Učitavanje...
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Godišnji broj citata
Dvostruki navodi
Sljedeći su članci spojeni u Znalcu.
Navodi iz obaju
članaka broje se samo za prvi članak.
Spojeni navodi
Zbroj za "Citirano" uključuje navode sljedećeg članka u Znalcu. Oni koji su označeni znakom
*
mogu biti različiti od članka u profilu.
Dodavanje suautora
Suautori
Prati
Novi članci tog autora
Novi navodi tog autora
Novi članci povezani s istraživanjem tog autora
E-adresa za obavijesti
Završeno
Moj profil
Moja knjižnica
Mjerni podaci
Upozorenja
Postavke
Prijavite se
Prijavite se
Izradite svoj profil
Citirano
Prikaži sve
Sve
Od 2019.
Citati
1215
552
H-indeks
13
9
i10-indeks
14
9
0
180
90
45
135
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
3
20
25
53
84
126
160
168
138
109
119
92
70
24
Javni pristup
Prikaži sve
Prikaži sve
1 članak
0 članaka
dostupno
nije dostupno
Na temelju uvjeta financiranja
Prati
Claudio Marforio
Institute of Information Security,
ETH Zurich
Potvrđena adresa e-pošte na inf.ethz.ch -
Početna stranica
System Security
Information Security
Članci
Citirano
Javni pristup
Naslov
Razvrstaj
Poredaj po navodima
Poredaj po godini
Poredaj po naslovu
Citirano
Citirano
Godina
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
N Karapanos, C Marforio, C Soriente, S Capkun
24th USENIX security symposium (USENIX security 15), 483-498
, 2015
508
*
2015
Analysis of the communication between colluding applications on modern smartphones
C Marforio, H Ritzdorf, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 51-60
, 2012
231
2012
Application collusion attack on the permission-based security model and its implications for modern smartphone systems
C Marforio, A Francillon, S Capkun
ETH Zurich
, 2011
121
2011
Smartphones as Practical and Secure Location Verification Tokens for Payments
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
The Network and Distributed System Security Symposium (NDSS)
, 2014
99
2014
Personalized security indicators to detect application phishing attacks in mobile platforms
C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun
arXiv preprint arXiv:1502.06824
, 2015
41
2015
Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications
C Marforio, R Jayaram Masti, C Soriente, K Kostiainen, S Čapkun
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …
, 2016
37
2016
User-level secure deletion on log-structured file systems
J Reardon, C Marforio, S Capkun, D Basin
Proceedings of the 7th ACM symposium on information, computer and …
, 2012
35
2012
Secure enrollment and practical migration for mobile trusted execution environments
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
Proceedings of the Third ACM workshop on Security and privacy in smartphones …
, 2013
32
2013
An architecture for concurrent execution of secure environments in clouds
R Jayaram Masti, C Marforio, S Capkun
Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 11-22
, 2013
26
2013
Hardened setup of personalized security indicators to counter phishing attacks in mobile banking
C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …
, 2016
25
2016
Enabling trusted scheduling in embedded systems
RJ Masti, C Marforio, A Ranganathan, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 61-70
, 2012
18
2012
SwissPeaks–Mobile augmented reality to identify mountains
S Karpischek, C Marforio, M Godenzi, S Heuel, F Michahelles
Workshop at the International Symposium on Mixed and Augmented Reality 2009 …
, 2009
14
2009
Secure deletion on log-structured file systems
J Reardon, C Marforio, S Capkun, D Basin
arXiv preprint arXiv:1106.0917
, 2011
13
2011
Isolated execution on many-core architectures
RJ Masti, D Rai, C Marforio, S Capkun
Cryptology ePrint Archive
, 2014
11
2014
Logical partitions on many-core platforms
RJ Masti, C Marforio, K Kostiainen, C Soriente, S Capkun
Proceedings of the 31st Annual Computer Security Applications Conference …
, 2015
3
2015
Smartphone Security: New Applications and Challenges
C Marforio
ETH Zurich
, 2016
1
2016
METHOD AND DEVICES FOR SECURE DELETION OF DATA IN A LOG STRUCTURED FILE SYSTEM
S CAPKUN, D BASIN, J REARDON, C MARFORIO
WO Patent 2,012,167,392
, 2012
2012
Timed data deletion on mobile communication devices
C Marforio
Swiss Federal Institute of Technology, Department of Computer Science …
, 2010
2010
Isolation on Many-core Architectures
RJ Masti, D Rai, C Marforio, S Čapkun
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–19
Prikaži više
Privatnost
Uvjeti
Pomoć
O Znalcu
Pomoć za pretraživanje