Author of the publication

xBook: Redesigning Privacy Control in Social Networking Platforms.

, , and . USENIX Security Symposium, page 249-266. USENIX Association, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

xAccess: A unified user-centric access control framework for web applications.. NOMS, page 530-533. IEEE, (2012)Passive security intelligence to analyze the security risks of mobile/BYOD activities., , , , , , , , , and . IBM Journal of Research and Development, 60 (4): 9 (2016)Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014., , , and . CoRR, (2014)Accurate and efficient reliability estimation techniques during ADL-driven embedded processor design., , , and . DATE, page 547-552. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Practical out-of-band authentication for mobile applications., and . Middleware (Industry Track), page 3:1-3:6. ACM, (2013)Evaluating email's feasibility for botnet command and control., , , and . DSN, page 376-385. IEEE Computer Society, (2008)Biometric authentication on a mobile device: a study of user effort, error and task disruption., , , , , and . ACSAC, page 159-168. ACM, (2012)PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets., , , , , , and . WWW, page 594-604. ACM, (2019)CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices., , and . MobiSys, page 375-386. ACM, (2016)Evaluating Bluetooth as a Medium for Botnet Command and Control., , , , and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 61-80. Springer, (2010)