Igor Bilogrevic

According to our database1, Igor Bilogrevic authored at least 28 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


A Study on the Use of Checksums for Integrity Verification of Web Downloads.
ACM Trans. Priv. Secur., 2020

Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Reducing Permission Requests in Mobile Apps.
Proceedings of the Internet Measurement Conference, 2019

Privacy in Geospatial Applications and Location-Based Social Networks.
Proceedings of the Handbook of Mobile Data Privacy., 2018

Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches.
IEEE Trans. Mob. Comput., 2018

A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins.
IEEE Trans. Mob. Comput., 2018

Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Exploring decision making with Android's runtime permission dialogs using in-context surveys.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

SecureRun: Cheat-Proof and Private Summaries for Location-Based Activities.
IEEE Trans. Mob. Comput., 2016

A machine-learning based approach to privacy-aware information-sharing in mobile social networks.
Pervasive Mob. Comput., 2016

"If You Put All The Pieces Together...": Attitudes Towards Data Combination and Sharing Across Services and Companies.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

(Smart)watch your taps: side-channel keystroke inference attacks using smartwatches.
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2014

What's the Gist? Privacy-Preserving Aggregation of User Profiles.
IACR Cryptol. ePrint Arch., 2014

Secure and private proofs for location-based activity summaries in urban areas.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, UbiComp '14, Seattle, WA, 2014

Optimizing mix-zone coverage in pervasive wireless networks.
J. Comput. Secur., 2013

Inferring social ties in academic networks using short-range wireless communications.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Inferring social ties in pervasive networks: an on-campus comparative study.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Adaptive information-sharing for privacy-aware mobile social networks.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks.
Proceedings of the Pervasive Computing - 10th International Conference, 2012

Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Meetings through the cloud: Privacy-preserving scheduling on mobile devices.
J. Syst. Softw., 2011

OREN: Optimal revocations in ephemeral networks.
Comput. Networks, 2011

Privacy in Mobile Computing for Location-Sharing-Based Services.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective.
Proceedings of the Computer Security - ESORICS 2011, 2011

Privacy-preserving activity scheduling on mobile devices.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Optimal revocations in ephemeral networks: A game-theoretic framework.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010