Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones - Masoud Mehrabi Koushki et al - Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, and Konstantin Beznosov. Neither Access nor Control: A Longitudinal Investigation of The Efficacy of User Access Control Solutions on Smartphones. In Proceedings of the 31st USENIX Security Symposium, 2022.: - LERSSE-RefConfPaper-2022-004
 
People who viewed this page also viewed:
(390)  Users' Perceptions of Chrome's Compromised Credential Notification - Yue Huang et al - Yue Huang, Borke Obada-Obieh, and Konstantin Beznosov, Users' Perceptions of Chrome’s Compromised Credential Notification, In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022): - LERSSE-RefConfPaper-2022-003
(381)  COVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption Intention - Yue Huang et al - Yue Huang, Borke Obada-Obieh, Elissa M. Redmiles, Satya Lokam, and Konstantin Beznosov. 2022. COVID 19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption Intention. In Proceedings of the 2022 ACM SIGIR Conference on Human Information Interaction and Retrieval (CHIIR ’22), March 14–18, 2022, Regensburg, Germany. ACM, New York, NY, USA, 23 pages. https://doi.org/10.1145/3498366.3505756: - LERSSE-RefConfPaper-2022-001
(374)  Challenges and Threats of Mass Telecommuting: A Qualitative Study of Workers - Borke Obada-Obieh et al - Obada-Obieh, B., Huang, Y., & Beznosov, K. (2021, August). Challenges and Threats of Mass Telecommuting: A Qualitative Study of Workers. In Seventeenth Symposium on Usable Privacy and Security ({SOUPS} 2021) (pp. 675-694).: - LERSSE-RefConfPaper-2021-008
(374)  SoK: The Dual Nature of Technology in Sexual Abuse - Borke Obada-Obieh, et al - Borke Obada-Obieh,Yue Huang, Lucrezia Spagnolo, & Konstantin Beznosov. (2022, May). SoK: The Dual Nature of Technology in Sexual Assault. In Proceedings of the Forty-Third Symposium of the Institute of Electrical and Electronics Engineers, Security and Privacy (IEEE S&P 2022): - LERSSE-RefConfPaper-2022-002
(373)  What Makes Security-Related Code Examples Different - Azadeh Mokhberi et al - Azadeh Mokhberi, Tiffany Quon, Konstantin Beznosov. What Makes Security-Related Code Examples Different. In The 7th Workshop on Security Information Workers at SOUPS workshops, 2021.: - LERSSE-RefConfPaper-2021-007


Download history: