Ildar Muslukhov

According to our database1, Ildar Muslukhov authored at least 17 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Towards Understanding the Link Between Age and Smartphone Authentication.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Source Attribution of Cryptographic API Misuse in Android Applications.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2016
Decoupling data-at-rest encryption and smartphone locking with wearable devices.
Pervasive Mob. Comput., 2016

Android users in the wild: Their authentication and usage behavior.
Pervasive Mob. Comput., 2016

Advancing the Understanding of Android Unlocking and Usage.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Snooping on Mobile Phones: Prevalence and Trends.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

2015
On the Impact of Touch ID on iPhone Passcodes.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

2014
Workshop on inconspicuous interaction.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model.
ACM Trans. Internet Techn., 2013

Design and analysis of a social botnet.
Comput. Networks, 2013

Know your enemy: the risk of unauthorized access in smartphones by insiders.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Does my password go up to eleven?: the impact of password meters on password selection.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Key Challenges in Defending Against Malicious Socialbots.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

Understanding Users' Requirements for Data Protection in Smartphones.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

2011
What makes users refuse web single sign-on?: an empirical investigation of OpenID.
Proceedings of the Symposium On Usable Privacy and Security, 2011

OpenID-enabled browser: towards usable and secure web single sign-on.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

The socialbot network: when bots socialize for fame and money.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011


  Loading...