Follow
Iulia Ion
Iulia Ion
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
“... no one can hack my mind”: Comparing Expert and Non-Expert Security Practices
I Ion, R Reeder, S Consolvo
2982015
Home is safer than the cloud! Privacy concerns for consumer cloud storage
I Ion, N Sachdeva, P Kumaraguru, S Čapkun
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
2312011
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1792010
In search of an internet of things service architecture: Rest or ws-*? a developers’ perspective
D Guinard, I Ion, S Mayer
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th …, 2012
1632012
" My religious aunt asked why i was trying to sell her viagra" experiences with account hijacking
R Shay, I Ion, RW Reeder, S Consolvo
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
762014
152 simple steps to stay safe online: Security advice for non-tech-savvy users
RW Reeder, I Ion, S Consolvo
IEEE Security & Privacy 15 (5), 55-64, 2017
732017
Influence of user perception, security needs, and social factors on device pairing method choices
I Ion, M Langheinrich, P Kumaraguru, S Čapkun
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
642010
Expert and non-expert attitudes towards (secure) instant messaging
A De Luca, S Das, M Ortlieb, I Ion, B Laurie
572016
Extending the java virtual machine to enforce fine-grained security policies in mobile devices
I Ion, B Dragovic, B Crispo
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
512007
For some eyes only: protecting online information sharing
F Beato, I Ion, S Čapkun, B Preneel, M Langheinrich
Proceedings of the third ACM conference on Data and application security and …, 2013
382013
UACAP: A unified auxiliary channel authentication protocol
R Mayrhofer, J Fuß, I Ion
IEEE Transactions on Mobile Computing 12 (4), 710-721, 2012
302012
Don’t trust POS terminals! Verify in-shop payments with your phone
I Ion, B Dragovic
Proceedings of SMPU 8, 2010
112010
MTrainSchedule: Combining Web Services and Data Caching on Mobile Devices.
I Ion, A Caracas, H Höpfner
Datenbank-Spektrum 7 (21), 51-53, 2007
112007
Apples and oranges: Detecting least-privilege violators with peer group analysis
S Jana, Ú Erlingsson, I Ion
arXiv preprint arXiv:1510.07308, 2015
72015
OpenUAT: The open source ubiquitous authentication toolkit
R Mayrhofer, I Ion
Technical Report/ETH Zurich, Department of Computer Science 657, 2010
62010
Towards Java-based Data Caching for Mobile Information System Clients
A Caracas, I Ion, M Ion, H Höpfner
MMS 2007: Mobilität und mobile informationssysteme–2nd conference of GI …, 2007
62007
Access control for home data sharing: evaluating social acceptability.
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
CHI, 645-654, 2010
52010
Web Services and Data Caching for Java Mobile Clients.
A Caracas, I Ion, M Ion
BTW Studierendenprogramm, 10-12, 2007
42007
User-centered security mechanisms for protecting information sharing in the cloud
I Ion
ETH Zurich, 2012
32012
Privacy and Trust in the Ubiquitous Information Society: Analysis of the impact of convergent and pervasive ICT on privacy and data protection and needs and options for …
M Friedewald, T Leimbach, D Wright, S Gutwirth, P De Hert, GG Fuster, ...
EU bookshop-Publication Office of the EU, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20