Now showing items 1-5 of 5

    • Detecting Vulnerable JavaScript Libraries in Hybrid Android Applications 

      Volodin, Nikita (University of Waterloo, 2019-02-15)
      Smartphone devices are very popular. There are a lot of devices being sold, a lot of applications that are created and a lot of people using those applications. However, mobile applications could only be created in the ...
    • Evaluating Re-authentication Strategies for Smartphones 

      Agarwal, Lalit (University of Waterloo, 2016-08-04)
      Re-authenticating users may be necessary for smartphone authentication schemes that leverage user behavior, device context, or task sensitivity. However, due to the unpredictable nature of re-authentication, users may get ...
    • Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios 

      Khan, Hassan (University of Waterloo, 2016-08-10)
      Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication mechanisms (such as PINs, passwords, and fingerprint- ...
    • PUPy: A Generalized, Optimistic Context Detection Framework 

      Rafuse, Matthew (University of Waterloo, 2021-04-28)
      In modern life, the usage of smart devices like smartphones and laptops that allow for access to information, communication with friends and colleagues and other indispensable services has become ubiquitous. People have ...
    • Quantifying Location Privacy In Location-based Services 

      Liu, Peiyuan (University of Waterloo, 2018-10-24)
      Mobile devices (e.g., smart phones) are widely used in people's daily lives. When users rely on location-based services in mobile applications, plenty of location records are exposed to the service providers. This causes ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages