“... no one can hack my mind”: Comparing Expert and Non-Expert Security Practices I Ion, R Reeder, S Consolvo Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 327-346, 2015 | 198 | 2015 |
Home is safer than the cloud! Privacy concerns for consumer cloud storage I Ion, N Sachdeva, P Kumaraguru, S Čapkun Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011 | 196 | 2011 |
Access control for home data sharing: Attitudes, needs and practices ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010 | 150 | 2010 |
In search of an internet of things service architecture: REST or WS-*? A developers’ perspective D Guinard, I Ion, S Mayer International Conference on Mobile and Ubiquitous Systems: Computing …, 2011 | 143 | 2011 |
" My religious aunt asked why i was trying to sell her viagra" experiences with account hijacking R Shay, I Ion, RW Reeder, S Consolvo Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 61 | 2014 |
Influence of user perception, security needs, and social factors on device pairing method choices I Ion, M Langheinrich, P Kumaraguru, S Čapkun Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010 | 53 | 2010 |
Extending the java virtual machine to enforce fine-grained security policies in mobile devices I Ion, B Dragovic, B Crispo Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 51 | 2007 |
152 simple steps to stay safe online: Security advice for non-tech-savvy users RW Reeder, I Ion, S Consolvo IEEE Security & Privacy 15 (5), 55-64, 2017 | 37 | 2017 |
Expert and non-expert attitudes towards (secure) instant messaging A De Luca, S Das, M Ortlieb, I Ion, B Laurie Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 147-157, 2016 | 36 | 2016 |
For some eyes only: protecting online information sharing F Beato, I Ion, S Čapkun, B Preneel, M Langheinrich Proceedings of the third ACM conference on Data and application security and …, 2013 | 35 | 2013 |
UACAP: A unified auxiliary channel authentication protocol R Mayrhofer, J Fuß, I Ion IEEE Transactions on Mobile Computing 12 (4), 710-721, 2012 | 24 | 2012 |
Don’t trust POS terminals! Verify in-shop payments with your phone I Ion, B Dragovic Proceedings of SMPU 8, 2010 | 11 | 2010 |
MTrainSchedule: Combining Web Services and Data Caching on Mobile Devices. I Ion, A Caracas, H Höpfner Datenbank-Spektrum 7 (21), 51-53, 2007 | 10 | 2007 |
OpenUAT: The open source ubiquitous authentication toolkit R Mayrhofer, I Ion Technical Report/ETH Zurich, Department of Computer Science 657, 2010 | 6 | 2010 |
Towards Java-based Data Caching for Mobile Information System Clients A Caracas, I Ion, M Ion, H Höpfner MMS 2007: Mobilität und mobile informationssysteme–2nd conference of GI …, 2007 | 5 | 2007 |
Apples and oranges: Detecting least-privilege violators with peer group analysis S Jana, Ú Erlingsson, I Ion arXiv preprint arXiv:1510.07308, 2015 | 4 | 2015 |
Web Services and Data Caching for Java Mobile Clients. A Caracas, I Ion, M Ion BTW Studierendenprogramm, 10-12, 2007 | 4 | 2007 |
Department: Chemistry S No CHEMISTRY 2017 (18), 1, 2010 | 3 | 2010 |
Access control for home data sharing: evaluating social acceptability. ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ... CHI, 645-654, 2010 | 3 | 2010 |
User-centered security mechanisms for protecting information sharing in the cloud I Ion ETH Zurich, 2012 | 2 | 2012 |