{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices I Ion, R Reeder, S Consolvo Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 327-346, 2015 | 383 | 2015 |
Home is safer than the cloud! Privacy concerns for consumer cloud storage I Ion, N Sachdeva, P Kumaraguru, S Čapkun Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011 | 246 | 2011 |
Access control for home data sharing: Attitudes, needs and practices ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010 | 185 | 2010 |
In search of an internet of things service architecture: Rest or ws-*? a developers’ perspective D Guinard, I Ion, S Mayer Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th …, 2012 | 164 | 2012 |
152 simple steps to stay safe online: Security advice for non-tech-savvy users RW Reeder, I Ion, S Consolvo IEEE Security & Privacy 15 (5), 55-64, 2017 | 120 | 2017 |
" My religious aunt asked why i was trying to sell her viagra" experiences with account hijacking R Shay, I Ion, RW Reeder, S Consolvo Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 88 | 2014 |
Expert and {Non-Expert} attitudes towards (secure) instant messaging A De Luca, S Das, M Ortlieb, I Ion, B Laurie Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 147-157, 2016 | 78 | 2016 |
Influence of user perception, security needs, and social factors on device pairing method choices I Ion, M Langheinrich, P Kumaraguru, S Čapkun Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010 | 69 | 2010 |
Extending the java virtual machine to enforce fine-grained security policies in mobile devices I Ion, B Dragovic, B Crispo Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 50 | 2007 |
For some eyes only: protecting online information sharing F Beato, I Ion, S Čapkun, B Preneel, M Langheinrich Proceedings of the third ACM conference on Data and application security and …, 2013 | 40 | 2013 |
UACAP: A unified auxiliary channel authentication protocol R Mayrhofer, J Fuß, I Ion IEEE Transactions on Mobile Computing 12 (4), 710-721, 2012 | 32 | 2012 |
MTrainSchedule: Combining Web Services and Data Caching on Mobile Devices. I Ion, A Caracas, H Höpfner Datenbank-Spektrum 7 (21), 51-53, 2007 | 12 | 2007 |
Don’t trust POS terminals! Verify in-shop payments with your phone I Ion, B Dragovic Proceedings of SMPU 8, 2010 | 11 | 2010 |
Mobile and Ubiquitous Systems: Computing, Networking, and Services D Guinard, I Ion, S Mayer Springer, 2011 | 10 | 2011 |
Apples and oranges: Detecting least-privilege violators with peer group analysis S Jana, Ú Erlingsson, I Ion arXiv preprint arXiv:1510.07308, 2015 | 7 | 2015 |
OpenUAT: The open source ubiquitous authentication toolkit R Mayrhofer, I Ion Technical Report/ETH Zurich, Department of Computer Science 657, 2010 | 6 | 2010 |
Towards Java-based Data Caching for Mobile Information System Clients A Caracas, I Ion, M Ion, H Höpfner Gesellschaft für Informatik e. V., 2007 | 6 | 2007 |
Access control for home data sharing: evaluating social acceptability. ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ... CHI, 645-654, 2010 | 5 | 2010 |
Privacy and Trust in the Ubiquitous Information Society: Analysis of the impact of convergent and pervasive ICT on privacy and data protection and needs and options for … M Friedewald, T Leimbach, D Wright, S Gutwirth, P De Hert, GG Fuster, ... EU bookshop-Publication Office of the EU, 2013 | 4 | 2013 |
Web Services and Data Caching for Java Mobile Clients. A Caracas, I Ion, M Ion BTW Studierendenprogramm, 10-12, 2007 | 4 | 2007 |