Urs Hengartner

Orcid: 0000-0001-8052-2033

According to our database1, Urs Hengartner authored at least 76 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems.
Comput. Secur., February, 2024

2023
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks.
ACM Trans. Priv. Secur., May, 2023

On the Feasibility of Fingerprinting Collaborative Robot Traffic.
CoRR, 2023

Breaking Security-Critical Voice Authentication.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Investigating Membership Inference Attacks under Data Dependencies.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2021
Practical Attacks on Voice Spoofing Countermeasures.
CoRR, 2021

Concerned but Ineffective: User Perceptions, Methods, and Challenges when Sanitizing Old Devices for Disposal.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
Mimicry Attacks on Smartphone Keystroke Authentication.
ACM Trans. Priv. Secur., 2020

Chaperone: Real-time Locking and Loss Prevention for Smartphones.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Searching-Tool für Compliance.
HMD Prax. Wirtsch., 2019

AppVeto: mobile application self-defense through resource access veto.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Live Lesson: Netsim: Network simulation and hacking for high schoolers.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

2016
On the Privacy Implications of Location Semantics.
Proc. Priv. Enhancing Technol., 2016

Special Issue on Security and Privacy in Mobile Clouds.
Pervasive Mob. Comput., 2016

Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

2015
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Leading Johnny to Water: Designing for Usability and Trust.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
Two Novel Defenses against Motion-Based Keystroke Inference Attacks.
CoRR, 2014

Towards application-centric implicit authentication on smartphones.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

A Comparative Evaluation of Implicit Authentication Schemes.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

TPC welcome welcome message from the technical program chairs.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

Itus: an implicit authentication framework for android.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

pTwitterRec: a privacy-preserving personalized tweet recommendation framework.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

POSTER: When and How to Implicitly Authenticate Smartphone Users.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Privacy-preserving social recommendations in geosocial networks.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Message from the workshops chairs.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Privacy-Preserving Processing of Raw Genomic Data.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
Hover: Trustworthy Elections with Hash-Only Verification.
IEEE Secur. Priv., 2012

Eperio: Mitigating Technical Complexity in Cryptographic Election Verification.
IACR Cryptol. ePrint Arch., 2012

Cobra: Toward Concurrent Ballot Authorization for Internet Voting.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

Oblivious Printing of Secret Messages in a Multi-party Setting.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Single Layer Optical-scan Voting with Fully Distributed Trust.
IACR Cryptol. ePrint Arch., 2011

Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance.
IACR Cryptol. ePrint Arch., 2011

BridgeSPA: improving Tor bridges with single packet authorization.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Privacy-preserving matchmaking For mobile social networking secure against malicious users.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

2010
On the Use of Financial Data as a Random Beacon.
IACR Cryptol. ePrint Arch., 2010

Wie man mit der Wikipedia semantische Verfahren verbessern kann.
HMD Prax. Wirtsch., 2010

Proving your location without giving up your privacy.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

Achieving Efficient Query Privacy for Location Based Services.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

VeriPlace: a privacy-aware location proof architecture.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

2009
Not-So Hidden Information: Optimal Contracts for Undue Influence in E2E Voting Systems.
Proceedings of the E-Voting and Identity, Second International Conference, 2009

A Distributed k-Anonymity Protocol for Location Privacy.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

FaceCloak: An Architecture for User Privacy on Social Networking Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Toward a distributed k-anonymity protocol for location privacy.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Panic Passwords: Authenticating under Duress.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Location privacy based on trusted computing and secure logging.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Practical security for rural internet kiosks.
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions, 2008

2007
Secure crash reporting in vehicular Ad hoc networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Anonymity and security in delay tolerant networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Louis, Lester and Pierre: Three Protocols for Location Privacy.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Distributed, Uncertainty-Aware Access Control for Pervasive Computing.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Hiding Location Information from Location-Based Services.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

The AI Hardness of CAPTCHAs does not imply Robust Network Security.
Proceedings of the Trust Management, 2007

2006
Avoiding privacy violations caused by context-sensitive services.
Pervasive Mob. Comput., 2006

Exploiting information relationships for access control in pervasive computing.
Pervasive Mob. Comput., 2006

Securing Information Gateways with Derivation-Constrained Access Control.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

2005
Access control to people location information.
ACM Trans. Inf. Syst. Secur., 2005

Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Exploiting Information Relationships for Access Control.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

2004
Implementing access control to people location information.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

2003
Protecting Access to People Location Information.
Proceedings of the Security in Pervasive Computing, 2003

Access Control to Information in Pervasive Computing Environments.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003

2002
Detection and analysis of routing loops in packet traces.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002

2001
A Secure, Publisher-Centric Web Caching Infrastructure.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

2000
Organization on intranet - An agent based approach.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

TCP Vegas Revisited.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1999
Bandwidth Modeling for Network-Aware Applications.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

1997
Entwurf eines integrierten Informations-, Verwaltungs- und Retrieval-Systems für textuelle Daten.
PhD thesis, 1997


  Loading...