Towards Understanding the Link Between Age and Smartphone Authentication - Lina Qiu et al - In Proceedings of CHI 2019, Glasgow, UK: - LERSSE-RefConfPaper-2019-001
 
People who viewed this page also viewed:
(90)  I’m too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails - Jun Ho Huh et al - J. H. Huh, H. Kim, S. S. V. Rayala, R. B. Bobba, K. Beznosov, “I’m too busy to reset my LinkedIn password: On the effectiveness of password reset emails,” to appear in Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), 2017, 5 pages.: - LERSSE-RefConfPaper-2017-002
(85)  Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones - Diogo Marques et al - In Proceedings of CHI 2019, Glasgow, UK: - LERSSE-RefConfPaper-2019-002
(84)  Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs - Yazan Boshmaf et al - Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.: - LERSSE-RefConfPaper-2014-004
(84)  Source Attribution of Cryptographic API Misuse in Android Applications - Ildar Muslukhov et al - Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov. Source Attribution of Cryptographic API Misuse in Android Applications. Proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS '18), 2018.: - LERSSE-RefConfPaper-2018-002
(83)  Forecasting Suspicious Account Activity at Large-Scale Online Service Providers - Hassan Halawa et al - In the proceedings of Twenty-Third International Conference on Financial Cryptography and Data Security (FC'19), St. Kitts, 2019: - LERSSE-RefConfPaper-2018-003


Download history: