System and methods for authentication using multiple devices JA Ligatti, D Goldgof, C Cetin, JB Subils US Patent 9,659,160, 2017 | 78 | 2017 |
Systems and methods for anonymous authentication using multiple devices JA Ligatti, D Goldgof, C Cetin, JB Subils US Patent 9,380,058, 2016 | 24 | 2016 |
Design, testing and implementation of a new authentication method using multiple devices C Cetin | 23 | 2015 |
SQL-Identifier injection attacks C Cetin, D Goldgof, J Ligatti 2019 IEEE Conference on Communications and Network Security (CNS), 151-159, 2019 | 14 | 2019 |
Coauthentication J Ligatti, C Cetin, S Engram | 10 | 2017 |
Systems and methods for generating symmetric cryptographic keys J Ligatti, C Cetin, S Engram, D Goldgof US Patent 10,291,403, 2019 | 7 | 2019 |
Rapidly expanding mobile apps for crowd-sourcing bike data to new cities SJ Barbeau, C Cetin National Institute for Transportation and Communities (NITC), 2017 | 4 | 2017 |
An Evaluation of the Power Consumption of Coauthentication as a Continuous User Authentication Method in Mobile Systems B Corn, AJ Perez, A Ruiz, C Cetin, J Ligatti Proceedings of the 2020 ACM Southeast Conference, 268-271, 2020 | 3 | 2020 |
A dual-task interference game-based experimental framework for comparing the usability of authentication methods JB Subils, J Perez, P Liu, S Engram, C Cetin, D Goldgof, N Ebner, ... 2019 12th International Conference on Human System Interaction (HSI), 95-100, 2019 | 3 | 2019 |
Improving the Quality and Cost Effectiveness of Multimodal Travel Behavior Data Collection: A Case Study SJ Barbeau, C Cetin Transportation Research Board 100th Annual MeetingTransportation Research …, 2021 | 1 | 2021 |
Improving the Quality and Cost Effectiveness of Multimodal Travel Behavior Data Collection SJ Barbeau, C Cetin | 1 | 2020 |
Systems and methods for generating symmetric cryptographic keys J Ligatti, C Cetin, S Engram, D Goldgof US Patent 10,298,391, 2019 | 1 | 2019 |
Systems and methods for generating symmetric cryptographic keys J Ligatti, C Cetin, S Engram, D Goldgof | 1 | 2019 |
Authentication and SQL-Injection Prevention Techniques in Web Applications C Cetin University of South Florida, 2019 | 1 | 2019 |