Author of the publication

Protection Aspects of Iconic Passwords on Mobile Devices.

, , , and . CSS, volume 7672 of Lecture Notes in Computer Science, page 21-32. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Presenting the Brazilian Project TSAM - Security Technologies for Mobile Environments., , and . MobiSec, volume 107 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-54. Springer, (2012)Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software., , , , and . IEEE Trans. Reliab., 68 (4): 1384-1403 (2019)ISIG/WEB A Web-Based Tool for Viewing and Editing Maps., , , and . GEOINFO, page 19-34. INPE, (2004)Mining Cryptography Misuse in Online Forums., and . QRS Companion, page 143-150. IEEE, (2016)Detecting Cryptography Misuses With Machine Learning: Graph Embeddings, Transfer Learning and Data Augmentation in Source Code Related Tasks., , and . IEEE Trans. Reliab., 72 (4): 1678-1689 (December 2023)Protection Aspects of Iconic Passwords on Mobile Devices., , , and . CSS, volume 7672 of Lecture Notes in Computer Science, page 21-32. Springer, (2012)Portability Evaluation of Cryptographic Libraries on Android Smartphones., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 459-469. Springer, (2012)Um Sistema de Padrões para Software Criptográfico Orientado a Objetos., , and . SBES, page 171-186. SBC, (1998)Towards a Methodology for the Development of Secure Cryptographic Software., and . ICSSA, page 25-30. IEEE, (2016)Using Graph Embeddings and Machine Learning to Detect Cryptography Misuse in Source Code., , and . ICMLA, page 1059-1066. IEEE, (2020)