-
1
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
G. Danezis and P. Golle, editors, volume 4258 of Lecture Notes in Computer Science, Springer
-
A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In G. Danezis and P. Golle, editors, Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, pages 36-58. Springer, 2006.
-
(2006)
Privacy Enhancing Technologies
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
3
-
-
84870681128
-
-
Android Market. https://market.android.com.
-
Android Market
-
-
-
4
-
-
84861308406
-
-
AppBrain. http://www.appbrain.com.
-
AppBrain
-
-
-
5
-
-
81855212018
-
Seeding a security-enhancing infrastructure for multi-market application ecosystems
-
April, TR-11-06
-
D. Barrera, W. Enck, and P. C. van Oorschot. Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Technical report, Carleton University, April 2011. TR-11-06.
-
(2011)
Technical Report, Carleton University
-
-
Barrera, D.1
Enck, W.2
Van Oorschot, P.C.3
-
6
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android categories and subject descriptors
-
ACM
-
D. Barrera, P. C. van Oorschot, and A. Somayaji. A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android Categories and Subject Descriptors. In Proc. of the 17th ACM conf. on Computer and Communications Security, CCS'10, pages 73-84. ACM, 2010.
-
(2010)
Proc. of the 17th ACM Conf. on Computer and Communications Security, CCS'10
, pp. 73-84
-
-
Barrera, D.1
Van Oorschot, P.C.2
Somayaji, A.3
-
9
-
-
84857065766
-
Re-evaluating the wisdom of crowds in assessing web security
-
G. Danezis, editor, volume 7035 of Lecture Notes in Computer Science, Springer
-
P. H. Chia and S. J. Knapskog. Re-evaluating the wisdom of crowds in assessing web security. In G. Danezis, editor, Financial Cryptography and Data Security, FC'11, volume 7035 of Lecture Notes in Computer Science, pages 299-314. Springer, 2012.
-
(2012)
Financial Cryptography and Data Security, FC'11
, pp. 299-314
-
-
Chia, P.H.1
Knapskog, S.J.2
-
10
-
-
0024682488
-
Computational aspects of computer viruses
-
F. Cohen. Computational aspects of computer viruses. Computers & Security, 8(4):297-298, 1989.
-
(1989)
Computers & Security
, vol.8
, Issue.4
, pp. 297-298
-
-
Cohen, F.1
-
11
-
-
84941869105
-
A technique for computer detection and correction of spelling errors
-
March
-
F. J. Damerau. A technique for computer detection and correction of spelling errors. Communications of the ACM, 7:171-176, March 1964.
-
(1964)
Communications of the ACM
, vol.7
, pp. 171-176
-
-
Damerau, F.J.1
-
12
-
-
74049155830
-
On lightweight mobile phone application certification
-
ACM
-
W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proc. of the 16th ACM conf. on Computer and Communications Security, CCS'09, pages 235-245. ACM, 2009.
-
(2009)
Proc. of the 16th ACM Conf. on Computer and Communications Security, CCS'09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
14
-
-
84861309873
-
-
May
-
Facebook partners with WOT. Article on ArcticStartup website, May 2011. http://www.arcticstartup.com/2011/05/12/facebook-partners-with-wot-to-protect- its-700-million-users.
-
(2011)
Facebook Partners with WOT
-
-
-
15
-
-
84861309876
-
-
Personal Communication
-
A. P. Felt. Personal Communication.
-
-
-
Felt, A.P.1
-
16
-
-
80755187788
-
Android permissions demystified
-
ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proc. of the 18th ACM conf. on Computer and Communications Security, CCS'11, pages 627-638. ACM, 2011.
-
(2011)
Proc. of the 18th ACM Conf. on Computer and Communications Security, CCS'11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
21
-
-
79952846708
-
Old, new, borrowed, blue -: A perspective on the evolution of mobile platform security architectures
-
ACM
-
K. Kostiainen, E. Reshetova, J.-E. Ekberg, and N. Asokan. Old, new, borrowed, blue -: a perspective on the evolution of mobile platform security architectures. In Proc. of the 1st ACM conf. on Data and Application Security and Privacy, CODASPY'11, pages 13-24. ACM, 2011.
-
(2011)
Proc. of the 1st ACM Conf. on Data and Application Security and Privacy, CODASPY'11
, pp. 13-24
-
-
Kostiainen, K.1
Reshetova, E.2
Ekberg, J.-E.3
Asokan, N.4
-
22
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
V. I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10(8):707-710, 1966.
-
(1966)
Soviet Physics Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.I.1
-
24
-
-
77955318018
-
Measuring the perpetrators and funders of typosquatting
-
R. Sion, editor, volume 6052 of Lecture Notes in Computer Science, Springer
-
T. Moore and B. Edelman. Measuring the perpetrators and funders of typosquatting. In R. Sion, editor, Financial Cryptography and Data Security, FC'10, volume 6052 of Lecture Notes in Computer Science, pages 175-191. Springer, 2010.
-
(2010)
Financial Cryptography and Data Security, FC'10
, pp. 175-191
-
-
Moore, T.1
Edelman, B.2
-
27
-
-
84861309877
-
I'm allowing what?, Disclosing the authority applications demand of users as a condition of installation
-
MSR-TR-2010-54
-
J. Tam, R. W. Reeder, and S. Schechter. I'm Allowing What? Disclosing the authority applications demand of users as a condition of installation. Technical report, Microsoft Research, 2010. MSR-TR-2010-54.
-
(2010)
Technical Report, Microsoft Research
-
-
Tam, J.1
Reeder, R.W.2
Schechter, S.3
|