Aviv, Adam J.
60  results:
Search for persons X
?
1

How Does Connecting Online Activities to Advertising Infere..:

Farke, Florian M. ; Balash, David G. ; Golla, Maximilian.
Proceedings on Privacy Enhancing Technologies.  2024 (2024)  2 - p. 372-390 , 2024
 
?
2

Awareness, Intention, (In)Action: Individuals' Reactions to..:

Mayer, Peter ; Zou, Yixin ; Lowens, Byron M....
ACM Transactions on Computer-Human Interaction.  30 (2023)  5 - p. 1-53 , 2023
 
?
3

On the Security of Smartphone Unlock PINs:

Markert, Philipp ; Bailey, Daniel V. ; Golla, Maximilian..
ACM Transactions on Privacy and Security (TOPS).  24 (2021)  4 - p. 1-36 , 2021
 
?
4

"Warn Them" or "Just Block Them"?: Investigating Privacy Co..:

Ray, Hirak ; Wolf, Flynn ; Kuber, Ravi.
Proceedings on Privacy Enhancing Technologies.  2021 (2021)  2 - p. 27-47 , 2021
 
?
5

Holes in the Geofence: Privacy Vulnerabilities in "Smart" D..:

Fainchtein, Rahel A. ; Aviv, Adam J. ; Sherr, Micah..
Proceedings on Privacy Enhancing Technologies.  2021 (2021)  2 - p. 151-172 , 2021
 
?
6

On the Security of Smartphone Unlock PINs:

Markert, Philipp ; Bailey, Daniel V. ; Golla, Maximilian..
ACM Transactions on Privacy and Security.  24 (2021)  4 - p. 1-36 , 2021
 
?
7

An empirical study examining the perceptions and behaviours..:

Wolf, Flynn ; Kuber, Ravi ; Aviv, Adam J
Behaviour & Information Technology.  37 (2018)  4 - p. 320-334 , 2018
 
?
8

"It's all about the start" classifying eyes-free mobile aut..:

Wolf, Flynn ; Aviv, Adam J. ; Kuber, Ravi
Journal of Information Security and Applications.  41 (2018)  - p. 28-40 , 2018
 
?
9

A Video-based Attack for Android Pattern Lock:

Ye, Guixin ; Tang, Zhanyong ; Fang, Dingyi...
ACM Transactions on Privacy and Security.  21 (2018)  4 - p. 1-31 , 2018
 
?
10

A Video-based Attack for Android Pattern Lock:

Ye, Guixin ; Tang, Zhanyong ; Fang, Dingyi...
ACM Transactions on Privacy and Security (TOPS).  21 (2018)  4 - p. 1-31 , 2018
 
?
12

Cross-domain collaboration for improved IDS rule set select..:

Sonchack, John ; Aviv, Adam J. ; Smith, Jonathan M.
Journal of Information Security and Applications.  24-25 (2015)  - p. 25-40 , 2015
 
?
13

Privacy-aware message exchanges for HumaNets:

Aviv, Adam J. ; Blaze, Matt ; Sherr, Micah.
Computer Communications.  48 (2014)  - p. 30-43 , 2014
 
?
14

Measuring Privacy Disclosures in URL Query Strings:

West, Andrew G. ; Aviv, Adam J.
IEEE Internet Computing.  18 (2014)  6 - p. 52-59 , 2014
 
?
15

Experiences in teaching an educational user-level operating..:

Aviv, Adam J. ; Mannino, Vin ; Owlarn, Thanat...
ACM SIGOPS Operating Systems Review.  46 (2012)  2 - p. 80-86 , 2012
 
1-15