Author of the publication

Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors.

, , and . USENIX Security Symposium, page 89-104. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy for Untrusted Applications in Modern and Emerging Client Platforms.. University of Washington, USA, (2014)COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion., , , , , and . CoRR, (2020)Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study., and . USENIX Security Symposium, page 159-176. USENIX Association, (2019)Secure Multi-User Content Sharing for Augmented Reality Applications., , and . USENIX Security Symposium, page 141-158. USENIX Association, (2019)Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections., , , , and . Internet Measurement Conference, page 507-525. ACM, (2021)Reframe: An Augmented Reality Storyboarding Tool for Character-Driven Analysis of Security & Privacy Concerns., , and . UIST, page 117:1-117:15. ACM, (2023)Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists., , and . EuroS&P, page 385-400. IEEE, (2017)Counting Dependence Predictors., , and . ISCA, page 215-226. IEEE Computer Society, (2008)Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships., , , and . SOUPS @ USENIX Security Symposium, page 447-462. USENIX Association, (2022)Investigating the Computer Security Practices and Needs of Journalists., , , and . USENIX Security Symposium, page 399-414. USENIX Association, (2015)