Cited By
View all- Wang YLaing TMoreira JRyan MVilela JSchulmann HLi N(2024)Remote Registration of Multiple AuthenticatorsProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653273(379-390)Online publication date: 19-Jun-2024
- Das TNath NAcharyya KChakraborty SChatterjee P(2023)Hardware and Software Cyber Security ToolsAI Tools for Protecting and Preventing Sophisticated Cyber Attacks10.4018/978-1-6684-7110-4.ch005(109-131)Online publication date: 26-May-2023
- Sempreboni DViganò L(2023)A mutation-based approach for the formal and automated analysis of security ceremoniesJournal of Computer Security10.3233/JCS-21007531:4(293-364)Online publication date: 1-Jan-2023
- Show More Cited By