Financial Cryptography and Data Security
暂无分享,去创建一个
[1] L. Cranor,et al. Curbing Android Permission Creep , 2011 .
[2] Lorrie Faith Cranor,et al. Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.
[3] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[4] Lorrie Faith Cranor,et al. A "nutrition label" for privacy , 2009, SOUPS.
[5] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[6] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[7] Insup Lee,et al. Autonomous link spam detection in purely collaborative environments , 2011, Int. Sym. Wikis.
[8] Lorrie Faith Cranor,et al. Locaccino: a privacy-centric location sharing application , 2010, UbiComp '10 Adjunct.
[9] Blase Ur,et al. Evaluating Attack Amplification in Online Social Networks , 2009 .
[10] Steven Myers,et al. The Nuts and Bolts of a Forum Spam Automator , 2011, LEET.
[11] Diana K. Smetters,et al. How users use access control , 2009, SOUPS.
[12] Zhen Huang,et al. Short paper: a look at smartphone permission models , 2011, SPSM '11.
[13] Insup Lee,et al. Link spamming Wikipedia for profit , 2011, CEAS '11.
[14] J. Walther. Research ethics in Internet-enabled research: Human subjects issues and methodological myopia , 2002, Ethics and Information Technology.
[15] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.