Polakis, Iasonas
8  results:
Search for persons X
?
1

Where's Wally? : Precise User Discovery Attacks in Locat..:

, In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
 
?
2

Faces in the Distorting Mirror : Revisiting Photo-based ..:

, In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,
 
?
3

Faces in the Distorting Mirror : Revisiting Photo-based ..:

, In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,
 
?
4

The man who was there : validating check-ins in location..:

, In: Proceedings of the 29th Annual Computer Security Applications Conference,
 
?
5

All your face are belong to us : breaking Facebook's soc..:

, In: Proceedings of the 28th Annual Computer Security Applications Conference,
 
?
6

An empirical study on the security of cross-domain policies..:

, In: Proceedings of the Fourth European Workshop on System Security,
 
?
7

Using social networks to harvest email addresses:

, In: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society,
 
?
 
1-8