Towards Understanding the Link Between Age and Smartphone Authentication
暂无分享,去创建一个
Konstantin Beznosov | Alexander De Luca | Lina Qiu | Ildar Muslukhov | A. D. Luca | Ildar Muslukhov | K. Beznosov | Lina Qiu
[1] Konstantin Beznosov,et al. On the Impact of Touch ID on iPhone Passcodes , 2015, SOUPS.
[2] Laura A. Dabbish,et al. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.
[3] René Mayrhofer,et al. Diversity in locked and unlocked mobile device usage , 2014, UbiComp Adjunct.
[4] Florian Alt,et al. SnapApp: Reducing Authentication Overhead with a Time-Constrained Fast Unlock Option , 2016, CHI.
[5] Sunny Consolvo,et al. Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors , 2014 .
[6] David A. Wagner,et al. Are You Ready to Lock? , 2014, CCS.
[7] Luís Carriço,et al. Snooping on Mobile Phones: Prevalence and Trends , 2016, SOUPS.
[8] Karin Strauss,et al. Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications , 2012, SOUPS.
[9] Serge Egelman,et al. Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking , 2016, CHI.
[10] Alexander De Luca,et al. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception , 2014, SOUPS.
[11] Ian Oakley,et al. CASA: context-aware scalable authentication , 2013, SOUPS.
[12] Konstantin Beznosov,et al. Android users in the wild: Their authentication and usage behavior , 2016, Pervasive Mob. Comput..
[13] Alastair R. Beresford,et al. Device analyzer: large-scale mobile data collection , 2014, PERV.
[14] Konstantin Beznosov,et al. Know your enemy: the risk of unauthorized access in smartphones by insiders , 2013, MobileHCI '13.
[15] Chuan Qin,et al. Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.
[16] Serge Egelman,et al. The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens , 2016, CHI.