Folgen
Ehsan Toreini
Ehsan Toreini
Department of Computer Science, University of Surrey
Bestätigte E-Mail-Adresse bei surrey.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The relationship between trust in AI and trustworthy machine learning technologies
E Toreini, M Aitken, K Coopamootoo, K Elliott, CG Zelaya, A Van Moorsel
Proceedings of the 2020 conference on fairness, accountability, and …, 2020
2692020
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
882018
On the privacy of private browsing–a forensic approach
K Satvat, M Forshaw, F Hao, E Toreini
Journal of Information Security and Applications 19 (1), 88-100, 2014
742014
Simulating the effects of social presence on trust, privacy concerns & usage intentions in automated bots for finance
M Ng, KPL Coopamootoo, E Toreini, M Aitken, K Elliot, A van Moorsel
2020 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2020
672020
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
602016
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices
M Aitken, E Toreini, P Carmichael, K Coopamootoo, K Elliott, ...
Big Data & Society 7 (1), 2053951720908892, 2020
462020
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
332017
Bodies like yours: Enquiring data privacy in Femtech
T Almeida, L Shipp, M Mehrnezhad, E Toreini
Adjunct Proceedings of the 2022 Nordic Human-Computer Interaction Conference …, 2022
212022
How can and would people protect from online tracking?
M Mehrnezhad, K Coopamootoo, E Toreini
Proceedings on Privacy Enhancing Technologies 1, 2021
212021
Vision: too little too late? Do the risks of Femtech already outweigh the benefits?
M Mehrnezhad, L Shipp, T Almeida, E Toreini
Proceedings of the 2022 European Symposium on Usable Security, 145-150, 2022
192022
Technologies for trustworthy machine learning: A survey in a socio-technical context
E Toreini, M Aitken, KPL Coopamootoo, K Elliott, VG Zelaya, P Missier, ...
arXiv preprint arXiv:2007.08911v3, 2020
172020
" I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country
KPL Coopamootoo, M Mehrnezhad, E Toreini
31st USENIX Security Symposium (USENIX Security 22), 287-304, 2022
162022
What is this sensor and does this app need access to it?
M Mehrnezhad, E Toreini
Informatics 6 (1), 7, 2019
162019
An acoustic side channel attack on enigma
E Toreini, B Randell, F Hao
School of Computing Science Technical Report Series, 2015
162015
Anti-counterfeiting for polymer banknotes based on polymer substrate fingerprinting
S Wang, E Toreini, F Hao
IEEE Transactions on Information Forensics and Security 16, 2823-2835, 2021
132021
DOMtegrity: ensuring web page integrity against malicious browser extensions
E Toreini, SF Shahandashti, M Mehrnezhad, F Hao
International Journal of Information Security 18, 801-814, 2019
132019
On secure e-voting over blockchain
P McCorry, M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Digital Threats: Research and Practice (DTRAP) 2 (4), 1-13, 2021
122021
Multiple seimcha: multiple semantic image captcha
M Mehrnejad, AG Bafghi, A Harati, E Toreini
2011 International Conference for Internet Technology and Secured …, 2011
12*2011
Touchsignatures: Identification of user touch actions based on mobile sensors via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
112015
SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations.
M Mehrnejad, AG Bafghi, A Harati, E Toreini
ISeCure 4 (1), 2012
112012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20