default search action
Ron Poet
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c32]Jessica Fong, Ron Poet:
Creating Graphical Passwords on a Mobile Phone: Graphical Passwords on a Mobile. SIN 2020: 11:1-11:6 - [c31]Jiyou Wang, Ron Poet:
Permission Management and User Privacy Based On Android: Permission Management On Android. SIN 2020: 12:1-12:5 - [c30]Richard Beno, Ron Poet:
Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords. SIN 2020: 13:1-13:3
2010 – 2019
- 2019
- [c29]Abdul Ashraf, Ron Poet:
Is it better to choose seen or unseen distracters for graphical passwords. SIN 2019: 28:1-28:4 - [e4]Oleg B. Makarevich, Dmitry Popov, Ludmila K. Babenko, Pete Burnap, Atilla Elçi, Ron Poet, Jaideep Vaidya, Mehmet A. Orgun, Manoj Singh Gaur, Rajveer Singh Shekhawat:
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019. ACM 2019, ISBN 978-1-4503-7242-8 [contents] - 2017
- [e3]Rajveer Singh Shekhawat, Manoj Singh Gaur, Atilla Elçi, Jaideep Vaidya, Oleg B. Makarevich, Ron Poet, Mehmet A. Orgun, Vijaypal S. Dhaka, Manoj Kumar Bohra, Virender Singh, Ludmila K. Babenko, Naghmeh Moradpoor Sheykhkanloo, Behnam Rahnama:
Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017. ACM 2017 [contents] - 2016
- [c28]Md. Sadek Ferdous, Ron Poet:
Formalising Identity Management protocols. PST 2016: 137-146 - [c27]Sardar Hussain, Richard O. Sinnott, Ron Poet:
Security-enabled Enactment of Decentralized Workflows. SIN 2016: 49-56 - [c26]Sardar Hussain, Richard O. Sinnott, Ron Poet:
Service-Oriented Workflow Executability from a Security Perspective. SpaCCS 2016: 358-373 - [c25]Sardar Hussain, Richard O. Sinnott, Ron Poet:
Architectural Patterns for Security-Oriented Workflows in Collaborative Environments. SpaCCS 2016: 406-421 - [c24]Sardar Hussain, Richard O. Sinnott, Ron Poet:
A Security-Oriented Workflow Framework for Collaborative Environments. Trustcom/BigDataSE/ISPA 2016: 707-714 - 2015
- [j3]Md. Sadek Ferdous, Ron Poet:
Managing Dynamic Identity Federations using Security Assertion Markup Language. J. Theor. Appl. Electron. Commer. Res. 10(2): 53-76 (2015) - [c23]Md. Sadek Ferdous, Farida Chowdhury, Ron Poet:
A Hybrid Model of Attribute Aggregation in Federated Identity Management. ES 2015: 120-154 - [c22]Md. Sadek Ferdous, Gethin Norman, Audun Jøsang, Ron Poet:
Mathematical Modelling of Trust Issues in Federated Identity Management. IFIPTM 2015: 13-29 - [c21]Ron Poet:
The use of mobile devices in authentication. SIN 2015: 5 - [e2]Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md. Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk:
Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015. ACM 2015, ISBN 978-1-4503-3453-2 [contents] - 2014
- [c20]Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
Passhint: memorable and secure authentication. CHI 2014: 2917-2926 - [c19]Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
Do Graphical Authentication Systems Solve the Password Memorability Problem? HCI (24) 2014: 138-148 - [c18]Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
A study of mnemonic image passwords. PST 2014: 207-214 - [c17]Md. Sadek Ferdous, Gethin Norman, Ron Poet:
Mathematical Modelling of Identity, Identity Management and Other Related Topics. SIN 2014: 9 - [c16]Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
Exploring the Guessability of Image Passwords. SIN 2014: 264 - [c15]Hani Moaiteq Aljahdali, Ron Poet:
Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks. SIN 2014: 272 - [c14]Hani Moaiteq Aljahdali, Ron Poet:
Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords. SIN 2014: 279 - [c13]Md. Sadek Ferdous, Ron Poet:
CAFS: A Framework for Context-Aware Federated Services. TrustCom 2014: 130-139 - [c12]Hani Moaiteq Aljahdali, Ron Poet:
Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords. TrustCom 2014: 973-982 - [e1]Ron Poet, Muttukrishnan Rajarajan:
Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014. ACM 2014, ISBN 978-1-4503-3033-6 [contents] - 2013
- [c11]Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication Systems. HCI (27) 2013: 13-22 - [c10]Md. Sadek Ferdous, Ron Poet:
Dynamic Identity Federation Using Security Assertion Markup Language (SAML). IDMAN 2013: 131-146 - [c9]Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
A Comprehensive Study of the Usability of Multiple Graphical Passwords. INTERACT (3) 2013: 424-441 - [c8]Md. Sadek Ferdous, Ron Poet:
Analysing attribute aggregation models in federated identity management. SIN 2013: 181-188 - [c7]Md. Sadek Ferdous, Ron Poet:
Portable Personal Identity Provider in Mobile Phones. TrustCom/ISPA/IUCC 2013: 736-745 - [c6]Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
Exploring the Guessability of Image Passwords Using Verbal Descriptions. TrustCom/ISPA/IUCC 2013: 768-775 - [c5]Hani Moaiteq Aljahdali, Ron Poet:
The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom. TrustCom/ISPA/IUCC 2013: 1528-1534 - 2012
- [c4]Md. Sadek Ferdous, Ron Poet:
A comparative analysis of Identity Management Systems. HPCS 2012: 454-461 - [c3]Rosanne English, Ron Poet:
The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords. TrustCom 2012: 1-8 - 2011
- [c2]Rosanne English, Ron Poet:
Towards a metric for recognition-based graphical password security. NSS 2011: 239-243 - [c1]Rosanne English, Ron Poet:
Measuring the revised guessability of graphical passwords. NSS 2011: 364-368
2000 – 2009
- 2009
- [j2]Ron Poet, Karen Renaud:
A Mechanism for Filtering Distractors for Doodle Passwords. Int. J. Pattern Recognit. Artif. Intell. 23(5): 1005-1029 (2009)
1980 – 1989
- 1986
- [j1]Ron Poet, E. James Milner-White:
Displaying Relevant Features of Protein Molecules. Comput. Graph. Forum 5(3): 211-215 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint