Urs Hengartner
Orcid: 0000-0002-9840-0015
According to our database1,
Urs Hengartner
authored at least 78 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android.
ACM Trans. Priv. Secur., May, 2024
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems.
Comput. Secur., February, 2024
2023
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks.
ACM Trans. Priv. Secur., May, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
2021
Concerned but Ineffective: User Perceptions, Methods, and Challenges when Sanitizing Old Devices for Disposal.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
2020
ACM Trans. Priv. Secur., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
2015
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
2014
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Privacy-preserving matchmaking For mobile social networking secure against malicious users.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
2010
HMD Prax. Wirtsch., 2010
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010
2009
Not-So Hidden Information: Optimal Contracts for Undue Influence in E2E Voting Systems.
Proceedings of the E-Voting and Identity, Second International Conference, 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions, 2008
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007
Proceedings of the Trust Management, 2007
2006
Pervasive Mob. Comput., 2006
Pervasive Mob. Comput., 2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
2005
Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005
2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003
2002
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002
2001
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001
2000
Organization on intranet - An agent based approach.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000
1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999
1997
Entwurf eines integrierten Informations-, Verwaltungs- und Retrieval-Systems für textuelle Daten.
PhD thesis, 1997