Follow
Iulia Ion
Iulia Ion
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices
I Ion, R Reeder, S Consolvo
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 327-346, 2015
3562015
Home is safer than the cloud! Privacy concerns for consumer cloud storage
I Ion, N Sachdeva, P Kumaraguru, S Čapkun
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
2392011
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1792010
In search of an internet of things service architecture: Rest or ws-*? a developers’ perspective
D Guinard, I Ion, S Mayer
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th …, 2012
1642012
152 simple steps to stay safe online: Security advice for non-tech-savvy users
RW Reeder, I Ion, S Consolvo
IEEE Security & Privacy 15 (5), 55-64, 2017
1062017
" My religious aunt asked why i was trying to sell her viagra" experiences with account hijacking
R Shay, I Ion, RW Reeder, S Consolvo
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
842014
Expert and {Non-Expert} attitudes towards (secure) instant messaging
A De Luca, S Das, M Ortlieb, I Ion, B Laurie
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 147-157, 2016
722016
Influence of user perception, security needs, and social factors on device pairing method choices
I Ion, M Langheinrich, P Kumaraguru, S Čapkun
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
682010
Extending the java virtual machine to enforce fine-grained security policies in mobile devices
I Ion, B Dragovic, B Crispo
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
502007
For some eyes only: protecting online information sharing
F Beato, I Ion, S Čapkun, B Preneel, M Langheinrich
Proceedings of the third ACM conference on Data and application security and …, 2013
382013
UACAP: A unified auxiliary channel authentication protocol
R Mayrhofer, J Fuß, I Ion
IEEE Transactions on Mobile Computing 12 (4), 710-721, 2012
312012
MTrainSchedule: Combining Web Services and Data Caching on Mobile Devices.
I Ion, A Caracas, H Höpfner
Datenbank-Spektrum 7 (21), 51-53, 2007
122007
Don’t trust POS terminals! Verify in-shop payments with your phone
I Ion, B Dragovic
Proceedings of SMPU 8, 2010
112010
Apples and oranges: Detecting least-privilege violators with peer group analysis
S Jana, Ú Erlingsson, I Ion
arXiv preprint arXiv:1510.07308, 2015
72015
Mobile and Ubiquitous Systems: Computing, Networking, and Services
D Guinard, I Ion, S Mayer
Springer, 2011
62011
OpenUAT: The open source ubiquitous authentication toolkit
R Mayrhofer, I Ion
Technical Report/ETH Zurich, Department of Computer Science 657, 2010
62010
Towards Java-based Data Caching for Mobile Information System Clients
A Caracas, I Ion, M Ion, H Höpfner
Gesellschaft für Informatik e. V., 2007
62007
Access control for home data sharing: evaluating social acceptability.
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
CHI, 645-654, 2010
52010
Privacy and Trust in the Ubiquitous Information Society: Analysis of the impact of convergent and pervasive ICT on privacy and data protection and needs and options for …
M Friedewald, T Leimbach, D Wright, S Gutwirth, P De Hert, GG Fuster, ...
EU bookshop-Publication Office of the EU, 2013
42013
Web Services and Data Caching for Java Mobile Clients.
A Caracas, I Ion, M Ion
BTW Studierendenprogramm, 10-12, 2007
42007
The system can't perform the operation now. Try again later.
Articles 1–20