Author of the publication

Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices.

, , and . ACSAC, page 233-242. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices., , and . SOUPS, page 327-346. USENIX Association, (2015)152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users., , and . IEEE Secur. Priv., 15 (5): 55-64 (2017)"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking., , , and . CHI, page 2657-2666. ACM, (2014)Towards Java-based Data Caching for Mobile Information System Clients., , , and . MMS, volume P-104 of LNI, page 97-101. GI, (2007)Home is safer than the cloud!: privacy concerns for consumer cloud storage., , , and . SOUPS, page 13. ACM, (2011)Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices., , and . ACSAC, page 233-242. IEEE Computer Society, (2007)Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis., , and . CoRR, (2015)Influence of user perception, security needs, and social factors on device pairing method choices., , , and . SOUPS, volume 485 of ACM International Conference Proceeding Series, ACM, (2010)Access control for home data sharing: evaluating social acceptability., , , , , , , , , and 6 other author(s). CHI, page 645-654. ACM, (2010)User-Centered Security Mechanisms for Protecting Information Sharing in the Cloud.. ETH Zurich, Zürich, Switzerland, (2012)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/72755).