His primary areas of investigation include Computer security, Access control, Android, Authorization and Radio-frequency identification. Particularly relevant to Exploit is his body of work in Computer security. His biological study spans a wide range of topics, including Data access, File system and World Wide Web.
His Android research includes elements of Static analysis and Computer engineering. His Authorization study integrates concerns from other disciplines, such as Information Dissemination and Web service. The study incorporates disciplines such as Ubiquitous computing, Security information and event management, Cloud computing security and Information privacy, Privacy software in addition to Radio-frequency identification.
Bruno Crispo spends much of his time researching Computer security, Computer network, Access control, Internet privacy and Encryption. His study on Computer security is mostly dedicated to connecting different topics, such as The Internet. His Computer network research incorporates elements of Scheme and Scalability.
Bruno Crispo combines subjects such as Distributed computing, Relation, Database and Authorization with his study of Access control. Bruno Crispo has researched Encryption in several fields, including Cloud computing and Cryptography. His Malware research incorporates themes from Android and Keystroke logging.
His scientific interests lie mostly in Computer security, Biometrics, Attack surface, Computer network and The Internet. In general Computer security, his work in Exploit is often linked to USable linking many areas of study. The various areas that Bruno Crispo examines in his Biometrics study include Password, Face, Usability, Human–computer interaction and Authentication.
Bruno Crispo combines subjects such as Scalability and Key with his study of Attack surface. Many of his research projects under Computer network are closely connected to Return on investment with Return on investment, tying the diverse disciplines of science together. His The Internet research includes themes of Reliability and Smart device.
Bruno Crispo focuses on Computer security, Biometrics, Usability, Payment and Human–computer interaction. Computer security is a component of his Attack surface and Security properties studies. His Attack surface research is multidisciplinary, incorporating elements of Telecommunications, Virtualization, Key and AUTOSAR.
His Usability research incorporates elements of User authentication and Robustness. His research in Human–computer interaction focuses on subjects like Security analysis, which are connected to Modality. His work carried out in the field of Touchscreen brings together such families of science as Face, Spoofing attack, Authentication and Identification.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Internet of Things: A survey on the security of IoT frameworks
Mahmoud Ammar;Giovanni Russello;Bruno Crispo.
workshop on information security applications (2018)
The evolution of RFID security
M.R. Rieback;B. Crispo;A.S. Tanenbaum.
IEEE Pervasive Computing (2006)
CRePE: context-related policy enforcement for android
Mauro Conti;Vu Thien Nga Nguyen;Bruno Crispo.
international conference on information security (2010)
Is your cat infected with a computer virus
M.R. Rieback;B. Crispo;A.S. Tanenbaum.
ieee international conference on pervasive computing and communications (2006)
RFID guardian: a battery-powered mobile device for RFID privacy management
Melanie R. Rieback;Bruno Crispo;Andrew S. Tanenbaum.
australasian conference on information security and privacy (2005)
A new family of authentication protocols
Ross Anderson;Francesco Bergadano;Bruno Crispo;Jong-Hyeon Lee.
Operating Systems Review (1998)
Providing Source Location Privacy in Wireless Sensor Networks: A Survey
Mauro Conti;Jeroen Willemsen;Bruno Crispo.
IEEE Communications Surveys and Tutorials (2013)
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call
Mauro Conti;Irina Zachia-Zlatea;Bruno Crispo.
computer and communications security (2011)
A DRM security architecture for home networks
Bogdan C. Popescu;Bruno Crispo;Andrew S. Tanenbaum;Frank L.A.J. Kamperman.
digital rights management (2004)
Safe and private data sharing with turtle: Friends team-up and beat the system
Bogdan C Popescu;Bruno Crispo;Andrew S Tanenbaum.
Lecture Notes in Computer Science (2004)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: