Android users in the wild: Their authentication and usage behavior - Ahmed Mahfouz et al - A. Mahfouz, I. Muslukhov, K. Beznosov, “Android users in the wild: Their authentication and usage behavior,” Pervasive and Mobile Computing, v. 32, 2016, 50-61.: - LERSSE-RefJnlPaper-2017-002
 
People who viewed this page also viewed:
(255)  Decoupling data-at-rest encryption and smartphone locking with wearable devices - Ildar Muslukhov et al - I. Muslukhov, S.-T. Sun, P. Wijesekera, Y. Boshmaf, K. Beznosov, “Decoupling data-at-rest encryption and smartphone locking with wearable devices,” Pervasive and Mobile Computing, v. 32, 2016, 26-34.: - LERSSE-RefJnlPaper-2017-001
(253)  Phishing threat avoidance behaviour: An empirical investigation - Nalin Asanka Gamagedara Arachchilage et al - Nalin Asanka Gamagedara Arachchilage, Steve Love, Konstantin Beznosov, Phishing threat avoidance behaviour: An empirical investigation, Computers in Human Behavior, Volume 60, July 2016, Pages 185-197, ISSN 0747-5632: - LERSSE-RefJnlPaper-2016-001
(249)  I Don’t Use Apple Pay Because It’s Less Secure ...: Perception of Security and Usability in Mobile Tap-and-Pay - Jun Ho Huh et al - J. H. Huh, S. Verma, S. S. V. Rayala, R. B. Bobba, K. Beznosov, H. Kim, “I Don’t Use Apple Pay Because It’s Less Secure ...: Perception of Security and Usability in Mobile Tap-and-Pay,” to appear in Proceedings of the Workshop on Usable Security (USEC), 2017, 12 pages.: - LERSSE-RefConfPaper-2017-001
(245)  Android Rooting: Methods, Detection, and Evasion - San-Tsai Sun et al - San-Tsai Sun, Andrea Cuadros and Konstantin Beznosov. Android Rooting: Methods, Detection, and Evasion. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, October 2015.: - LERSSE-RefConfPaper-2015-007
(244)  Surpass: System-initiated User-replaceable Passwords - Jun Ho Huh et al - Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim and Konstantin Beznosov. Surpass: System-initiated User-replaceable Passwords. In Proceedings of ACM Conference on Computer and Communications Security (CCS'15), October 2015.: - LERSSE-RefConfPaper-2015-006


Download history: