A PIN-entry method resilient against shoulder surfing V Roth, K Richter, R Freidinger Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 440 | 2004 |
Listen and whisper: Security mechanisms for BGP L Subramanian, V Roth, I Stoica, S Shenker, R Katz Proc. NSDI 4, 2004 | 321 | 2004 |
Bezel swipe: conflict-free scrolling and multiple selection on mobile touch screen devices V Roth, T Turner Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009 | 183 | 2009 |
Multiple selection on devices with many gestures V Roth US Patent 8,924,892, 2014 | 173 | 2014 |
Mutual protection of co-operating agents V Roth Secure Internet programming: security issues for mobile and distributed …, 1999 | 134 | 1999 |
Secure recording of itineraries through cooperating agents V Roth ECOOP Workshops 1543, 297-298, 1998 | 132 | 1998 |
Simple and effective defense against evil twin access points V Roth, W Polak, E Rieffel, T Turner Proceedings of the first ACM conference on Wireless network security, 220-235, 2008 | 105 | 2008 |
Concepts and architecture of a security-centric mobile agent server V Roth, M Jalali-Sohi Proceedings 5th International Symposium on Autonomous Decentralized Systems …, 2001 | 99 | 2001 |
On the robustness of some cryptographic protocols for mobile agent protection V Roth Mobile Agents: 5th International Conference, MA 2001 Atlanta, GA, USA …, 2001 | 95 | 2001 |
Access control and key management for mobile agents V Roth, M Jalali-Sohi Computers & Graphics 22 (4), 457-461, 1998 | 89 | 1998 |
Internet-facing PLCs-a new back orifice J Klick, S Lau, D Marzin, JO Malchow, V Roth Blackhat USA, 22-26, 2015 | 77 | 2015 |
The IR ring: authenticating users' touches on a multi-touch display V Roth, P Schmidt, B Güldenring Proceedings of the 23nd annual ACM symposium on User interface software and …, 2010 | 75 | 2010 |
The u in crypto stands for usable: An empirical study of user experience with mobile cryptocurrency wallets A Voskobojnikov, O Wiese, M Mehrabi Koushki, V Roth, K Beznosov Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021 | 63 | 2021 |
Secure mobile agent systems using Java: where are we heading? W Binder, V Roth Proceedings of the 2002 ACM symposium on Applied computing, 115-119, 2002 | 62 | 2002 |
A scalable and secure global tracking service for mobile agents V Roth, J Peters Mobile Agents: 5th International Conference, MA 2001 Atlanta, GA, USA …, 2001 | 59 | 2001 |
Empowering mobile software agents V Roth Mobile Agents: 6th International Conference, MA 2002 Barcelona, Spain …, 2002 | 55 | 2002 |
Content-based retrieval from digital video V Roth Image and Vision Computing 17 (7), 531-540, 1999 | 54 | 1999 |
Internet-facing PLCs as a network backdoor J Klick, S Lau, D Marzin, JO Malchow, V Roth 2015 IEEE Conference on Communications and Network Security (CNS), 524-532, 2015 | 48 | 2015 |
Programming Satan's agents V Roth Electronic Notes in Theoretical Computer Science 63, 124-139, 2002 | 46 | 2002 |
General certificateless encryption and timed-release encryption SSM Chow, V Roth, EG Rieffel Security and Cryptography for Networks: 6th International Conference, SCN …, 2008 | 43 | 2008 |