From post

The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.

, , , , , , и . IEEE Symposium on Security and Privacy, стр. 1077-1093. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Android Permissions Remystified: A Field Study on Contextual Integrity., , , , , и . USENIX Security Symposium, стр. 499-514. USENIX Association, (2015)50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System., , , , , и . USENIX Security Symposium, стр. 603-620. USENIX Association, (2019)Security and Privacy Failures in Popular 2FA Apps., , , и . USENIX Security Symposium, стр. 2079-2096. USENIX Association, (2023)The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study., , , и . WEIS, (2007)Contextualizing Privacy Decisions for Better Prediction (and Protection)., , , , , , , , и . CHI, стр. 268. ACM, (2018)An Experience Sampling Study of User Reactions to Browser Warnings in the Field., , , , , и . CHI, стр. 512. ACM, (2018)Markets for zero-day exploits: ethics and implications., , и . NSPW, стр. 41-46. ACM, (2013)When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources., , , , и . SOUPS, стр. 1:1-1:14. ACM, (2013)It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions., , и . SP, стр. 375-390. IEEE Computer Society, (2009)Crying Wolf: An Empirical Study of SSL Warning Effectiveness., , , , и . USENIX Security Symposium, стр. 399-416. USENIX Association, (2009)