Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CCS'13 co-located workshop summary for SPSM 2013., and . ACM Conference on Computer and Communications Security, page 1489-1490. ACM, (2013)Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate., , , , , , , and . IEEE Symposium on Security and Privacy, page 211-226. IEEE, (2019)AdDroid: privilege separation for applications and advertisers in Android., , , and . AsiaCCS, page 71-72. ACM, (2012)Towards Comprehensible and Effective Permission Systems.. University of California, Berkeley, USA, (2012)base-search.net (ftcdlib:qt8h695639).Object views: fine-grained sharing in browsers., , and . WWW, page 721-730. ACM, (2010)Mining Permission Request Patterns from Android and Facebook Applications., , , and . ICDM, page 870-875. IEEE Computer Society, (2012)Measuring HTTPS Adoption on the Web., , , , , and . USENIX Security Symposium, page 1323-1338. USENIX Association, (2017)Choice Architecture and Smartphone Privacy: There's a Price for That., , and . WEIS, (2012)The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators., , , , , and . USENIX Security Symposium, page 1715-1732. USENIX Association, (2019)Experimenting at scale with google chrome's SSL warning., , , and . CHI, page 2667-2670. ACM, (2014)