhe, Zabicki, Roman
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:xv-xvi
Autor:
Balboni, Paolo, Barata, Martim Taborda, Basile, Cataldo, Bella, Giampaolo, Beuchelt, Gerald, Caballero, Albert, Capparelli, Francesco, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Curry, Samuel J.J., Dara, Rozita, Ellis, Scott R., Gross, William F., Jr., Gurkok, Cem, Hamed, Tarfa, Hao, Feng, Harmening, Jim, Hoffman, Rich, Huseynov, Emin, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Karunamoorthy, Aruna, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Kotapati, Kameswari, Kremer, Stefan C., Lancrenon, Jean, LaPorta, Thomas F., Lewis, Keith, Liu, Peng, Mansoor, Bill, Mims, Nailah A., Padmavathi, V., Pandya, Pramod, Paraboschi, Stefano, Patil, Harsh Kupwade, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Saminathan, R., Santana, Mario D., Seigneur, Jean-Marc, Soper, Daniel S., Spies, Terence, Walker, Jesse, West, Michael A., Yan, Liang, Yee, George O.M., Zhao, Gansen
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:xvii-xviii
Publikováno v:
In Electronic Notes in Theoretical Computer Science 4 February 2005 121:101-115
Autor:
Distler, Verena, Zollinger, Marie Laure, Lallemand, Carine, Roenne, Peter B., Ryan, Peter Y.A., Koenig, Vincent
Publikováno v:
CHI 2019-Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or black-boxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplist
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::4445a1d95a43af103a2a61e13458d720
http://orbilu.uni.lu/handle/10993/37704
http://orbilu.uni.lu/handle/10993/37704