Aviv, Adam J.
205  results:
Search for persons X
?
1

An Analysis of Password Managers' Password Checkup Tools:

, In: Extended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems,
 
?
2

How Does Connecting Online Activities to Advertising Infere..:

Farke, Florian M. ; Balash, David G. ; Golla, Maximilian.
Proceedings on Privacy Enhancing Technologies.  2024 (2024)  2 - p. 372-390 , 2024
 
?
3

"Someone Definitely Used 0000": Strategies, Performance, an..:

, In: Proceedings of the 2023 European Symposium on Usable Security,
 
?
4

Poster: Longitudinal Measurement of the Adoption Dynamics i..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Balash, David G. ; Ali, Mir Masood ; Kodwani, Monica... - p. 3600-3602 , 2023
 
?
5

"I just stopped using one and started using the other": Mot..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Munyendo, Collins W. ; Mayer, Peter ; Aviv, Adam J. - p. 3123-3137 , 2023
 
?
6

"In Eighty Percent of the Cases, I Select the Password for ..:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
 
?
7

Awareness, Intention, (In)Action: Individuals' Reactions to..:

Mayer, Peter ; Zou, Yixin ; Lowens, Byron M....
ACM Transactions on Computer-Human Interaction.  30 (2023)  5 - p. 1-53 , 2023
 
?
8

Cadence: A Simulator for Human Movement-based Communication..:

, In: Proceedings of the 16th Cyber Security Experimentation and Test Workshop,
Berger, Harel ; Sherr, Micah ; Aviv, Adam - p. 26-31 , 2023
 
?
9

User Perceptions of the Privacy and Usability of Smart DNS:

, In: Proceedings of the 38th Annual Computer Security Applications Conference,
 
?
10

"Desperate Times Call for Desperate Measures": User Concern..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
 
?
11

Investigating older adults' adoption and usage of online co..:

, In: Proceedings of the 19th International Web for All Conference,
Ray, Hirak ; Kuber, Ravi ; Aviv, Adam J. - p. 1-11 , 2022
 
?
12

Users Can Deduce Sensitive Locations Protected by Privacy Z..:

, In: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems,
Mink, Jaron ; Yuile, Amanda Rose ; Pal, Uma.. - p. 1-21 , 2022
 
?
13

User Perceptions of Five-Word Passwords:

, In: Proceedings of the 38th Annual Computer Security Applications Conference,
Wu, Xiaoyuan ; Munyendo, Collins W. ; Cosic, Eddie... - p. 605-618 , 2022
 
?
14

On the Security of Smartphone Unlock PINs:

Markert, Philipp ; Bailey, Daniel V. ; Golla, Maximilian..
ACM Transactions on Privacy and Security (TOPS).  24 (2021)  4 - p. 1-36 , 2021
 
?
15

Holes in the Geofence: Privacy Vulnerabilities in "Smart" D..:

Fainchtein, Rahel A. ; Aviv, Adam J. ; Sherr, Micah..
Proceedings on Privacy Enhancing Technologies.  2021 (2021)  2 - p. 151-172 , 2021
 
1-15