I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Aviv, Adam J.
60
results:
Articles (Online) X
Search for persons
X
Sorted by: Relevance
Sorted by: Year
?
1
How Does Connecting Online Activities to Advertising Infere..:
Farke, Florian M.
;
Balash, David G.
;
Golla, Maximilian
.
Proceedings on Privacy Enhancing Technologies. 2024 (2024) 2 - p. 372-390 , 2024
Link:
https://doi.org/10.56553..
?
2
Awareness, Intention, (In)Action: Individuals' Reactions to..:
Mayer, Peter
;
Zou, Yixin
;
Lowens, Byron M.
...
ACM Transactions on Computer-Human Interaction. 30 (2023) 5 - p. 1-53 , 2023
Link:
https://doi.org/10.1145/..
?
3
On the Security of Smartphone Unlock PINs:
Markert, Philipp
;
Bailey, Daniel V.
;
Golla, Maximilian
..
ACM Transactions on Privacy and Security (TOPS). 24 (2021) 4 - p. 1-36 , 2021
Link:
https://dl.acm.org/doi/1..
?
4
"Warn Them" or "Just Block Them"?: Investigating Privacy Co..:
Ray, Hirak
;
Wolf, Flynn
;
Kuber, Ravi
.
Proceedings on Privacy Enhancing Technologies. 2021 (2021) 2 - p. 27-47 , 2021
Link:
https://doi.org/10.2478/..
?
5
Holes in the Geofence: Privacy Vulnerabilities in "Smart" D..:
Fainchtein, Rahel A.
;
Aviv, Adam J.
;
Sherr, Micah
..
Proceedings on Privacy Enhancing Technologies. 2021 (2021) 2 - p. 151-172 , 2021
Link:
https://doi.org/10.2478/..
?
6
On the Security of Smartphone Unlock PINs:
Markert, Philipp
;
Bailey, Daniel V.
;
Golla, Maximilian
..
ACM Transactions on Privacy and Security. 24 (2021) 4 - p. 1-36 , 2021
Link:
https://doi.org/10.1145/..
?
7
An empirical study examining the perceptions and behaviours..:
Wolf, Flynn
;
Kuber, Ravi
;
Aviv, Adam J
Behaviour & Information Technology. 37 (2018) 4 - p. 320-334 , 2018
Link:
https://doi.org/10.1080/..
?
8
"It's all about the start" classifying eyes-free mobile aut..:
Wolf, Flynn
;
Aviv, Adam J.
;
Kuber, Ravi
Journal of Information Security and Applications. 41 (2018) - p. 28-40 , 2018
Link:
https://doi.org/10.1016/..
?
9
A Video-based Attack for Android Pattern Lock:
Ye, Guixin
;
Tang, Zhanyong
;
Fang, Dingyi
...
ACM Transactions on Privacy and Security. 21 (2018) 4 - p. 1-31 , 2018
Link:
https://doi.org/10.1145/..
?
10
A Video-based Attack for Android Pattern Lock:
Ye, Guixin
;
Tang, Zhanyong
;
Fang, Dingyi
...
ACM Transactions on Privacy and Security (TOPS). 21 (2018) 4 - p. 1-31 , 2018
Link:
https://dl.acm.org/doi/1..
?
11
Is Bigger Better When It Comes to Android Graphical Pattern..:
Aviv, Adam J.
;
Kuber, Ravi
;
Budzitowski, Devon
IEEE Internet Computing. 21 (2017) 6 - p. 46-51 , 2017
Link:
https://doi.org/10.1109/..
?
12
Cross-domain collaboration for improved IDS rule set select..:
Sonchack, John
;
Aviv, Adam J.
;
Smith, Jonathan M.
Journal of Information Security and Applications. 24-25 (2015) - p. 25-40 , 2015
Link:
https://doi.org/10.1016/..
?
13
Privacy-aware message exchanges for HumaNets:
Aviv, Adam J.
;
Blaze, Matt
;
Sherr, Micah
.
Computer Communications. 48 (2014) - p. 30-43 , 2014
Link:
https://doi.org/10.1016/..
?
14
Measuring Privacy Disclosures in URL Query Strings:
West, Andrew G.
;
Aviv, Adam J.
IEEE Internet Computing. 18 (2014) 6 - p. 52-59 , 2014
Link:
https://doi.org/10.1109/..
?
15
Experiences in teaching an educational user-level operating..:
Aviv, Adam J.
;
Mannino, Vin
;
Owlarn, Thanat
...
ACM SIGOPS Operating Systems Review. 46 (2012) 2 - p. 80-86 , 2012
Link:
https://dl.acm.org/doi/1..
1-15