Adversary models for mobile device authentication
R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
The Trial of Posit in Shared Offices: Controlling Disclosure Levels of Schedule Data for Privacy by Changing the Placement of a Personal Interactive Calendar
When expressing personal data on the displays of personal IoT devices, it is important to be
intuitively aware of privacy settings and perform ready-to-hand interactions to respond …
intuitively aware of privacy settings and perform ready-to-hand interactions to respond …
CamFi: An AI-driven and Camera-based System for Assisting Users in Finding Lost Objects in Multi-Person Scenarios
G Yan, C Zhang, J Wang, Z Xu, J Liu, J Nie… - CHI Conference on …, 2022 - dl.acm.org
It is important to study how to help people quickly find misplaced objects. However, previous
studies have focused on single-person scenarios without considering the influence of other …
studies have focused on single-person scenarios without considering the influence of other …
“I saw your partner naked”: Exploring Privacy Challenges During Video-based Online Meetings
Video-based online meetings and, ultimately, the amount of private information that is
shared–intentionally or accidentally–increased as a result of the COVID-19 pandemic. For …
shared–intentionally or accidentally–increased as a result of the COVID-19 pandemic. For …