Follow
Iulia Ion
Iulia Ion
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices
I Ion, R Reeder, S Consolvo
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 327-346, 2015
2912015
Home is safer than the cloud! Privacy concerns for consumer cloud storage
I Ion, N Sachdeva, P Kumaraguru, S Čapkun
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
2282011
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1762010
In search of an internet of things service architecture: REST or WS-*? A developers’ perspective
D Guinard, I Ion, S Mayer
International Conference on Mobile and Ubiquitous Systems: Computing …, 2011
1612011
" My religious aunt asked why i was trying to sell her viagra" experiences with account hijacking
R Shay, I Ion, RW Reeder, S Consolvo
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
732014
152 simple steps to stay safe online: Security advice for non-tech-savvy users
RW Reeder, I Ion, S Consolvo
IEEE Security & Privacy 15 (5), 55-64, 2017
712017
Influence of user perception, security needs, and social factors on device pairing method choices
I Ion, M Langheinrich, P Kumaraguru, S Čapkun
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
632010
Expert and {Non-Expert} Attitudes towards (Secure) Instant Messaging
A De Luca, S Das, M Ortlieb, I Ion, B Laurie
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 147-157, 2016
562016
Extending the java virtual machine to enforce fine-grained security policies in mobile devices
I Ion, B Dragovic, B Crispo
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
512007
For some eyes only: protecting online information sharing
F Beato, I Ion, S Čapkun, B Preneel, M Langheinrich
Proceedings of the third ACM conference on Data and application security and …, 2013
382013
UACAP: A unified auxiliary channel authentication protocol
R Mayrhofer, J Fuß, I Ion
IEEE Transactions on Mobile Computing 12 (4), 710-721, 2012
282012
MTrainSchedule: Combining Web Services and Data Caching on Mobile Devices.
I Ion, A Caracas, H Höpfner
Datenbank-Spektrum 7 (21), 51-53, 2007
122007
Don’t trust POS terminals! Verify in-shop payments with your phone
I Ion, B Dragovic
Proceedings of SMPU 8, 2010
112010
Apples and oranges: Detecting least-privilege violators with peer group analysis
S Jana, Ú Erlingsson, I Ion
arXiv preprint arXiv:1510.07308, 2015
72015
OpenUAT: The open source ubiquitous authentication toolkit
R Mayrhofer, I Ion
Technical Report/ETH Zurich, Department of Computer Science 657, 2010
62010
Towards Java-based Data Caching for Mobile Information System Clients.
A Caracas, I Ion, M Ion, H Höpfner
MMS, 97-101, 2007
62007
Access control for home data sharing: evaluating social acceptability.
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
CHI, 645-654, 2010
52010
Web Services and Data Caching for Java Mobile Clients.
A Caracas, I Ion, M Ion
BTW Studierendenprogramm, 10-12, 2007
42007
User-centered security mechanisms for protecting information sharing in the cloud
I Ion
ETH Zurich, 2012
32012
Privacy and Trust in the Ubiquitous Information Society
M Friedewald, T Leimbach, D Wright, S Gutwirth, P De Hert, ...
Final Study Report (D4), prepared for the European Commission, DG INFSO 27, 2009
22009
The system can't perform the operation now. Try again later.
Articles 1–20