Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weaving a safe web of news., , , , , , , , and . WWW (Companion Volume), page 849-852. International World Wide Web Conferences Steering Committee / ACM, (2013)Usable News Authentication: How the Presentation and Location of Cryptographic Information Impacts the Usability of Provenance Information and Perceptions of News Articles., , , , , , , , , and . CHI, page 830:1-830:20. ACM, (2024)Investigating the Computer Security Practices and Needs of Journalists., , , and . USENIX Security Symposium, page 399-414. USENIX Association, (2015)EPIC: Enhanced Privacy and Integrity Considerations for Research (Tutorial)., , , , , , and . IUI Companion, page 166-168. ACM, (2024)Usable Cryptographic Provenance: A Proactive Complement to Fact-Checking for Mitigating Misinformation., , , , , , , and . ICWSM Workshops, (2022)Dispatch: secure, resilient mobile reporting., , , , , , , , and . SIGCOMM, page 459-460. ACM, (2013)Sensemaking and Storytelling: Network Security Strategies for Collaborative Groups., , , , , and . CTS, page 622-623. IEEE Computer Society, (2016)When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers., , , , and . USENIX Security Symposium, page 505-522. USENIX Association, (2017)Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms., , , , and . FOCI @ USENIX Security Symposium, USENIX Association, (2017)