Author of the publication

The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.

, , , , , , and . IEEE Symposium on Security and Privacy, page 1077-1093. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phinding Phish: An Evaluation of Anti-Phishing Toolbars., , , and . NDSS, The Internet Society, (2007)Choice Architecture and Smartphone Privacy: There's a Price for That., , and . WEIS, (2012)Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms., , and . CHI, page 1669-1678. ACM, (2015)Does my password go up to eleven?: the impact of password meters on password selection., , , , and . CHI, page 2379-2388. ACM, (2013)Timing is everything?: the effects of timing and placement of online privacy indicators., , , and . CHI, page 319-328. ACM, (2009)It's not what you know, but who you know: a social approach to last-resort authentication., , and . CHI, page 1983-1992. ACM, (2009)You've been warned: an empirical study of the effectiveness of web browser phishing warnings., , and . CHI, page 1065-1074. ACM, (2008)Disaster privacy/privacy disaster., , , , and . J. Assoc. Inf. Sci. Technol., 71 (9): 1002-1014 (2020)Recovering High-Value Secrets with SGX and Social Authentication., , and . WAY@SOUPS, USENIX Association, (2016)Privacy and Security Threat Models and Mitigation Strategies of Older Adults., , , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)