default search action
Janne Lindqvist
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Annabel Rothschild, Janne Lindqvist:
Swapping 5G for 3G: Motivations, Experiences, and Implications of Contemporary Dumbphone Adoption. Proc. ACM Hum. Comput. Interact. 8(CSCW1): 1-40 (2024) - [c50]Amel Bourdoucen, Janne Lindqvist:
Privacy of Default Apps in Apple's Mobile Ecosystem. CHI 2024: 786:1-786:32 - [c49]Jaakko Väkevä, Elisa D. Mekler, Janne Lindqvist:
From Disorientation to Harmony: Autoethnographic Insights into Transformative Videogame Experiences. CHI 2024: 808:1-808:20 - [i9]Xin Sun, Rongjun Ma, Xiaochang Zhao, Zhuying Li, Janne Lindqvist, Abdallah El Ali, Jos A. Bosch:
Trusting the Search: Unraveling Human Trust in Health Information from Google and ChatGPT. CoRR abs/2403.09987 (2024) - 2023
- [j12]Amel Bourdoucen, Leysan Nurgalieva, Janne Lindqvist:
Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online Games. Proc. ACM Hum. Comput. Interact. 7(CHI PLAY): 1136-1178 (2023) - [c48]Rongjun Ma, Henrik Lassila, Leysan Nurgalieva, Janne Lindqvist:
When Browsing Gets Cluttered: Exploring and Modeling Interactions of Browsing Clutter, Browsing Habits, and Coping. CHI 2023: 861:1-861:29 - 2022
- [c47]Leysan Nurgalieva, Seamus Ryan, Andreas Balaskas, Janne Lindqvist, Gavin Doherty:
Public Views on Digital COVID-19 Certificates: a Mixed Methods User Study. CHI 2022: 75:1-75:28 - [c46]Siddharth Prakash Rao, Gabriela Limonta, Janne Lindqvist:
Usability and Security of Trusted Platform Module (TPM) Library APIs. SOUPS @ USENIX Security Symposium 2022: 213-232 - [i8]Amel Bourdoucen, Janne Lindqvist:
Systematic Evaluation and User Study of Privacy of Default Apps in Apple's Mobile Ecosystem. CoRR abs/2210.04569 (2022) - 2021
- [p1]Can Liu, Janne Lindqvist:
Secure Gestures - Case Study 4. Intelligent Computing for Interactive System Design 2021: 323-338
2010 – 2019
- 2019
- [j11]Shridatt Sugrim, Can Liu, Janne Lindqvist:
Recruit Until It Fails: Exploring Performance Limits for Identification Systems. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(3): 104:1-104:26 (2019) - [c45]Shridatt Sugrim, Can Liu, Meghan McLean, Janne Lindqvist:
Robust Performance Metrics for Authentication Systems. NDSS 2019 - 2018
- [c44]Xianyi Gao, Yulong Yang, Can Liu, Christos Mitropoulos, Janne Lindqvist, Antti Oulasvirta:
Forgetting of Passwords: Ecological Theory and Data. USENIX Security Symposium 2018: 221-238 - [i7]Can Liu, Shridatt Sugrim, Gradeigh D. Clark, Janne Lindqvist:
Quantifying the Security of Recognition Passwords: Gestures and Signatures. CoRR abs/1812.09410 (2018) - 2017
- [j10]Can Liu, Gradeigh D. Clark, Janne Lindqvist:
Guessing Attacks on User-Generated Gesture Passwords. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(1): 3:1-3:24 (2017) - [j9]Sugang Li, Xiaoran Fan, Yanyong Zhang, Wade Trappe, Janne Lindqvist, Richard E. Howard:
Auto++: Detecting Cars Using Embedded Microphones in Real-Time. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 70:1-70:20 (2017) - [c43]Can Liu, Gradeigh D. Clark, Janne Lindqvist:
Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems. CHI 2017: 374-386 - [c42]Fengpeng Yuan, Xianyi Gao, Janne Lindqvist:
How Busy Are You?: Predicting the Interruptibility Intensity of Mobile Users. CHI 2017: 5346-5360 - [c41]Gradeigh D. Clark, Janne Lindqvist, Antti Oulasvirta:
Composition policies for gesture passwords: User choice, security, usability and memorability. CNS 2017: 1-9 - [c40]Can Liu, Gradeigh D. Clark, Janne Lindqvist:
Demo: Garda - robust gesture-based authentication for mobile systems. UbiComp/ISWC Adjunct 2017: 253-256 - [c39]Aku Visuri, Denzil Ferreira, Susanna Pirttikangas, Vassilis Kostakos, Kåre Synnes, Janne Lindqvist, Yuuki Nishiyama:
UbiMI'17: ubiquitous mobile instrumentation. UbiComp/ISWC Adjunct 2017: 448-451 - [i6]Xianyi Gao, Bernhard Firner, Shridatt Sugrim, Victor Kaiser-Pendergrast, Yulong Yang, Janne Lindqvist:
Transforming Speed Sequences into Road Rays on the Map with Elastic Pathing. CoRR abs/1710.06932 (2017) - 2016
- [c38]Xiaohan Li, Fengpeng Yuan, Janne Lindqvist:
Feasibility of software-based duty cycling of GPS for trajectory-based services. CCNC 2016: 18-26 - [c37]Fengpeng Yuan, Xueyuan Song, Janne Lindqvist:
On my way: Optimizing driving routes for navigation applications. CCNC 2016: 27-31 - [c36]Xianyi Gao, Gradeigh D. Clark, Janne Lindqvist:
Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users. CHI 2016: 1656-1668 - [c35]Yulong Yang, Gradeigh D. Clark, Janne Lindqvist, Antti Oulasvirta:
Free-Form Gesture Authentication in the Wild. CHI 2016: 3722-3735 - [c34]Sugang Li, Xiaoran Fan, Yanyong Zhang, Wade Trappe, Janne Lindqvist, Richard E. Howard:
Bo-ear: unsupervised car sound sensing and tracking using microphones on smartphones. S3@MobiCom 2016: 9-11 - [c33]Gradeigh D. Clark, Swapnil Sarode, Janne Lindqvist:
No time at all: opportunity cost of Android permissions (invited paper). HotWireless@MobiCom 2016: 12-16 - [c32]Sugang Li, Ashwin Ashok, Yanyong Zhang, Chenren Xu, Janne Lindqvist, Marco Gruteser:
Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. PerCom 2016: 1-9 - [c31]Sugang Li, Ashwin Ashok, Yanyong Zhang, Chenren Xu, Janne Lindqvist, Marco Gruteser:
Demo of Headbanger: Authenticating smart wearable devices using unique head movement patterns. PerCom Workshops 2016: 1-3 - 2015
- [j8]Alexander De Luca, Janne Lindqvist:
Is Secure and Usable Smartphone Authentication Asking Too Much? Computer 48(5): 64-68 (2015) - [j7]Bin Guo, Shusen Yang, Janne Lindqvist, Xing Xie, Raghu K. Ganti:
Guest Editorial Special Issue on Mobile Crowd Sensing for IoT. IEEE Internet Things J. 2(5): 355-357 (2015) - [j6]Gradeigh D. Clark, Janne Lindqvist:
Engineering Gesture-Based Authentication Systems. IEEE Pervasive Comput. 14(1): 18-25 (2015) - [j5]Pia Tukkinen, Janne Lindqvist:
Understanding Motivations for Using Grocery Shopping Applications. IEEE Pervasive Comput. 14(4): 38-44 (2015) - [c30]Denzil Ferreira, Vassilis Kostakos, Alastair R. Beresford, Janne Lindqvist, Anind K. Dey:
Securacy: an empirical investigation of Android applications' network usage, privacy and security. WISEC 2015: 11:1-11:11 - [i5]Xianyi Gao, Gradeigh D. Clark, Janne Lindqvist:
Of Two Minds, Multiple Addresses, and One History: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Groups. CoRR abs/1503.02377 (2015) - 2014
- [j4]Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Richard E. Howard, Janne Lindqvist, Predrag Spasojevic, Jeffrey S. Walling:
Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen. IEEE Trans. Mob. Comput. 13(1): 4-19 (2014) - [c29]Rannie Teodoro, Pinar Öztürk, Mor Naaman, Winter A. Mason, Janne Lindqvist:
The motivations and experiences of the on-demand mobile workforce. CSCW 2014: 236-247 - [c28]Yulong Yang, Michael Sherman, Janne Lindqvist:
Disaster mitigation by crowdsourcing hazard documentation. GHTC 2014: 93-98 - [c27]Xianyi Gao, Bernhard Firner, Shridatt Sugrim, Victor Kaiser-Pendergrast, Yulong Yang, Janne Lindqvist:
Elastic pathing: your speed is enough to track you. UbiComp 2014: 975-986 - [c26]Xiruo Liu, Wade Trappe, Janne Lindqvist:
A policy-driven approach to access control in future internet name resolution services. MobiArch 2014: 7-12 - [c25]Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, Teemu Roos:
User-generated free-form gestures for authentication: security and memorability. MobiSys 2014: 176-189 - [c24]Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, Teemu Roos:
Video: User-generated free-form gestures for authentication: security and memorability. MobiSys 2014: 391 - [c23]Jian Liu, Sini Ruohomaa, Kumaripaba Athukorala, Giulio Jacucci, N. Asokan, Janne Lindqvist:
Groupsourcing: nudging users away from unsafe content. NordiCHI 2014: 883-886 - [c22]Xianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist, Yang Wang:
Private Browsing: an Inquiry on Usability and Privacy Protection. WPES 2014: 97-106 - [c21]Huiqing Fu, Janne Lindqvist:
General Area or Approximate Location?: How People Understand Location Permissions. WPES 2014: 117-120 - [i4]Bernhard Firner, Shridatt Sugrim, Yulong Yang, Janne Lindqvist:
Elastic Pathing: Your Speed is Enough to Track You. CoRR abs/1401.0052 (2014) - [i3]Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, Teemu Roos:
User-Generated Free-Form Gestures for Authentication: Security and Memorability. CoRR abs/1401.0561 (2014) - [i2]Yulong Yang, Janne Lindqvist, Antti Oulasvirta:
Text Entry Method Affects Password Security. CoRR abs/1403.1910 (2014) - [i1]Gradeigh D. Clark, Janne Lindqvist:
Engineering Gesture-Based Authentication Systems. CoRR abs/1408.6010 (2014) - 2012
- [c20]Jialiu Lin, Norman M. Sadeh, Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Joy Zhang:
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. UbiComp 2012: 501-510 - [c19]Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Richard E. Howard, Janne Lindqvist, Predrag Spasojevic, Jeffrey S. Walling:
Distinguishing users with capacitive touch communication. MobiCom 2012: 197-208 - [c18]Tam Vu, Ashwin Ashok, Akash Baid, Marco Gruteser, Richard E. Howard, Janne Lindqvist, Predrag Spasojevic, Jeffrey S. Walling:
Demo: user identification and authentication with capacitive touch communication. MobiSys 2012: 483-484 - 2011
- [c17]Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jason I. Hong, John Zimmerman:
I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application. CHI 2011: 2409-2418 - [c16]Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Jialiu Lin, Eran Toch, Norman M. Sadeh:
Caché: caching location-enhanced content to improve user privacy. MobiSys 2011: 197-210 - [c15]Janne Lindqvist, Jason I. Hong:
Undistracted driving: a mobile phone that doesn't distract. HotMobile 2011: 70-75 - 2010
- [j3]Janne Lindqvist, Essi Vehmersalo, Miika Komu, Jukka Manner:
Enterprise Network Packet Filtering for Mobile Cryptographic Identities. Int. J. Handheld Comput. Res. 1(1): 79-94 (2010) - [j2]Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Maladau Mou, Rahul Raheja, Jialiu Lin, Norman M. Sadeh, Eran Toch:
Caché: caching location-enhanced content to improve user privacy. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 19-21 (2010) - [c14]Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, Damon McCoy, Douglas C. Sicker:
Practical Defenses for Evil Twin Attacks in 802.11. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
- [b1]Janne Lindqvist:
Practical privacy enhancing technologies for mobile systems. Helsinki University of Technology, Finland, 2009 - [c13]Miika Komu, Janne Lindqvist:
Leap-of-Faith Security is Enough for IP Mobility. CCNC 2009: 1-5 - [c12]Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe:
Privacy-preserving 802.11 access-point discovery. WISEC 2009: 123-130 - 2008
- [j1]Janne Lindqvist, Pravin Pawar, Erich P. Stuntebeck:
HotMobile 2008: Postconference Report. IEEE Pervasive Comput. 7(4): 80-83 (2008) - [c11]Rafiqul Chowdhury, Andres Arjona, Janne Lindqvist, Antti Ylä-Jääski:
Interconnecting multiple home networks services. ICT 2008: 1-7 - [c10]Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed:
Chattering Laptops. Privacy Enhancing Technologies 2008: 167-186 - [c9]Janne Lindqvist, Juha-Matti Tapio:
Protecting privacy with protocol stack virtualization. WPES 2008: 65-74 - 2007
- [c8]Janne Lindqvist, Miika Komu:
Cure for Spam Over Internet Telephony. CCNC 2007: 896-900 - [c7]Kristiina Karvonen, Janne Lindqvist:
Usability Improvements for WLAN Access. HCI (1) 2007: 549-558 - [c6]Anton Alstes, Janne Lindqvist:
VERKKOKE: learning routing and network programming online. ITiCSE 2007: 91-95 - [c5]Chittaranjan Hota, Janne Lindqvist, Kristiina Karvonen, Antti Ylä-Jääski, C. K. J. Mohan:
Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing. IEEE NAS 2007: 122-132 - 2006
- [c4]Janne Lindqvist, Sanna Liimatainen:
VERKKOKE: online teaching environment for telecommunications software and routing. ITiCSE 2006: 319 - [c3]Janne Lindqvist, Antti Ylä-Jääski, Jukka Manner:
Resilient JPv6 Multicast Address Allocation in Ad Hoc Networks. SECON 2006: 786-791 - [c2]Janne Lindqvist, Sanna Liimatainen, Tuomo Katajamaki:
Secure Pairing Architecture for Wireless Mobile Devices. VTC Spring 2006: 823-827 - [c1]Janne Lindqvist, Laura Takkinen:
Privacy management for secure mobility. WPES 2006: 63-66
Coauthor Index
aka: Gradeigh D. Clark
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint