People who viewed this page also viewed:
(265)  Surpass: System-initiated User-replaceable Passwords - Jun Ho Huh et al - Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim and Konstantin Beznosov. Surpass: System-initiated User-replaceable Passwords. In Proceedings of ACM Conference on Computer and Communications Security (CCS'15), October 2015.: - LERSSE-RefConfPaper-2015-006
(254)  Android Rooting: Methods, Detection, and Evasion - San-Tsai Sun et al - San-Tsai Sun, Andrea Cuadros and Konstantin Beznosov. Android Rooting: Methods, Detection, and Evasion. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, October 2015.: - LERSSE-RefConfPaper-2015-007
(245)  Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs - Yazan Boshmaf et al - Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.: - LERSSE-RefConfPaper-2014-004
(241)  On the Impact of Touch ID on iPhone Passcodes - Ivan Cherapau et al - LERSSE-RefConfPaper-2015-001: - LERSSE-RefConfPaper-2015-001
(235)  On the Memorability of System-generated PINs: Can Chunking Help? - Jun Ho Huh et al - Jun Ho Huh, Hyoungschick Kim, Rakesh B. Bobba, Masooda N. Bashir and Konstantin Beznosov. 2015. On the Memorability of System-generated PINs: Can Chunking Help? SOUPS'15: Symposium On Usable Privacy and Security. Ottawa, Ontario, Canada: - LERSSE-RefConfPaper-2015-003


Download history: