Janne Lindqvist

Orcid: 0000-0002-8659-2283

According to our database1, Janne Lindqvist authored at least 72 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Swapping 5G for 3G: Motivations, Experiences, and Implications of Contemporary Dumbphone Adoption.
Proc. ACM Hum. Comput. Interact., 2024

Trusting the Search: Unraveling Human Trust in Health Information from Google and ChatGPT.
CoRR, 2024

From Disorientation to Harmony: Autoethnographic Insights into Transformative Videogame Experiences.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Privacy of Default Apps in Apple's Mobile Ecosystem.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online Games.
Proc. ACM Hum. Comput. Interact., 2023

When Browsing Gets Cluttered: Exploring and Modeling Interactions of Browsing Clutter, Browsing Habits, and Coping.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Systematic Evaluation and User Study of Privacy of Default Apps in Apple's Mobile Ecosystem.
CoRR, 2022

Usability and Security of Trusted Platform Module (TPM) Library APIs.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Public Views on Digital COVID-19 Certificates: a Mixed Methods User Study.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Secure Gestures - Case Study 4.
Proceedings of the Intelligent Computing for Interactive System Design: Statistics, 2021

2019
Recruit Until It Fails: Exploring Performance Limits for Identification Systems.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Robust Performance Metrics for Authentication Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Quantifying the Security of Recognition Passwords: Gestures and Signatures.
CoRR, 2018

Forgetting of Passwords: Ecological Theory and Data.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Guessing Attacks on User-Generated Gesture Passwords.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Auto++: Detecting Cars Using Embedded Microphones in Real-Time.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Transforming Speed Sequences into Road Rays on the Map with Elastic Pathing.
CoRR, 2017

UbiMI'17: ubiquitous mobile instrumentation.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

Demo: Garda - robust gesture-based authentication for mobile systems.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

Composition policies for gesture passwords: User choice, security, usability and memorability.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

How Busy Are You?: Predicting the Interruptibility Intensity of Mobile Users.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Demo of Headbanger: Authenticating smart wearable devices using unique head movement patterns.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications, 2016

Bo-ear: unsupervised car sound sensing and tracking using microphones on smartphones.
Proceedings of the Eighth Wireless of the Students, 2016

No time at all: opportunity cost of Android permissions (invited paper).
Proceedings of the 3rd Workshop on Hot Topics in Wireless, 2016

Free-Form Gesture Authentication in the Wild.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

On my way: Optimizing driving routes for navigation applications.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Feasibility of software-based duty cycling of GPS for trajectory-based services.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Understanding Motivations for Using Grocery Shopping Applications.
IEEE Pervasive Comput., 2015

Engineering Gesture-Based Authentication Systems.
IEEE Pervasive Comput., 2015

Guest Editorial Special Issue on Mobile Crowd Sensing for IoT.
IEEE Internet Things J., 2015

Of Two Minds, Multiple Addresses, and One History: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Groups.
CoRR, 2015

Is Secure and Usable Smartphone Authentication Asking Too Much?
Computer, 2015

Securacy: an empirical investigation of Android applications' network usage, privacy and security.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2014
Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen.
IEEE Trans. Mob. Comput., 2014

Text Entry Method Affects Password Security.
CoRR, 2014

Elastic Pathing: Your Speed is Enough to Track You.
CoRR, 2014

Private Browsing: an Inquiry on Usability and Privacy Protection.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

General Area or Approximate Location?: How People Understand Location Permissions.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Groupsourcing: nudging users away from unsafe content.
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014

Video: User-generated free-form gestures for authentication: security and memorability.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

User-generated free-form gestures for authentication: security and memorability.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

A policy-driven approach to access control in future internet name resolution services.
Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, 2014

Elastic pathing: your speed is enough to track you.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Disaster mitigation by crowdsourcing hazard documentation.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2014

The motivations and experiences of the on-demand mobile workforce.
Proceedings of the Computer Supported Cooperative Work, 2014

2012
Demo: user identification and authentication with capacitive touch communication.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Distinguishing users with capacitive touch communication.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

2011
Undistracted driving: a mobile phone that doesn't distract.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Caché: caching location-enhanced content to improve user privacy.
Proceedings of the 9th International Conference on Mobile Systems, 2011

I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Caché: caching location-enhanced content to improve user privacy.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Enterprise Network Packet Filtering for Mobile Cryptographic Identities.
Int. J. Handheld Comput. Res., 2010

Practical Defenses for Evil Twin Attacks in 802.11.
Proceedings of the Global Communications Conference, 2010

2009
Practical privacy enhancing technologies for mobile systems.
PhD thesis, 2009

Privacy-preserving 802.11 access-point discovery.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Leap-of-Faith Security is Enough for IP Mobility.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
HotMobile 2008: Postconference Report.
IEEE Pervasive Comput., 2008

Protecting privacy with protocol stack virtualization.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Chattering Laptops.
Proceedings of the Privacy Enhancing Technologies, 2008

Interconnecting multiple home networks services.
Proceedings of the 2008 International Conference on Telecommunications, 2008

2007
Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing.
Proceedings of the International Conference on Networking, 2007

VERKKOKE: learning routing and network programming online.
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007

Usability Improvements for WLAN Access.
Proceedings of the Human-Computer Interaction. Interaction Design and Usability, 2007

Cure for Spam Over Internet Telephony.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Privacy management for secure mobility.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Secure Pairing Architecture for Wireless Mobile Devices.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Resilient JPv6 Multicast Address Allocation in Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

VERKKOKE: online teaching environment for telecommunications software and routing.
Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2006


  Loading...