People who viewed this page also viewed:
(394)  Surpass: System-initiated User-replaceable Passwords - Jun Ho Huh et al - Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim and Konstantin Beznosov. Surpass: System-initiated User-replaceable Passwords. In Proceedings of ACM Conference on Computer and Communications Security (CCS'15), October 2015.: - LERSSE-RefConfPaper-2015-006
(390)  Android Rooting: Methods, Detection, and Evasion - San-Tsai Sun et al - San-Tsai Sun, Andrea Cuadros and Konstantin Beznosov. Android Rooting: Methods, Detection, and Evasion. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, October 2015.: - LERSSE-RefConfPaper-2015-007
(365)  On the Impact of Touch ID on iPhone Passcodes - Ivan Cherapau et al - LERSSE-RefConfPaper-2015-001: - LERSSE-RefConfPaper-2015-001
(356)  Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs - Yazan Boshmaf et al - Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.: - LERSSE-RefConfPaper-2014-004
(348)  Android Permissions Remystified: A Field Study on Contextual Integrity - Primal Wijesekera et al - Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity. USENIX Security 2015, Washington DC, USA.: - LERSSE-RefConfPaper-2015-004


Download history: