From post

"It would probably turn into a social faux-pas": Users' and Bystanders' Preferences of Privacy Awareness Mechanisms in Smart Homes.

, , , , и . CHI, стр. 404:1-404:13. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Crypto-currencies to Measure Financial Activities and Uncover Potential Identities of Actors Involved.. University of California, San Diego, USA, (2017)Managing Distributed Applications Using Gush., и . TRIDENTCOM, том 46 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 401-411. Springer, (2010)"It would probably turn into a social faux-pas": Users' and Bystanders' Preferences of Privacy Awareness Mechanisms in Smart Homes., , , , и . CHI, стр. 404:1-404:13. ACM, (2022)Web-based Attacks to Discover and Control Local IoT Devices., , , , и . IoT S&P@SIGCOMM, стр. 29-35. ACM, (2018)Personalizing Privacy Protection With Individuals' Regulatory Focus: Would You Preserve or Enhance Your Information Privacy?, , , , , , и . CHI, стр. 982:1-982:17. ACM, (2024)Augmented Reality's Potential for Identifying and Mitigating Home Privacy Leaks., , , , , , , , и . CoRR, (2023)Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices., , , , и . USENIX Security Symposium, стр. 123-140. USENIX Association, (2023)Backpage and Bitcoin: Uncovering Human Traffickers., , , , и . KDD, стр. 1595-1604. ACM, (2017)High-fidelity switch models for software-defined network emulation., , и . HotSDN, стр. 43-48. ACM, (2013)Stressing Out: Bitcoin "Stress Testing"., , , и . Financial Cryptography Workshops, том 9604 из Lecture Notes in Computer Science, стр. 3-18. Springer, (2016)