Author of the publication

Understanding the Purpose of Permission Use in Mobile Apps.

, , , , and . ACM Trans. Inf. Syst., 35 (4): 43:1-43:40 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keep Passwords Away from Memory: Password Caching and Verification Using TPM., , , and . AINA, page 755-762. IEEE Computer Society, (2008)Context-aware usage control for web of things., , , , and . Security and Communication Networks, 7 (12): 2696-2712 (2014)Context-Aware Usage Control for Android., , , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 326-343. Springer, (2010)Fixing sensor-related energy bugs through automated sensing policy instrumentation., , , and . ISLPED, page 321-326. IEEE, (2015)An Exponential-Rayleigh Model for RSS-Based Device-Free Localization and Tracking., , , , , and . IEEE Trans. Mob. Comput., 14 (3): 484-494 (2015)Uniport: A Uniform Programming Support Framework for Mobile Cloud Computing., , and . MobileCloud, page 71-80. IEEE Computer Society, (2015)Energy-Efficient Hardware Data Prefetching., , , , and . IEEE Trans. VLSI Syst., 19 (2): 250-263 (2011)Describing Local Reference Frames for 3-D Motion Trajectory Recognition., , , and . IEEE Access, (2018)Cooperative Transmission in Small Cell Networks Using Network Coding., and . IEEE Wireless Commun. Letters, 7 (4): 510-513 (2018)Understanding the Purpose of Permission Use in Mobile Apps., , , , and . ACM Trans. Inf. Syst., 35 (4): 43:1-43:40 (2017)