default search action
Urs Hengartner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Jiayi Chen, Urs Hengartner, Hassan Khan:
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems. Comput. Secur. 137: 103594 (2024) - [j11]Jiayi Chen, Urs Hengartner, Hassan Khan:
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android. ACM Trans. Priv. Secur. 27(2): 17 (2024) - [i8]Andre Kassis, Urs Hengartner:
UnMarker: A Universal Attack on Defensive Watermarking. CoRR abs/2405.08363 (2024) - 2023
- [j10]Sohail Habib, Hassan Khan, Andrew Hamilton-Wright, Urs Hengartner:
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks. ACM Trans. Priv. Secur. 26(2): 21:1-21:30 (2023) - [c61]Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum:
Investigating Membership Inference Attacks under Data Dependencies. CSF 2023: 473-488 - [c60]Andre Kassis, Urs Hengartner:
Breaking Security-Critical Voice Authentication. SP 2023: 951-968 - [i7]Cheng Tang, Diogo Barradas, Urs Hengartner, Yue Hu:
On the Feasibility of Fingerprinting Collaborative Robot Traffic. CoRR abs/2312.06802 (2023) - 2022
- [c59]Jiayi Chen, Urs Hengartner, Hassan Khan:
Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing. SOUPS @ USENIX Security Symposium 2022: 671-685 - [e2]Robert LiKamWa, Urs Hengartner:
HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications, Tempe, Arizona, USA, March 9 - 10, 2022. ACM 2022, ISBN 978-1-4503-9218-1 [contents] - 2021
- [c58]Matthew Rafuse, Urs Hengartner:
PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication. PST 2021: 1-10 - [c57]Jason Ceci, Hassan Khan, Urs Hengartner, Daniel Vogel:
Concerned but Ineffective: User Perceptions, Methods, and Challenges when Sanitizing Old Devices for Disposal. SOUPS @ USENIX Security Symposium 2021: 455-474 - [i6]Andre Kassis, Urs Hengartner:
Practical Attacks on Voice Spoofing Countermeasures. CoRR abs/2107.14642 (2021) - 2020
- [j9]Hassan Khan, Urs Hengartner, Daniel Vogel:
Mimicry Attacks on Smartphone Keystroke Authentication. ACM Trans. Priv. Secur. 23(1): 2:1-2:34 (2020) - [c56]Jiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan:
Chaperone: Real-time Locking and Loss Prevention for Smartphones. USENIX Security Symposium 2020: 325-342
2010 – 2019
- 2019
- [j8]Urs Hengartner:
Searching-Tool für Compliance. HMD Prax. Wirtsch. 56(5): 947-963 (2019) - [c55]Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef:
AppVeto: mobile application self-defense through resource access veto. ACSAC 2019: 366-377 - 2018
- [c54]Hassan Khan, Urs Hengartner, Daniel Vogel:
Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing. CHI 2018: 164 - [c53]Hassan Khan, Urs Hengartner, Daniel Vogel:
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication. MobiSys 2018: 41-53 - 2017
- [c52]Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ian Goldberg:
Live Lesson: Netsim: Network simulation and hacking for high schoolers. ASE @ USENIX Security Symposium 2017 - 2016
- [j7]Sherman S. M. Chow, Urs Hengartner, Joseph K. Liu, Kui Ren:
Special Issue on Security and Privacy in Mobile Clouds. Pervasive Mob. Comput. 28: 100-101 (2016) - [j6]Berker Agir, Kévin Huguenin, Urs Hengartner, Jean-Pierre Hubaux:
On the Privacy Implications of Location Semantics. Proc. Priv. Enhancing Technol. 2016(4): 165-183 (2016) - [c51]Hassan Khan, Urs Hengartner, Daniel Vogel:
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes. MobiSys 2016: 387-398 - [c50]Lalit Agarwal, Hassan Khan, Urs Hengartner:
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones. SOUPS 2016: 221-236 - [c49]Erinn Atwater, Urs Hengartner:
Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices. WISEC 2016: 91-102 - 2015
- [c48]Yihang Song, Urs Hengartner:
PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices. SPSM@CCS 2015: 15-26 - [c47]Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg:
Leading Johnny to Water: Designing for Usability and Trust. SOUPS 2015: 69-88 - [c46]Hassan Khan, Urs Hengartner, Daniel Vogel:
