Janne Lindqvist

Janne Lindqvist

Associate Professor and Head of Department of Computer Science

  • Phone+358503239016
20052023

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2023

    When Browsing Gets Cluttered: Exploring and Modeling Interactions of Browsing Clutter, Browsing Habits, and Coping

    Ma, R., Lassila, H., Nurgalieva, L. & Lindqvist, J., Apr 2023, CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. ACM, 20 p. 861

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    15 Downloads (Pure)
  • 2022

    Public Views on Digital COVID-19 Certificates: a Mixed Methods User Study

    Nurgalieva, L., Ryan, S., Balaskas, A., Lindqvist, J. & Doherty, G., 29 Apr 2022, CHI 2022 - Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. ACM, 75

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    59 Downloads (Pure)
  • Usability and Security of Trusted Platform Module (TPM) Library APIs

    Rao, S. P., Limonta, G. & Lindqvist, J., 2022, Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022. USENIX -The Advanced Computing Systems Association, p. 213-232 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    30 Downloads (Pure)
  • 2019

    Robust Performance Metrics for Authentication Systems

    Sugrim, S., Liu, C., McLean, M. & Lindqvist, J., 2019, 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • 2018

    Forgetting of passwords: Ecological theory and data

    Gao, X., Yang, Y., Liu, C., Mitropoulos, C., Lindqvist, J. & Oulasvirta, A., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX -The Advanced Computing Systems Association, p. 221-238

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    237 Downloads (Pure)
  • 2017

    Composition policies for gesture passwords: User choice, security, usability and memorability

    Clark, G., Lindqvist, J. & Oulasvirta, A., 2017, 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, 9 p. (IEEE Conference on Communications and Network Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    190 Downloads (Pure)
  • Demo: Garda - Robust Gesture-Based Authentication for Mobile Systems

    Liu, C., Clark, G. D. & Lindqvist, J., 2017, Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers. New York, NY, USA: ACM, p. 253–256 (UbiComp ’17).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • How busy are you? Predicting the interruptibility intensity of mobile users

    Yuan, F., Gao, X. & Lindqvist, J., 2 May 2017, CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire. ACM, p. 5346-5360 15 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2017-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    45 Citations (Scopus)
  • UbiMI'17: Ubiquitous mobile instrumentation

    Visuri, A., Ferreira, D., Pirttikangas, S., Kostakos, V., Synnes, K., Lindqvist, J. & Nishiyama, Y., 11 Sept 2017, UbiComp/ISWC 2017 - Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers. ACM, p. 448-451 4 p. (UbiComp/ISWC 2017 - Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Where usability and security go hand-in-hand: Robust gesture-based authentication for mobile systems

    Liu, C., Clark, G. D. & Lindqvist, J., 2 May 2017, CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire. ACM, p. 374-386 13 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2017-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    13 Citations (Scopus)
  • 2016

    BO-Ear: Unsupervised car sound sensing and tracking using microphones on smartphones

    Li, S., Fan, X., Zhang, Y., Trappe, W., Lindqvist, J. & Howard, R., 3 Oct 2016, Proceedings of the 8th Wireless of the Students, by the Students, and for the Students Workshop, S3. ACM, p. 9-11 3 p. 2987362. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM; vol. 03-07-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Demo of Headbanger: Authenticating smart wearable devices using unique head movement patterns

    Li, S., Ashok, A., Zhang, Y., Xu, C., Lindqvist, J. & Gruteser, M., 19 Apr 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016. IEEE, 7457076. (2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    23 Citations (Scopus)
  • Feasibility of software-based duty cycling of GPS for trajectory-based services

    Li, X., Yuan, F. & Lindqvist, J., 30 Mar 2016, 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016. IEEE, p. 18-26 9 p. 7444725. (2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Free-form gesture authentication in the wild

    Yang, Y., Clark, G., Lindqvist, J. & Oulasvirta, A., 2016, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI). ACM, p. 3722-3735 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    31 Citations (Scopus)
  • No time at all: Opportunity cost of android permissions (invited paper)

    Clark, G. D., Sarode, S. & Lindqvist, J., 3 Oct 2016, Proceedings of the 3rd Workshop on Hot Topics in Wireless, HotWireless 2016. ACM, p. 12-16 5 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    3 Citations (Scopus)
  • Of two minds, multiple addresses, and one ledger: Characterizing opinions, knowledge, and perceptions of Bitcoin across users and non-users

    Gao, X., Clark, G. D. & Lindqvist, J., 7 May 2016, CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems. ACM, p. 1656-1668 13 p. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    50 Citations (Scopus)
  • On my way: Optimizing driving routes for navigation applications

    Yuan, F., Song, X. & Lindqvist, J., 30 Mar 2016, 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016. IEEE, p. 27-31 5 p. 7444726. (2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns

    Li, S., Ashok, A., Zhang, Y., Xu, C., Lindqvist, J. & Gruteser, M., 19 Apr 2016, 2016 IEEE International Conference on Pervasive Computing and Communications, PerCom 2016. IEEE, 7456514. (2016 IEEE International Conference on Pervasive Computing and Communications, PerCom 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    48 Citations (Scopus)
  • 2015

    Securacy: An empirical investigation of android applications' network usage, privacy and security

    Ferreira, D., Kostakos, V., Beresford, A. R., Lindqvist, J. & Dey, A. K., 22 Jun 2015, Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015. ACM, a11. (Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    41 Citations (Scopus)
  • 2014

    A field study of run-time location access disclosures on android smartphones

    Fu, H., Yang, Y., Shingte, N., Lindqvist, J. & Gruteser, M., 2014, Workshop on Usable Security. Internet Society, Vol. 14. (Proc. USEC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • A policy-driven approach to access control in future internet name resolution services

    Liu, X., Trappe, W. & Lindqvist, J., 11 Sept 2014, MobiArch 2014 - Proceedings of the 9th ACM MobiCom Workshop on Mobility in the Evolving Internet Architecture. ACM, p. 7-12 6 p. (MobiArch 2014 - Proceedings of the 9th ACM MobiCom Workshop on Mobility in the Evolving Internet Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Disaster mitigation by crowdsourcing hazard documentation

    Yang, Y., Sherman, M. & Lindqvist, J., 1 Dec 2014, Proceedings of the 4th IEEE Global Humanitarian Technology Conference, GHTC 2014. IEEE, p. 93-98 6 p. 6970266. (Proceedings of the 4th IEEE Global Humanitarian Technology Conference, GHTC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Elastic pathing: Your speed is enough to track you

    Gao, X., Firner, B., Sugrim, S., Kaiser-Pendergrast, V., Yang, Y. & Lindqvist, J., 1 Jan 2014, UbiComp 2014 - Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, p. 975-986 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    55 Citations (Scopus)
  • General area or approximate location? How people understand location permissions

    Fu, H. & Lindqvist, J., 3 Nov 2014, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 117-120 4 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Groupsourcing: Nudging users away from unsafe content

    Liu, J., Jacucci, G., Ruohomaa, S., Asokan, N., Athukorala, K. & Lindqvist, J., 26 Oct 2014, Proceedings of the NordiCHI 2014: The 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational. ACM, p. 883-886 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Private browsing: An inquiry on usability and privacy protection

    Gao, X., Yang, Y., Fu, H., Lindqvist, J. & Wang, Y., 3 Nov 2014, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 97-106 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Should I protect you? Understanding developers’ behavior to privacy-preserving APIs

    Jain, S. & Lindqvist, J., 2014, Workshop on Usable Security (USEC’14).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • The motivations and experiences of the on-demand mobile workforce

    Teodoro, R., Ozturk, P., Naaman, M., Mason, W. & Lindqvist, J., 1 Jan 2014, CSCW 2014 - Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, p. 236-247 12 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    76 Citations (Scopus)
  • User-generated free-form gestures for authentication: Security and memorability

    Sherman, M., Clark, G., Yang, Y., Sugrim, S., Modig, A., Lindqvist, J., Oulasvirta, A. & Roos, T., 2014, MobiSys 2014 - Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services. ACM, p. 176-189 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    81 Citations (Scopus)
  • 2012

    Distinguishing users with capacitive touch communication

    Vu, T., Baid, A., Gao, S., Gruteser, M., Howard, R., Lindqvist, J., Spasojevic, P. & Walling, J., 28 Sept 2012, MobiCom'12 - Proceedings of the 18th Annual International Conference on Mobile Computing and Networking. p. 197-208 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    57 Citations (Scopus)
  • Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing

    Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J. & Zhang, J., 19 Oct 2012, UbiComp'12 - Proceedings of the 2012 ACM Conference on Ubiquitous Computing. p. 501-510 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    337 Citations (Scopus)
  • 2011

    Caché: Caching location-enhanced content to improve user privacy

    Amini, S., Lindqvist, J., Hong, J., Lin, J., Toch, E. & Sadeh, N., 8 Aug 2011, MobiSys'11 - Compilation Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services and Co-located Workshops. p. 197-209 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    53 Citations (Scopus)
  • I’m the mayor of my house: Examining why people use foursquare-- a social--driven location sharing application

    Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J. & Zimmerman, J., 13 Jun 2011, CHI 2011 - 29th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings and Extended Abstracts. ACM, p. 2409-2418 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    273 Citations (Scopus)
  • Undistracted driving: A mobile phone that doesn't distract

    Lindqvist, J. & Hong, J., 1 Dec 2011, HotMobile 2011: The 12th Workshop on Mobile Computing Systems and Applications. p. 70-75 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    36 Citations (Scopus)
  • 2010

    Practical defenses for evil twin attacks in 802.11

    Gonzales, H., Bauer, K., Lindqvist, J., McCoy, D. & Sicker, D., 1 Dec 2010, 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 5684213

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    32 Citations (Scopus)
  • 2009

    Leap-of-Faith Security is Enough for IP Mobility

    Komu, M. & Lindqvist, J., 2009, The 6th Annual IEEE Consumer Communications & Networking Conference IEEE CCNC 2009, Las Vegas, Nevada, January 2009.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Privacy-preserving 802.11 access-point discovery

    Lindqvist, J., Aura, T., Danezis, G., Koponen, T., Myllyniemi, A., Mäki, J. & Roe, M., 2009, ACM conference on Wireless network security (WiSec). David Basin, S. C. (ed.). New York, NY, USA: ACM, p. 123-130

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    31 Citations (Scopus)
  • 2008

    Accessible Voice CAPTCHAs for Internet Telephony

    Markkola, A. & Lindqvist, J., 2008, The Symposium on Accessible Privacy and Security (SOAPS '08), July 23, 2008, Pittsburgh, PA, USA.. Pittsburgh, PA, USA, p. -

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Chattering Laptops

    Aura, T., Lindqvist, J., Roe, M. & Mohammed, A., 2008, 8th Privacy Enhancing Technologies Symposium (PETS) Leuven, Belgium, July 23-25, 2008.. Springer Berlin / Heidelberg, Germany: Springer Gabler , p. 167-186

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Interconnecting Multiple Home Networks Services

    Chowdhury, R., Arjona, A., Lindqvist, J. & Ylä-Jääski, A., 2008, 15th International Conference in Telecommunications, ICT 08, June 16-19, 2008, St. Petersburg, Russia. p. 1-7

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Protecting Privacy with Protocol Stack Virtualization

    Lindqvist, J. & Tapio, J-M., 2008, 7th ACM CCS Workshop on Privacy in Electronic Society - WPES 2008, Alexandria, Virginia, USA, October 27th, 2008. New York, NY, USA, p. 65-74

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    7 Citations (Scopus)
  • 2007

    Cure for Spam over Internet Telephony

    Lindqvist, J. & Komu, M., 2007, The 4th IEEE Consumer Communications and Networking Conference - IEEE CCNC 2007, Las Vegas, USA, 11-13 January 2007.. IEEE, p. 896-900

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    17 Citations (Scopus)
  • Privacy in Networked Mobile Device Configuration

    Lindqvist, J., 2007, Doctoral Colloquium at the 9th International Conference on Ubiquitous Computing (UbiComp 2007-DC), September 16, 2007, Innsbruck, Austria.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing

    Hota, C., Lindqvist, J., Karvonen, K., Ylä-Jääski, A. & Mohan, C., 2007, IEEE International Conference on Communications and Networking in China (Chinacom 2007), Shanghai, China, 22-24 August 2007. IEEE, p. 1-5

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Usability Improvements for WLAN Access

    Karvonen, K. & Lindqvist, J., 2007, 12th International Conference on Human-Computer Interaction (HCI International 2007), 22-27.7.2007, Beijing, China, (Human-Computer Interaction, Part I, HCII 2007). p. 549-558

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • VERKKOKE: Learning Routing and Network Programming Online

    Alstes, A. & Lindqvist, J., 2007, 12th Annual Conference on Innovation and Technology in Computer Science Education - ITiCSE 2007, 25-27th June 2007, Dundee, Scotland, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    8 Citations (Scopus)
  • 2006

    IPv6 Stateless Address Autoconfiguration Considered Harmful

    Lindqvist, J., 2006, Military Communications Conference - MILCOM 2006, Washington, D.C., USA, 23.10. - 25.10.2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Privacy Management for Secure Mobility

    Lindqvist, J. & Takkinen, L., 2006, 5th ACM CCS Workshop on Privacy in Electronic Society - WPES 2006, Alexandria, Virginia, USA, 30.10.2006. p. 63-66

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Resilient IPv6 Multicast Address Allocation in Ad Hoc Networks

    Lindqvist, J., Ylä-Jääski, A. & Manner, J., 2006, 2006 IEEE International Workshop on Wireless Ad-hoc and Sensor Networks - IWWAN 2006, New York, 28.6. - 28.6.2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Secure Pairing Architecture for Wireless Mobile Devices

    Lindqvist, J., Liimatainen, S. & Katajamäki, T., 2006, IEEE 63rd Vehicular Technology Conference - IEEE VTC 2006 Spring, 7-10 May.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    2 Citations (Scopus)
Your message has successfully been sent.
Your message was not sent due to an error.