Tags: handheld devices

Past Projects

  1. Vigil / Secure Centaurus

Publications

2009

  1. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.

2007

  1. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3323 downloads, 16 citations.

2005

  1. W. Jensen, S. Gavrila, and V. Korolev, "Proximity-Based Authentication for Mobile Devices", InProceedings, Proceedings of The 2005 International Conference on Security and Management, June 2005, 1883 downloads.
  2. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7406 downloads, 96 citations.

2004

  1. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.

2003

  1. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003, 29 downloads.
  2. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  3. W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 1199 downloads.
  4. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 867 downloads.

2002

  1. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 18 downloads.