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying. SOUPS 2015: 225-239 - 2014
- [c45]Bisheng Liu, Urs Hengartner:
pTwitterRec: a privacy-preserving personalized tweet recommendation framework. AsiaCCS 2014: 365-376 - [c44]Aaron Atwater, Hassan Khan, Urs Hengartner:
POSTER: When and How to Implicitly Authenticate Smartphone Users. CCS 2014: 1415-1417 - [c43]Hassan Khan, Aaron Atwater, Urs Hengartner:
Itus: an implicit authentication framework for android. MobiCom 2014: 507-518 - [c42]George Roussos, Urs Hengartner, Shin'ichi Konomi, Kay Römer:
TPC welcome welcome message from the technical program chairs. PerCom 2014: 1 - [c41]Hassan Khan, Aaron Atwater, Urs Hengartner:
A Comparative Evaluation of Implicit Authentication Schemes. RAID 2014: 255-275 - [c40]Hassan Khan, Urs Hengartner:
Towards application-centric implicit authentication on smartphones. HotMobile 2014: 10:1-10:6 - [e1]Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro:
2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3502-4 [contents] - [i5]Yihang Song, Madhur Kukreti, Rahul Rawat, Urs Hengartner:
Two Novel Defenses against Motion-Based Keystroke Inference Attacks. CoRR abs/1410.7746 (2014) - 2013
- [c39]Erman Ayday, Jean Louis Raisaro, Urs Hengartner, Adam Molyneaux, Jean-Pierre Hubaux:
Privacy-Preserving Processing of Raw Genomic Data. DPM/SETOP 2013: 133-147 - [c38]Urs Hengartner, Gregor Schiele:
Message from the workshops chairs. PerCom Workshops 2013 - [c37]Bisheng Liu, Urs Hengartner:
Privacy-preserving social recommendations in geosocial networks. PST 2013: 69-76 - 2012
- [j5]Aleksander Essex, Urs Hengartner:
Hover: Trustworthy Elections with Hash-Only Verification. IEEE Secur. Priv. 10(5): 18-24 (2012) - [c36]Aleksander Essex, Urs Hengartner:
Oblivious Printing of Secret Messages in a Multi-party Setting. Financial Cryptography 2012: 359-373 - [c35]Aleksander Essex, Jeremy Clark, Urs Hengartner:
Cobra: Toward Concurrent Ballot Authorization for Internet Voting. EVT/WOTE 2012 - [i4]Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams:
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification. IACR Cryptol. ePrint Arch. 2012: 178 (2012) - 2011
- [c34]Jeremy Clark, Urs Hengartner:
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance. Financial Cryptography 2011: 47-61 - [c33]Qi Xie, Urs Hengartner:
Privacy-preserving matchmaking For mobile social networking secure against malicious users. PST 2011: 252-259 - [c32]Prima Chairunnanda, Nam Pham, Urs Hengartner:
Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns. SocialCom/PASSAT 2011: 974-980 - [c31]Aleksander Essex, Christian Henrich, Urs Hengartner:
Single Layer Optical-Scan Voting with Fully Distributed Trust. VoteID 2011: 122-139 - [c30]Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner:
BridgeSPA: improving Tor bridges with single packet authorization. WPES 2011: 93-102 - [i3]Jeremy Clark, Urs Hengartner:
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance. IACR Cryptol. ePrint Arch. 2011: 166 (2011) - [i2]Aleksander Essex, Christian Henrich, Urs Hengartner:
Single Layer Optical-scan Voting with Fully Distributed Trust. IACR Cryptol. ePrint Arch. 2011: 568 (2011) - 2010
- [j4]Stephan Gillmeier, Urs Hengartner, Sandro Pedrazzini:
Wie man mit der Wikipedia semantische Verfahren verbessern kann. HMD Prax. Wirtsch. 271: 70-80 (2010) - [c29]Wanying Luo, Urs Hengartner:
VeriPlace: a privacy-aware location proof architecture. GIS 2010: 23-32 - [c28]Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg, Urs Hengartner:
Achieving Efficient Query Privacy for Location Based Services. Privacy Enhancing Technologies 2010: 93-110 - [c27]Jeremy Clark, Urs Hengartner:
On the Use of Financial Data as a Random Beacon. EVT/WOTE 2010 - [c26]Wanying Luo, Urs Hengartner:
Proving your location without giving up your privacy. HotMobile 2010: 7-12 - [i1]Jeremy Clark, Urs Hengartner:
On the Use of Financial Data as a Random Beacon. IACR Cryptol. ePrint Arch. 2010: 361 (2010)
2000 – 2009
- 2009
- [c25]Wanying Luo, Qi Xie, Urs Hengartner:
