Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)
Stop to Unlock: Improving the Security of Android Unlock Patterns
View More Papers
Evaluating Personal Data Control In Mobile Applications Using Heuristics
Alain Giboin (UCA, INRIA, CNRS, I3S), Karima Boudaoud (UCA, CNRS, I3S), Patrice Pena (Userthink), Yoann Bertrand (UCA, CNRS, I3S), Fabien Gandon (UCA, INRIA, CNRS, I3S)
Read MoreWhy Do Programmers Do What They Do? A Theory...
Lavanya Sajwan, James Noble, Craig Anslow (Victoria University of Wellington), Robert Biddle (Carleton University)
Read MoreWill They Share? Predicting Location Sharing Behaviors of Smartphone...
Muhammad Irtaza Safi, Abhiditya Jha (University of Central Florida); Malak Eihab Aly (New York University); Xinru Page (Bentley University); Sameer Patil (Indiana University); Pamela Wisniewski (University of Central Florida)
Read MoreExploring The Design Space of Sharing and Privacy Mechanisms...
Abdulmajeed Alqhatani, Heather R. Lipford (University of North Carolina at Charlotte)
Read More