Method and system for authentication by defining a demanded level of security LY Gomez, I Thomas US Patent 8,490,154, 2013 | 89 | 2013 |
ontext-aware security and secure context-awareness in ubiquitous computing environments K Wrona, L Gomez Annales Universitatis Mariae Curie-Skłodowska, sectio AI–Informatica 4 (1), 2006 | 70 | 2006 |
Secure and trusted in-network data processing in wireless sensor networks: a survey A Sorniotti, L Gomez, K Wrona, L Odorico Journal of Information Assurance and Security 2 (3), 189-199, 2007 | 64 | 2007 |
Client authentication using a challenge provider R Kilian-Kehr, J Haller, L Gomez, C Hebert US Patent 7,673,141, 2010 | 52 | 2010 |
Differentially private generative adversarial networks for time series, continuous, and discrete open data L Frigerio, AS Oliveira, L Gomez, P Duverger IFIP International Conference on ICT Systems Security and Privacy Protection …, 2019 | 51 | 2019 |
Enterprise secure messaging architecture J Haller, L Gomez, J Posegga US Patent 7,272,716, 2007 | 46 | 2007 |
Method and system for automatically organizing and achieving a pre-given task by means of robot functionalities C Ulmer, L Gomez, F Montagut, C Hebert, K Wrona US Patent 8,548,627, 2013 | 33 | 2013 |
Method and system for access control using resource filters L Gomez, A Laube US Patent 8,156,537, 2012 | 32 | 2012 |
Trustworthiness assessment of wireless sensor data for business applications L Gomez, A Laube, A Sorniotti 2009 international conference on advanced information networking and …, 2009 | 31 | 2009 |
System and method for inhibiting interaction with malicious software LLY Gomez, CRJ Hebert, CSP Ulmer US Patent 7,587,676, 2009 | 28 | 2009 |
Password protection using personal information L Gomez, S Trabelsi, A Mouelhi US Patent 8,539,599, 2013 | 27 | 2013 |
Efficient access control for wireless sensor data A Sorniotti, R Molva, L Gomez, C Trefois, A Laube, P Scaglioso International Journal of Wireless Information Networks 16 (3), 165-174, 2009 | 26 | 2009 |
Context-aware based cryptography LY Gomez US Patent 8,687,805, 2014 | 25 | 2014 |
Security patterns for capturing encryption-based access control to sensor data A Cuevas, P El Khoury, L Gomez, A Laube 2008 Second International Conference on Emerging Security Information …, 2008 | 25 | 2008 |
Design guidelines for integration of wireless sensor networks with enterprise systems L Gomez, A Laube, A Sorniotti Proceedings of the 1st international conference on MOBILe Wireless …, 2008 | 25 | 2008 |
Context-aware security policy for the service discovery S Trabelsi, L Gomez, Y Roudier 21st International Conference on Advanced Information Networking and …, 2007 | 23 | 2007 |
Secure sensor networks for public safety command and control system L Gomez, A Laube, C Ulmer 2009 IEEE Conference on Technologies for Homeland Security, 59-66, 2009 | 21 | 2009 |
Penetration test attack tree generator C Hebert, L Gomez US Patent 9,894,090, 2018 | 20 | 2018 |
Tracing of collaborative workflows CRJ Hebert, LY Gomez, F Montagut, H Plate, CSP Ulmer US Patent 8,819,131, 2014 | 19 | 2014 |
Automatic electronic timesheet filler CSP Ulmer, PTC Spadone, CRJ Hébert, LY Gomez, ME Rits US Patent 7,386,785, 2008 | 19 | 2008 |