FaceCloak: An Architecture for User Privacy on Social Networking Sites. CSE (3) 2009: 26-33 - [c24]Ge Zhong, Urs Hengartner:
A Distributed k-Anonymity Protocol for Location Privacy. PerCom 2009: 1-10 - [c23]Jeremy Clark, Urs Hengartner, Kate Larson:
Not-So Hidden Information: Optimal Contracts for Undue Influence in E2E Voting Systems. VoteID 2009: 1-17 - 2008
- [c22]Sumair Ur Rahman, Urs Hengartner, Usman Ismail, Srinivasan Keshav:
Practical security for rural internet kiosks. NSDR 2008: 13-18 - [c21]Urs Hengartner:
Location privacy based on trusted computing and secure logging. SecureComm 2008: 16 - [c20]Jeremy Clark, Urs Hengartner:
Panic Passwords: Authenticating under Duress. HotSec 2008 - [c19]Ge Zhong, Urs Hengartner:
Toward a distributed k-anonymity protocol for location privacy. WPES 2008: 33-38 - 2007
- [c18]Allan Caine, Urs Hengartner:
The AI Hardness of CAPTCHAs does not imply Robust Network Security. IFIPTM 2007: 367-382 - [c17]Urs Hengartner:
Hiding Location Information from Location-Based Services. MDM 2007: 268-272 - [c16]Urs Hengartner, Ge Zhong:
Distributed, Uncertainty-Aware Access Control for Pervasive Computing. PerCom Workshops 2007: 241-246 - [c15]Ge Zhong, Ian Goldberg, Urs Hengartner:
Louis, Lester and Pierre: Three Protocols for Location Privacy. Privacy Enhancing Technologies 2007: 62-76 - [c14]Sumair Ur Rahman, Urs Hengartner:
Secure crash reporting in vehicular Ad hoc networks. SecureComm 2007: 443-452 - [c13]Aniket Kate, Gregory M. Zaverucha, Urs Hengartner:
Anonymity and security in delay tolerant networks. SecureComm 2007: 504-513 - 2006
- [j3]Urs Hengartner, Peter Steenkiste:
Exploiting information relationships for access control in pervasive computing. Pervasive Mob. Comput. 2(3): 344-367 (2006) - [j2]Urs Hengartner, Peter Steenkiste:
Avoiding privacy violations caused by context-sensitive services. Pervasive Mob. Comput. 2(4): 427-452 (2006) - [c12]Urs Hengartner, Peter Steenkiste:
Avoiding Privacy Violations Caused by Context-Sensitive Services. PerCom 2006: 222-233 - [c11]Urs Hengartner, Peter Steenkiste:
Securing Information Gateways with Derivation-Constrained Access Control. SPC 2006: 181-195 - 2005
- [j1]Urs Hengartner, Peter Steenkiste:
Access control to people location information. ACM Trans. Inf. Syst. Secur. 8(4): 424-456 (2005) - [c10]Urs Hengartner, Peter Steenkiste:
Exploiting Information Relationships for Access Control. PerCom 2005: 269-278 - [c9]Urs Hengartner, Peter Steenkiste:
Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. SecureComm 2005: 384-396 - 2004
- [c8]Urs Hengartner, Peter Steenkiste:
Implementing access control to people location information. SACMAT 2004: 11-20 - 2003
- [c7]Urs Hengartner, Peter Steenkiste:
Access Control to Information in Pervasive Computing Environments. HotOS 2003: 157-162 - [c6]Urs Hengartner, Peter Steenkiste:
Protecting Access to People Location Information. SPC 2003: 25-38 - 2002
- [c5]Urs Hengartner, Sue B. Moon, Richard Mortier, Christophe Diot:
Detection and analysis of routing loops in packet traces. Internet Measurement Workshop 2002: 107-112 - 2001
- [c4]Andy Myers, John Chuang, Urs Hengartner, Yinglian Xie, Weiqiang Zhuang, Hui Zhang:
A Secure, Publisher-Centric Web Caching Infrastructure. INFOCOM 2001: 1235-1243 - 2000
- [c3]Urs Hengartner, Jürg Bolliger, Thomas R. Gross:
TCP Vegas Revisited. INFOCOM 2000: 1546-1555 - [c2]Urs Hengartner, Elisabeth Maier, Christos Kefos, Lutz Richter, Reinhard Riedl, Martina Klose, Ulrike Lechner, Olga Miler, Beat F. Schmid:
Organization on intranet - An agent based approach. IRMA Conference 2000: 316-319
1990 – 1999
- 1999
- [c1]Jürg Bolliger, Thomas R. Gross, Urs Hengartner:
Bandwidth Modeling for Network-Aware Applications. INFOCOM 1999: 1300-1309 - 1997
- [b1]Urs Hengartner:
Entwurf eines integrierten Informations-, Verwaltungs- und Retrieval-Systems für textuelle Daten. University of Basel, Lang 1997, ISBN 3-906757-13-7, pp. 1-201
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint