Bruno Crispo
Bruno Crispo
Professor of Computer Science, University of Trento, Italy
No verified email - Homepage
Cited by
Cited by
Internet of Things: A survey on the security of IoT frameworks
M Ammar, G Russello, B Crispo
Journal of Information Security and Applications 38, 8-27, 2018
The evolution of RFID security
MR Rieback, B Crispo, AS Tanenbaum
IEEE Pervasive Computing 5 (01), 62-69, 2006
Crepe: Context-related policy enforcement for android
M Conti, VTN Nguyen, B Crispo
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
Is your cat infected with a computer virus?
MR Rieback, B Crispo, AS Tanenbaum
Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006
RFID Guardian: A battery-powered mobile device for RFID privacy management
MR Rieback, B Crispo, AS Tanenbaum
Australasian Conference on Information Security and Privacy, 184-194, 2005
A new family of authentication protocols
R Anderson, F Bergadano, B Crispo, JH Lee, C Manifavas, R Needham
ACM SIGOPS Operating Systems Review 32 (4), 9-20, 1998
Providing source location privacy in wireless sensor networks: A survey
M Conti, J Willemsen, B Crispo
IEEE Communications Surveys & Tutorials 15 (3), 1238-1280, 2013
MOSES: supporting and enforcing security profiles on smartphones
Y Zhauniarovich, G Russello, M Conti, B Crispo, E Fernandes
IEEE Transactions on Dependable and Secure Computing 11 (3), 211-223, 2014
Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call
M Conti, I Zachia-Zlatea, B Crispo
Proceedings of the 6th ACM symposium on information, computer and …, 2011
A DRM security architecture for home networks
BC Popescu, B Crispo, AS Tanenbaum, FLAJ Kamperman
Proceedings of the 4th ACM workshop on Digital rights management, 1-10, 2004
Safe and private data sharing with turtle: friends team-up and beat the system (transcript of discussion)
B Popescu
International Workshop on Security Protocols, 221-230, 2004
XACML policy integration algorithms
P Mazzoleni, B Crispo, S Sivasubramanian, E Bertino
ACM Transactions on Information and System Security (TISSEC) 11 (1), 1-29, 2008
A virtual machine based information flow control system for policy enforcement
SK Nair, PND Simpson, B Crispo, AS Tanenbaum
Electronic Notes in Theoretical Computer Science 197 (1), 3-16, 2008
Taking sensor networks from the lab to the jungle
AS Tanenbaum, C Gamage, B Crispo
Computer 39 (8), 98-100, 2006
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications
Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
An identity-based ring signature scheme with enhanced privacy
C Gamage, B Gras, B Crispo, AS Tanenbaum
2006 Securecomm and Workshops, 1-5, 2006
Hold and sign: A novel behavioral biometrics for smartphone user authentication
A Buriro, B Crispo, F Delfrari, K Wrona
2016 IEEE security and privacy workshops (SPW), 276-285, 2016
A platform for RFID security and privacy administration
MR Rieback, G Gaydadjiev, B Crispo, RFH Hofman, AS Tanenbaum
USENIX LISA, 89-102, 2006
Crêpe: A system for enforcing fine-grained context-related policies on android
M Conti, B Crispo, E Fernandes, Y Zhauniarovich
IEEE Transactions on Information Forensics and Security 7 (5), 1426-1438, 2012
Performance evaluation of XACML PDP implementations
F Turkmen, B Crispo
Proceedings of the 2008 ACM workshop on Secure web services, 37-44, 2008
The system can't perform the operation now. Try again later.
Articles 1–20