-
1
-
-
84883568208
-
-
Accessibility. http://developer.android.com/guide/topics/ui/accessibility/index.html.
-
Accessibility
-
-
-
3
-
-
85076308221
-
-
Cryptocat. https://crypto.cat.
-
-
-
-
6
-
-
85076306960
-
-
Google Accessibility. https://www.google.com/accessibility/policy/.
-
-
-
-
9
-
-
85076296566
-
-
Microsoft Accessibility. http://www.microsoft.com/enable/microsoft/section508.aspx.
-
-
-
-
20
-
-
84883568208
-
-
February
-
Accessibility. https://www.apple.com/accessibility/resources/, February 2014.
-
(2014)
Accessibility
-
-
-
21
-
-
14644430733
-
Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism (USA patriot act) act of 2001
-
107TH CONGRESS
-
107TH CONGRESS. Uniting and strengthening america by providing appropriate tools required to intercept and obstruct terrorism (usa patriot act) act of 2001. Public Law 107-56 (2001).
-
(2001)
Public Law
, pp. 107-156
-
-
-
22
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
Springer
-
ACQUISTI, A., and GROSS, R. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy enhancing technologies (2006), Springer, pp. 36-58.
-
(2006)
Privacy Enhancing Technologies
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
23
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
BADEN, R., BENDER, A., SPRING, N., BHATTACHARJEE, B., and STARIN, D. Persona: an online social network with user-defined privacy. In ACM SIGCOMM Computer Communication Review (2009), Vol. 39, ACM, pp. 135-146.
-
(2009)
ACM SIGCOMM Computer Communication Review
, vol.39
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
24
-
-
79961189950
-
Scramble! your social network data
-
Springer
-
BEATO, F., KOHLWEISS, M., and WOUTERS, K. Scramble! your social network data. In Privacy Enhancing Technologies (2011), Springer, pp. 211-225.
-
(2011)
Privacy Enhancing Technologies
, pp. 211-225
-
-
Beato, F.1
Kohlweiss, M.2
Wouters, K.3
-
25
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
A. Menezes, Ed., Vol. 4622 of Lecture Notes in Computer Science, Springer
-
BELLARE, M., BOLDYREVA, A., AND O'NEILL, A. Deterministic and efficiently searchable encryption. In CRYPTO (2007), A. Menezes, Ed., Vol. 4622 of Lecture Notes in Computer Science, Springer, pp. 535-552.
-
(2007)
CRYPTO
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
26
-
-
84869458610
-
Repackaging android applications for auditing access to private data
-
BERTHOME, P., FECHEROLLE, T., GUILLOTEAU, N., and LALANDE, J.-F. Repackaging android applications for auditing access to private data. In Availability, Reliability and Security (ARES), 2012 Seventh International Conference on (2012), IEEE, pp. 388-396.
-
(2012)
Availability, Reliability and Security (ARES), 2012 Seventh International Conference on
, pp. 388-396
-
-
Berthome, P.1
Fecherolle, T.2
Guilloteau, N.3
Lalande, J.-F.4
-
27
-
-
80054837552
-
Falling asleep with angry birds, facebook and kindle: A large scale study on mobile application usage
-
BÖHMER, M., HECHT, B., SCHÖNING, J., KRÜGER, A., and BAUER, G. Falling asleep with angry birds, facebook and kindle: a large scale study on mobile application usage. In Proceedings of the 13th international conference on Human computer interaction with mobile devices and services (2011), ACM, pp. 47-56.
-
(2011)
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
, pp. 47-56
-
-
Böhmer, M.1
Hecht, B.2
Schöning, J.3
Krüger, A.4
Bauer, G.5
-
28
-
-
35048901123
-
Public key encryption with keyword search
-
C. Cachin and J. Camenisch, Eds., Vol. 3027 of Lecture Notes in Computer Science, Springer
-
BONEH, D., and CRESCENZO., G. D., OSTROVSKY, R., and PERSIANO, G. Public key encryption with keyword search. In EUROCRYPT (2004), C. Cachin and J. Camenisch, Eds., Vol. 3027 of Lecture Notes in Computer Science, Springer, pp. 506-522.
-
(2004)
EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
29
-
-
85076303225
-
Protecting confidential data on personal computers with storage capsules
-
BORDERS, K., VANDER WEELE, E., LAU, B., and PRAKASH, A. Protecting confidential data on personal computers with storage capsules. Ann Arbor 1001 (2009), 48109.
-
(2009)
Ann Arbor 1001
, pp. 48109
-
-
Borders, K.1
Vander Weele, E.2
Lau, B.3
Prakash, A.4
-
30
-
-
20444490057
-
Off-the-record communication, or, why not to use pgp
-
BORISOV, N., GOLDBERG, I., and BREWER, E. Off-the-record communication, or, why not to use pgp. In Proceedings of the 2004 ACM workshop on Privacy in the electronic society (2004), ACM, pp. 77-84.
-
(2004)
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
, pp. 77-84
-
-
Borisov, N.1
Goldberg, I.2
Brewer, E.3
-
31
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
J. Ioannidis, A. Keromytis, and M. Yung, Eds., Vol. 3531 of Lecture Notes in Computer Science. Springer
-
CHANG, Y.-C., and MITZENMACHER, M. Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security, J. Ioannidis, A. Keromytis, and M. Yung, Eds., Vol. 3531 of Lecture Notes in Computer Science. Springer, 2005, pp. 442-455.
-
(2005)
Applied Cryptography and Network Security
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
33
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
A. Juels, R. N. Wright, and S. D. C. di Vimercati, Eds., ACM
-
CURTMOLA, R., and GARAY., J. A., KAMARA, S., and OSTROVSKY, R. Searchable symmetric encryption: Improved definitions and efficient constructions. In ACM Conference on Computer and Communications Security (2006), A. Juels, R. N. Wright, and S. D. C. di Vimercati, Eds., ACM, pp. 79-88.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
35
-
-
85084161366
-
-
Tech. rep., DTIC Document
-
DINGLEDINE, R., MATHEWSON, N., and SYVERSON, P. Tor: The second-generation onion router. Tech. rep., DTIC Document, 2004.
-
(2004)
Tor: The Second-generation Onion Router
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
36
-
-
84888989716
-
Protecting sensitive web content from clientside vulnerabilities with cryptons
-
DONG, X., CHEN, Z., SIADATI, H., TOPLE, S., SAXENA, P., and LIANG, Z. Protecting sensitive web content from clientside vulnerabilities with cryptons. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), ACM, pp. 1311-1324.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 1311-1324
-
-
Dong, X.1
Chen, Z.2
Siadati, H.3
Tople, S.4
Saxena, P.5
Liang, Z.6
-
38
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smart-phones
-
ENCK, W., GILBERT, P., CHUN, B.-G., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smart-phones. In OSDI (2010), Vol. 10, pp. 1-6.
-
(2010)
OSDI
, vol.10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mcdaniel, P.6
Sheth, A.7
-
39
-
-
84869487159
-
Why Eve and mallory love android: An analysis of android ssl (in)security
-
New York, NY, USA CCS '12, ACM
-
FAHL, S., HARBACH, M., MUDERS, T., BAUMGÄRTNER, L., FREISLEBEN, B., and SMITH, M. Why eve and mallory love android: An analysis of android ssl (in)security. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (New York, NY, USA, 2012), CCS '12, ACM, pp. 50-61.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
Freisleben, B.5
Smith, M.6
-
40
-
-
84864071462
-
Trust-split: Usable confidentiality for social network messaging
-
FAHL, S., HARBACH, M., MUDERS, T., and SMITH, M. Trust-split: usable confidentiality for social network messaging. In Proceedings of the 23rd ACM conference on Hypertext and social media (2012), ACM, pp. 145-154.
-
(2012)
Proceedings of the 23rd ACM Conference on Hypertext and Social Media
, pp. 145-154
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
-
41
-
-
84887099940
-
Safeslinger: Easy-to-use and secure public-key exchange
-
FARB, M., LIN, Y.-H., KIM, T. H.-J., MCCUNE, J., AND PERRIG, A. Safeslinger: easy-to-use and secure public-key exchange. In Proceedings of the 19th annual international conference on Mobile computing & networking (2013), ACM, pp. 417-428.
-
(2013)
Proceedings of the 19th Annual International Conference on Mobile Computing & Networking
, pp. 417-428
-
-
Farb, M.1
Lin, Y.-H.2
Kim, T.H.-J.3
Mccune, J.4
Perrig, A.5
-
42
-
-
0346271799
-
Beyond the five-user assumption: Benefits of increased sample sizes in usability testing
-
FAULKNER, L. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers 35, 3 (2003), 379-383.
-
(2003)
Behavior Research Methods, Instruments, & Computers
, vol.35
, Issue.3
, pp. 379-383
-
-
Faulkner, L.1
-
43
-
-
84990231617
-
Social networking with frientegrity: Privacy and integrity with an untrusted provider
-
FELDMAN, A. J., BLANKSTEIN, A., FREEDMAN, M. J., and FELTEN, E. W. Social networking with frientegrity: privacy and integrity with an untrusted provider. In Proceedings of the 21st USENIX conference on Security symposium, Security (2012), Vol. 12.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security
, vol.12
-
-
Feldman, A.J.1
Blankstein, A.2
Freedman, M.J.3
Felten, E.W.4
-
45
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
GOLDREICH, O., and OSTROVSKY, R. Software protection and simulation on oblivious rams. J. ACM 43, 3 (1996), 431-473.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
46
-
-
70249088359
-
Noyb: Privacy in online social networks
-
GUHA, S., TANG, K., and FRANCIS, P. Noyb: Privacy in online social networks. In Proceedings of the first workshop on Online social networks (2008), ACM, pp. 49-54.
-
(2008)
Proceedings of the First Workshop on Online Social Networks
, pp. 49-54
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
48
-
-
85133874685
-
Gyrus: A framework for user-intent monitoring of text-based networked applications
-
JANG, Y., CHUNG, S. P., PAYNE, B. D., AND LEE, W. Gyrus: A framework for user-intent monitoring of text-based networked applications. In NDSS (2014).
-
(2014)
NDSS
-
-
Jang, Y.1
Chung, S.P.2
Payne, B.D.3
Lee, W.4
-
49
-
-
84869790502
-
Dr. Android and mr. hide: Fine-grained permissions in android applications
-
JEON, J., and MICINSKI., K. K., VAUGHAN, J. A., FOGEL, A., REDDY, N., and FOSTER., J. S., and MILLSTEIN, T. Dr. android and mr. hide: fine-grained permissions in android applications. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices (2012), ACM, pp. 3-14.
-
(2012)
Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 3-14
-
-
Jeon, J.1
Micinski, K.K.2
Vaughan, J.A.3
Fogel, A.4
Reddy, N.5
Foster, J.S.6
Millstein, T.7
-
51
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
KAMARA, S., PAPAMANTHOU, C., and ROEDER, T. Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM conference on Computer and communications security (2012), ACM, pp. 965-976.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
52
-
-
85084095841
-
Designing and implementing Malicious hardware
-
Berkeley, CA, USA LEET'08, USENIX Association
-
KING, S. T., TUCEK, J., COZZIE, A., GRIER, C., JIANG, W., and ZHOU, Y. Designing and implementing malicious hardware. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (Berkeley, CA, USA, 2008), LEET'08, USENIX Association, pp. 5:1-5:8.
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 51-58
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
53
-
-
84883287568
-
Privacy-preserving social plugins
-
USENIX Association
-
KONTAXIS, G., POLYCHRONAKIS, M., KEROMYTIS, A. D., and MARKATOS, E. P. Privacy-preserving social plugins. In Proceedings of the 21st USENIX conference on Security symposium (2012), USENIX Association, pp. 30-30.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
, pp. 30
-
-
Kontaxis, G.1
Polychronakis, M.2
Keromytis, A.D.3
Markatos, E.P.4
-
54
-
-
85076288957
-
-
LAU, B., CHUNG, S., SONG, C., JANG, Y., LEE, W., and BOLDYREVA, A. Mimesis Aegis: A Mimicry Privacy Shield. http://hdl.handle.net/1853/52026.
-
Mimesis Aegis: A Mimicry Privacy Shield
-
-
Lau, B.1
Chung, S.2
Song, C.3
Jang, Y.4
Lee, W.5
Boldyreva, A.6
-
57
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
ROESNER, F., KOHNO, T., MOSHCHUK, A., PARNO, B., and WANG., H. J., and COWAN, C. User-driven access control: Rethinking permission granting in modern operating systems. In Security and Privacy (SP), 2012 IEEE Symposium on (2012), IEEE, pp. 224-238.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium on
, pp. 224-238
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
59
-
-
81155140118
-
Why johnny still can't encrypt: Evaluating the usability of email encryption software
-
SHENG, S., BRODERICK, L., HYLAND, J., and KORANDA, C. Why johnny still can't encrypt: evaluating the usability of email encryption software. In Symposium On Usable Privacy and Security (2006).
-
(2006)
Symposium on Usable Privacy and Security
-
-
Sheng, S.1
Broderick, L.2
Hyland, J.3
Koranda, C.4
-
61
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
SONG, D. X., WAGNER, D., and PERRIG, A. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy (2000), pp. 44-55.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
62
-
-
35248855964
-
Cryptanalysis of des implemented on computers with cache
-
Springer
-
TSUNOO, Y., SAITO, T., SUZAKI, T., SHIGERI, M., and MIYAUCHI, H. Cryptanalysis of des implemented on computers with cache. In Cryptographic Hardware and Embedded Systems-CHES 2003. Springer, 2003, pp. 62-76.
-
(2003)
Cryptographic Hardware and Embedded Systems-CHES 2003
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
-
64
-
-
79958179522
-
Am i wasting my time organizing email?: A study of email refinding
-
WHITTAKER, S., MATTHEWS, T., CERRUTI, J., BADENES, H., and TANG, J. Am i wasting my time organizing email?: a study of email refinding. In PART 5 - Proceedings of the 2011 annual conference on Human factors in computing systems (2011), ACM, pp. 3449-3458.
-
(2011)
PART 5 - Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems
, pp. 3449-3458
-
-
Whittaker, S.1
Matthews, T.2
Cerruti, J.3
Badenes, H.4
Tang, J.5
-
67
-
-
85011343656
-
Airbag: Boosting smartphone resistance to malware infection
-
WU, C, ZHOU, Y., PATEL, K., LIANG, Z., and JIANG, X. Airbag: Boosting smartphone resistance to malware infection. In NDSS (2014).
-
(2014)
NDSS
-
-
Wu, C.1
Zhou, Y.2
Patel, K.3
Liang, Z.4
Jiang, X.5
-
68
-
-
85047887956
-
Aurasium: Practical policy enforcement for android applications
-
USENIX Association
-
XU, R., SÄIDI, H., and ANDERSON, R. Aurasium: Practical policy enforcement for android applications. In Proceedings of the 21st USENIX conference on Security symposium (2012), USENIX Association, pp. 27-27.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
, pp. 27
-
-
Xu, R.1
Säidi, H.2
Anderson, R.3
|