Refereed Conference Papers

Refereed Conference Papers 82 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
11. Android Permissions Remystified: A Field Study on Contextual Integrity / Primal Wijesekera ; Arjun Baokar ; Ashkan Hosseini ; Serge Egelman ; et al [LERSSE-RefConfPaper-2015-004]
We instrumented the Android platform to collect data regarding how often and under what circumstances smartphone applications access protected resources regulated by permissions. [...]
Published in Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity. USENIX Security 2015, Washington DC, USA.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
12. On the Memorability of System-generated PINs: Can Chunking Help? / Jun Ho Huh ; Hyoungschick Kim ; Rakesh B. Bobba ; Masooda N. Bashir ; et al [LERSSE-RefConfPaper-2015-003]
To ensure that users do not choose weak personal identification numbers (PINs), many banks give out system-generated random PINs. [...]
Published in Jun Ho Huh, Hyoungschick Kim, Rakesh B. Bobba, Masooda N. Bashir and Konstantin Beznosov. 2015. On the Memorability of System-generated PINs: Can Chunking Help? SOUPS'15: Symposium On Usable Privacy and Security. Ottawa, Ontario, Canada:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
13. A Study on the Influential Neighbors to Maximize Information Diffusion in Online Social Networks / Hyoungshick Kim ; Konstantin Beznosov ; Eiko Yoneki [LERSSE-RefConfPaper-2015-002]
The problem of spreading information is a topic of considerable recent interest, but the traditional influence maximization problem is inadequate for a typical viral marketer who cannot access the entire network topology. [...]
Published in Kim, K. Beznosov, and E. Yoneki, “A Study on the Influential Neighbors to Maximize Information Diffusion in Online Social Networks” in Computational Social Networks, February 2015, v2n3.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
14. On the Impact of Touch ID on iPhone Passcodes / Ivan Cherapau ; Ildar Muslukhov ; Nalin Asanka ; Konstantin Beznosov [LERSSE-RefConfPaper-2015-001]
Smartphones today store large amounts of data that can be confidential, private or sensitive. [...]
Published in LERSSE-RefConfPaper-2015-001:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
15. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs / Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Jorge Leria ; et al [LERSSE-RefConfPaper-2014-004]
Detecting fake accounts in online social networks (OSNs) protects OSN operators and their users from various malicious activities. [...]
Published in Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.:
Fulltext: NDSS_260_Final - Download fulltextPDF Download fulltextPDF (PDFA); boshmaf_ndss_2015 - Download fulltextPDF Download fulltextPDF (PDFA);
16. To authorize or not authorize: helping users review access policies in organizations / Pooya Jaferian ; Hootan Rashtian ; Konstantin Beznosov [LERSSE-RefConfPaper-2014-003]
This work addresses the problem of reviewing complex access policies in an organizational context using two studies [...]
Published in Pooya Jaferian, Hootan Rashtian, and Konstantin Beznosov. 2014. To authorize or not authorize: helping users review access policies in organizations. SOUPS'14: Symposium On Usable Privacy and Security. Menlo Park, CA.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
17. To Befriend Or Not? A Model of Friend Request Acceptance on Facebook / Hootan Rashtian ; Yazan Boshmaf ; Pooya Jaferian ; Konstantin Beznosov [LERSSE-RefConfPaper-2014-002]
Accepting friend requests from strangers in Facebook-like online social networks is known to be a risky behavior. [...]
Published in Rashtian, H., Boshmaf, Y., Jaferian, P., Beznosov, K. (2014, July). To Befriend Or Not? A Model of Friend Request Acceptance on Facebook. In Proceedings of the 10th symposium on Usable Privacy and Security. ACM.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
18. Finding Influential Neighbors to Maximize Information Diffusion in Twitter / Hyoungshick Kim ; Konstantin Beznosov ; Eiko Yoneki [LERSSE-RefConfPaper-2014-001]
The problem of spreading information is a topic of considerable recent interest, but the traditional influence maximization problem is inadequate for a typical viral marketer who cannot access the entire network topology. [...]
Published in Finding Influential Neighbors to Maximize Information Diffusion in Twitter, Hyoungshick Kim, Konstantin Beznosov, and Eiko Yoneki, WWW’14 Companion, April 7–11, 2014, Seoul, Korea.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
19. Privacy Aspects of Health Related Information Sharing in Online Social Networks / Sadegh Torabi ; Konstantin Beznosov [LERSSE-RefConfPaper-2013-003]
Online social networks (OSNs) have formed virtual social networks where people meet and share information. [...]
Published in Sadegh Torabi and Konstantin Beznosov. “Privacy Aspects of Health Related Information Sharing in Online Social Networks,” USENIX Workshop on Health Information Technologies (HealthTech '13), August 2013, Washington, USA.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
20. Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders / Ildar Muslukhov ; Yazan Boshmaf ; Cynthia Kuo ; Jonathan Lester ; et al [LERSSE-RefConfPaper-2013-002]
Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. [...]
Published in Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester and Konstantin Beznosov, Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services companion:
Fulltext: paper.rev2 - Download fulltextPDF; paper - Download fulltextPDF Download fulltextPDF (PDFA); ASONAM_2013 - Download fulltextPDF Download fulltextPDF (PDFA);

Refereed Conference Papers : 82 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Set up a personal email alert or subscribe to the RSS feed.