Towards Understanding the Link Between Age and Smartphone Authentication - Lina Qiu et al - In Proceedings of CHI 2019, Glasgow, UK: - LERSSE-RefConfPaper-2019-001
 
People who viewed this page also viewed:
(206)  I’m too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails - Jun Ho Huh et al - J. H. Huh, H. Kim, S. S. V. Rayala, R. B. Bobba, K. Beznosov, “I’m too busy to reset my LinkedIn password: On the effectiveness of password reset emails,” to appear in Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), 2017, 5 pages.: - LERSSE-RefConfPaper-2017-002
(205)  Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones - Diogo Marques et al - In Proceedings of CHI 2019, Glasgow, UK: - LERSSE-RefConfPaper-2019-002
(202)  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences - Primal Wijesekera et al - P. Wijesekera, A. Baokar, L.Tsai, J. Reardon, S. Egelman, D. Wagner, K. Beznosov, “The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences,” in IEEE Symposium on Security and Privacy (IEEE S&P), San-Jose, CA, May 2017, 17 pages.: - LERSSE-RefConfPaper-2017-004
(201)  Forecasting Suspicious Account Activity at Large-Scale Online Service Providers - Hassan Halawa et al - In the proceedings of Twenty-Third International Conference on Financial Cryptography and Data Security (FC'19), St. Kitts, 2019: - LERSSE-RefConfPaper-2018-003
(194)  The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011. For the technical report, please refer to http://lersse-dl.ece.ubc.ca/record/272: - LERSSE-RefConfPaper-2011-008


Download history: