


default search action
Adam J. Aviv
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Florian M. Farke, David G. Balash
, Maximilian Golla, Adam J. Aviv
:
How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions? Proc. Priv. Enhancing Technol. 2024(2): 372-390 (2024) - [j15]Mir Masood Ali, David G. Balash
, Monica Kodwani, Chris Kanich, Adam J. Aviv:
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies. Proc. Priv. Enhancing Technol. 2024(4): 142-166 (2024) - [j14]Yixin Zou
, Khue Le
, Peter Mayer
, Alessandro Acquisti
, Adam J. Aviv
, Florian Schaub
:
Encouraging Users to Change Breached Passwords Using the Protection Motivation Theory. ACM Trans. Comput. Hum. Interact. 31(5): 63:1-63:45 (2024) - [c69]Wentao Guo
, Aditya Kishore
, Adam J. Aviv
, Michelle L. Mazurek
:
A Qualitative Analysis of Practical De-Identification Guides. CCS 2024: 1611-1625 - [c68]Lucy Simko
, Adryana Hutchinson
, Alvin Isaac
, Evan Fries
, Micah Sherr
, Adam J. Aviv
:
"Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion. CCS 2024: 2681-2695 - [c67]Adryana Hutchinson
, Collins W. Munyendo
, Adam J. Aviv
, Peter Mayer
:
An Analysis of Password Managers' Password Checkup Tools. CHI Extended Abstracts 2024: 38:1-38:7 - [c66]Mindy Tran, Xinru Tang, Adryana Hutchinson
, Adam J. Aviv, Yixin Zou:
Position Paper: Exploring Security and Privacy Needs of d/Deaf Individuals. EuroS&P Workshops 2024: 678-682 - [c65]Elena Korkes
, Collins W. Munyendo
, Alvin Isaac
, Victoria Hennemann
, Adam J. Aviv
:
"I'm going to try her birthday": Investigating How Friends Guess Each Other's Smartphone Unlock PINs in the Lab. EuroUSEC 2024: 220-234 - [c64]David G. Balash, Mir Masood Ali, Chris Kanich, Adam J. Aviv:
"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps. SOUPS @ USENIX Security Symposium 2024: 413-432 - [i28]Yixin Zou, Khue Le, Peter Mayer, Alessandro Acquisti
, Adam J. Aviv, Florian Schaub:
Nudging Users to Change Breached Passwords Using the Protection Motivation Theory. CoRR abs/2405.15308 (2024) - 2023
- [j13]Peter Mayer
, Yixin Zou
, Byron M. Lowens
, Hunter A. Dyer
, Khue Le
, Florian Schaub
, Adam J. Aviv
:
Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches. ACM Trans. Comput. Hum. Interact. 30(5): 77:1-77:53 (2023) - [c63]Collins W. Munyendo
, Peter Mayer
, Adam J. Aviv
:
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers. CCS 2023: 3123-3137 - [c62]David G. Balash
, Mir Masood Ali
, Monica Kodwani
, Xiaoyuan Wu
, Chris Kanich
, Adam J. Aviv
:
Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem. CCS 2023: 3600-3602 - [c61]Daniel V. Bailey
, Collins W. Munyendo
, Hunter A. Dyer
, Miles Grant
, Philipp Markert
, Adam J. Aviv
:
"Someone Definitely Used 0000": Strategies. EuroUSEC 2023: 158-174 - [c60]Collins W. Munyendo, Yasemin Acar, Adam J. Aviv
:
"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. SP 2023: 570-587 - [c59]Harel Berger
, Micah Sherr
, Adam J. Aviv
:
Cadence: A Simulator for Human Movement-based Communication Protocols. CSET @ USENIX Security Symposium 2023: 26-31 - [c58]David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr:
Educators' Perspectives of Using (or Not Using) Online Exam Proctoring. USENIX Security Symposium 2023: 5091-5108 - [i27]David G. Balash
, Rahel A. Fainchtein, Elena Korkes, Miles Grant, Micah Sherr, Adam J. Aviv:
Educators' Perspectives of Using (or Not Using) Online Exam Proctoring. CoRR abs/2302.12936 (2023) - [i26]Mir Masood Ali, David G. Balash, Chris Kanich, Adam J. Aviv:
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies. CoRR abs/2306.17063 (2023) - [i25]Florian M. Farke, David G. Balash, Maximilian Golla, Adam J. Aviv:
How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions? CoRR abs/2312.13813 (2023) - 2022
- [c57]Rahel A. Fainchtein
, Adam J. Aviv
, Micah Sherr
:
User Perceptions of the Privacy and Usability of Smart DNS. ACSAC 2022: 591-604 - [c56]Xiaoyuan Wu
, Collins W. Munyendo
, Eddie Cosic
, Genevieve A. Flynn
, Olivia Legault
, Adam J. Aviv
:
User Perceptions of Five-Word Passwords. ACSAC 2022: 605-618 - [c55]Jaron Mink
, Amanda Rose Yuile, Uma Pal, Adam J. Aviv, Adam Bates
:
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps. CHI 2022: 448:1-448:21 - [c54]Collins W. Munyendo, Yasemin Acar, Adam J. Aviv:
"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya. SP 2022: 2304-2319 - [c53]Peter Mayer, Collins W. Munyendo, Michelle L. Mazurek, Adam J. Aviv:
Why Users (Don't) Use Password Managers at a Large Educational Institution. USENIX Security Symposium 2022: 1849-1866 - [c52]David G. Balash, Xiaoyuan Wu, Miles Grant, Irwin Reyes, Adam J. Aviv:
Security and Privacy Perceptions of Third-Party Application Access for Google Accounts. USENIX Security Symposium 2022: 3397-3414 - [c51]Collins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv:
"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits. USENIX Security Symposium 2022: 4023-4040 - [c50]Hirak Ray, Ravi Kuber, Adam J. Aviv:
Investigating older adults' adoption and usage of online conferencing tools during COVID-19. W4A 2022: 27:1-27:11 - [i24]David G. Balash, Mir Masood Ali, Xiaoyuan Wu, Chris Kanich, Adam J. Aviv:
Longitudinal Analysis of Privacy Labels in the Apple App Store. CoRR abs/2206.02658 (2022) - 2021
- [j12]Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv:
"Warn Them" or "Just Block Them"?: Investigating Privacy Concerns Among Older and Working Age Adults. Proc. Priv. Enhancing Technol. 2021(2): 27-47 (2021) - [j11]Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr, Stephen Ribaudo, Armaan Khullar:
Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. Proc. Priv. Enhancing Technol. 2021(2): 151-172 (2021) - [j10]Philipp Markert
, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth
, Adam J. Aviv
:
On the Security of Smartphone Unlock PINs. ACM Trans. Priv. Secur. 24(4): 30:1-30:36 (2021) - [c49]Ian Martiny, Gabriel Kaptchuk, Adam J. Aviv
, Daniel S. Roche, Eric Wustrow:
Improving Signal's Sealed Sender. NDSS 2021 - [c48]Collins W. Munyendo, Miles Grant, Philipp Markert, Timothy J. Forman, Adam J. Aviv
:
Using a Blocklist to Improve the Security of User Selection of Android Patterns. SOUPS @ USENIX Security Symposium 2021: 37-56 - [c47]Daniel V. Bailey, Philipp Markert, Adam J. Aviv:
"I have no idea what they're trying to accomplish: " Enthusiastic and Casual Signal Users' Understanding of Signal PINs. SOUPS @ USENIX Security Symposium 2021: 417-436 - [c46]David G. Balash, Dongkun Kim, Darikia Shaibekova, Rahel A. Fainchtein, Micah Sherr, Adam J. Aviv
:
Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services. SOUPS @ USENIX Security Symposium 2021: 633-652 - [c45]Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv:
Why Older Adults (Don't) Use Password Managers. USENIX Security Symposium 2021: 73-90 - [c44]Peter Mayer, Yixin Zou, Florian Schaub, Adam J. Aviv
:
"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them. USENIX Security Symposium 2021: 393-410 - [c43]Florian M. Farke, David G. Balash, Maximilian Golla, Markus Dürmuth, Adam J. Aviv
:
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity. USENIX Security Symposium 2021: 483-500 - [c42]Flynn Wolf, Adam J. Aviv
, Ravi Kuber:
Security Obstacles and Motivations for Small Businesses from a CISO's Perspective. USENIX Security Symposium 2021: 1199-1216 - [c41]Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv
, Michelle L. Mazurek:
Strategies and Perceived Risks of Sending Sensitive Documents. USENIX Security Symposium 2021: 1217-1234 - [i23]Florian M. Farke, David G. Balash
, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity (Extended Version). CoRR abs/2105.14066 (2021) - [i22]Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv, Michelle L. Mazurek:
Strategies and Perceived Risks of Sending Sensitive Documents. CoRR abs/2105.14619 (2021) - [i21]David G. Balash
, Dongkun Kim, Darikia Shaibekova, Rahel A. Fainchtein, Micah Sherr, Adam J. Aviv:
Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services. CoRR abs/2106.05917 (2021) - [i20]Daniel V. Bailey, Philipp Markert, Adam J. Aviv:
"I have no idea what they're trying to accomplish: " Enthusiastic and Casual Signal Users' Understanding of Signal PINs. CoRR abs/2106.09006 (2021) - [i19]David G. Balash
, Xiaoyuan Wu, Miles Grant, Irwin Reyes, Adam J. Aviv:
Security and Privacy Perceptions of Third-Party Application Access for Google Accounts (Extended Version). CoRR abs/2111.03573 (2021) - 2020
- [c40]Timothy J. Forman, Adam J. Aviv:
Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns. ACSAC 2020: 219-233 - [c39]Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber:
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond. ACSAC 2020: 249-262 - [c38]Timothy J. Forman, Daniel S. Roche, Adam J. Aviv
:
Twice as Nice? A Preliminary Evaluation of Double Android Unlock Patterns. CHI Extended Abstracts 2020: 1-7 - [c37]Raina Samuel, Philipp Markert, Adam J. Aviv
, Iulian Neamtiu:
Knock, Knock. Who's There? On the Security of LG's Knock Codes. SOUPS @ USENIX Security Symposium 2020: 37-59 - [c36]Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth
, Adam J. Aviv
:
This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. SP 2020: 286-303 - [i18]Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
This PIN Can Be Easily Guessed. CoRR abs/2003.04868 (2020) - [i17]Raina Samuel, Philipp Markert, Adam J. Aviv, Iulian Neamtiu:
Knock, Knock. Who's There? On the Security of LG's Knock Codes. CoRR abs/2006.03556 (2020) - [i16]Timothy J. Forman, Adam J. Aviv:
Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns. CoRR abs/2008.10681 (2020) - [i15]Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber:
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond. CoRR abs/2008.10697 (2020) - [i14]Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv:
Why Older Adults (Don't) Use Password Managers. CoRR abs/2010.01973 (2020) - [i13]Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr, Stephen Ribaudo, Armaan Khullar:
Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. CoRR abs/2012.07944 (2020)
2010 – 2019
- 2019
- [c35]Hirak Ray, Flynn Wolf, Ravi Kuber
, Adam J. Aviv
:
"Woe is me": Examining Older Adults' Perceptions of Privacy. CHI Extended Abstracts 2019 - [c34]Flynn Wolf, Ravi Kuber
, Adam J. Aviv
:
"Pretty Close to a Must-Have": Balancing Usability Desire and Security Concern in Biometric Adoption. CHI 2019: 151 - [c33]Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion:
rORAM: Efficient Range ORAM with O(log2 N) Locality. NDSS 2019 - 2018
- [j9]Flynn Wolf, Ravi Kuber
, Adam J. Aviv:
An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication. Behav. Inf. Technol. 37(4): 320-334 (2018) - [j8]Flynn Wolf, Adam J. Aviv
, Ravi Kuber:
"It's all about the start" classifying eyes-free mobile authentication techniques. J. Inf. Secur. Appl. 41: 28-40 (2018) - [j7]Guixin Ye
, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Willy Wolff, Adam J. Aviv
, Zheng Wang
:
A Video-based Attack for Android Pattern Lock. ACM Trans. Priv. Secur. 21(4): 19:1-19:31 (2018) - [c32]Adam J. Aviv
, Flynn Wolf, Ravi Kuber
:
Comparing Video Based Shoulder Surfing with Live Simulation. ACSAC 2018: 453-466 - [c31]Flynn Wolf, Ravi Kuber, Adam J. Aviv
:
How Do We Talk Ourselves Into These Things? CHI Extended Abstracts 2018 - [c30]John Sonchack, Adam J. Aviv
, Eric Keller, Jonathan M. Smith:
Turboflow: information rich flow record generation on commodity switches. EuroSys 2018: 11:1-11:16 - [c29]John Sonchack, Oliver Michel, Adam J. Aviv
, Eric Keller, Jonathan M. Smith:
Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow. USENIX ATC 2018: 823-835 - [i12]Adam J. Aviv, Ravi Kuber:
Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication. CoRR abs/1801.07518 (2018) - [i11]Flynn Wolf, Adam J. Aviv, Ravi Kuber:
Classifying Eyes-Free Mobile Authentication Techniques. CoRR abs/1805.12539 (2018) - [i10]Adam J. Aviv, Flynn Wolf, Ravi Kuber:
Comparing Video Based Shoulder Surfing with Live Simulation. CoRR abs/1809.08640 (2018) - [i9]Adam J. Aviv, Markus Dürmuth:
A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns. CoRR abs/1811.10548 (2018) - [i8]Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion:
Efficient Range ORAM with 핆(log2N) Locality. IACR Cryptol. ePrint Arch. 2018: 471 (2018) - 2017
- [j6]Adam J. Aviv
, Ravi Kuber, Devon Budzitowski:
Is Bigger Better When It Comes to Android Graphical Pattern Unlock? IEEE Internet Comput. 21(6): 46-51 (2017) - [c28]Adam J. Aviv
, John T. Davin, Flynn Wolf, Ravi Kuber:
Towards Baselines for Shoulder Surfing on Mobile Authentication. ACSAC 2017: 486-498 - [c27]Flynn Wolf, Ravi Kuber, Adam J. Aviv:
Perceptions of Mobile Device Authentication Mechanisms by Individuals who are Blind. ASSETS 2017: 385-386 - [c26]Daniel S. Roche, Adam J. Aviv
, Seung Geol Choi, Travis Mayberry:
Deterministic, Stash-Free Write-Only ORAM. CCS 2017: 507-521 - [c25]John T. Davin, Adam J. Aviv, Flynn Wolf, Ravi Kuber:
Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication. CHI Extended Abstracts 2017: 2496-2503 - [c24]Adam J. Aviv
, Seung Geol Choi, Travis Mayberry, Daniel S. Roche:
ObliviSync: Practical Oblivious File Backup and Synchronization. NDSS 2017 - [i7]Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry:
Deterministic, Stash-Free Write-Only ORAM. CoRR abs/1706.03827 (2017) - [i6]Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber:
Towards Baselines for Shoulder Surfing on Mobile Authentication. CoRR abs/1709.04959 (2017) - [i5]Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry:
Deterministic, Stash-Free Write-Only ORAM. IACR Cryptol. ePrint Arch. 2017: 586 (2017) - 2016
- [j5]John Sonchack, Adam J. Aviv:
Exploring large scale security system reproducibility with the LESS simulator. J. Comput. Secur. 24(5): 645-665 (2016) - [c23]Vaishali Narkhede, Karuna P. Joshi, Adam J. Aviv
, Seung Geol Choi, Daniel S. Roche, Tim Finin:
Managing Cloud Storage Obliviously. CLOUD 2016: 990-993 - [c22]John Sonchack, Anurag Dubey, Adam J. Aviv
, Jonathan M. Smith, Eric Keller:
Timing-based reconnaissance and defense in software-defined networks. ACSAC 2016: 89-100 - [c21]John Sonchack, Adam J. Aviv
, Eric Keller:
Timing SDN Control Planes to Infer Network Configurations. SDN-NFV@CODASPY 2016: 19-22 - [c20]John Sonchack, Jonathan M. Smith, Adam J. Aviv
, Eric Keller:
Enabling Practical Software-defined Networking Security Applications with OFX. NDSS 2016 - [c19]Adam J. Aviv, Markus Dürmuth, Payas Gupta:
Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords. WAY@SOUPS 2016 - [c18]Flynn Wolf, Ravi Kuber, Adam J. Aviv:
Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication. WSIW@SOUPS 2016 - [c17]Daniel S. Roche
, Adam J. Aviv
, Seung Geol Choi:
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence. IEEE Symposium on Security and Privacy 2016: 178-197 - [i4]Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche:
ObliviSync: Practical Oblivious File Backup and Synchronization. CoRR abs/1605.09779 (2016) - [i3]Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche:
ObliviSync: Practical Oblivious File Backup and Synchronization. IACR Cryptol. ePrint Arch. 2016: 543 (2016) - 2015
- [j4]John Sonchack, Adam J. Aviv, Jonathan M. Smith:
Cross-domain collaboration for improved IDS rule set selection. J. Inf. Secur. Appl. 24-25: 25-40 (2015) - [c16]Adam J. Aviv
, Devon Budzitowski, Ravi Kuber
:
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock. ACSAC 2015: 301-310 - [c15]John Sonchack, Adam J. Aviv, Eric Keller, Jonathan M. Smith:
POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications. CCS 2015: 1678-1680 - [i2]Daniel S. Roche, Adam J. Aviv, Seung Geol Choi:
Oblivious Secure Deletion with Bounded History Independence. CoRR abs/1505.07391 (2015) - [i1]Daniel S. Roche, Adam J. Aviv, Seung Geol Choi:
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence. IACR Cryptol. ePrint Arch. 2015: 1126 (2015) - 2014
- [j3]Adam J. Aviv, Matt Blaze, Micah Sherr, Jonathan M. Smith:
Privacy-aware message exchanges for HumaNets. Comput. Commun. 48: 30-43 (2014) - [j2]Andrew G. West
, Adam J. Aviv:
Measuring Privacy Disclosures in URL Query Strings. IEEE Internet Comput. 18(6): 52-59 (2014) - [c14]Adam J. Aviv
, Dane Fichter:
Understanding visual perceptions of usability and security of Android's graphical password pattern. ACSAC 2014: 286-295 - [c13]John Sonchack, Adam J. Aviv
:
LESS Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems. ESORICS (2) 2014: 365-382 - 2013
- [c12]John Sonchack, Adam J. Aviv, Jonathan M. Smith:
Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems. CSET 2013 - 2012
- [j1]Adam J. Aviv, Vin Mannino, Thanat Owlarn, Seth Shannin, Kevin Xu, Boon Thau Loo
:
Experiences in teaching an educational user-level operating systems implementation project. ACM SIGOPS Oper. Syst. Rev. 46(2): 80-86 (2012) - [c11]Adam J. Aviv
, Benjamin Sapp, Matt Blaze, Jonathan M. Smith:
Practicality of accelerometer side channels on smartphones. ACSAC 2012: 41-50 - [c10]Adam J. Aviv
, Micah Sherr, Matt Blaze, Jonathan M. Smith:
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. ESORICS 2012: 181-198 - 2011
- [c9]Adam J. Aviv, Andreas Haeberlen:
Challenges in Experimenting with Botnet Detection Systems. CSET 2011 - 2010
- [c8]Andrew G. West, Adam J. Aviv
, Jian Chang, Insup Lee:
Spam mitigation using spatio-temporal reputations from blacklist history. ACSAC 2010: 161-170 - [c7]Jason Reed, Adam J. Aviv
, Daniel Wagner, Andreas Haeberlen
, Benjamin C. Pierce, Jonathan M. Smith:
Differential privacy for collaborative security. EUROSEC 2010: 1-7 - [c6]Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith:
Evading Cellular Data Monitoring with Human Movement Networks. HotSec 2010 - [c5]Adam J. Aviv, Katherine L. Gibson, Evan Mossop, Matt Blaze, Jonathan M. Smith:
Smudge Attacks on Smartphone Touch Screens. WOOT 2010
2000 – 2009
- 2009
- [c4]Andrew G. West, Adam J. Aviv
, Jian Chang, Vinayak S. Prabhu
, Matt Blaze, Sampath Kannan, Insup Lee, Jonathan M. Smith, Oleg Sokolsky
:
QuanTM: a quantitative trust management system. EUROSEC 2009: 28-35 - 2008
- [c3]Maritza L. Johnson, Chaitanya Atreya, Adam J. Aviv, Steven M. Bellovin, Gail E. Kaiser:
RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. UPSEC 2008 - [c2]Adam J. Aviv, Pavol Cerný, Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, Matt Blaze:
Security Evaluation of ES&S Voting Machines and Election Management System. EVT 2008 - 2007
- [c1]Adam J. Aviv
, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis:
SSARES: Secure Searchable Automated Remote Email Storage. ACSAC 2007: 129-139
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint