Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study., , , and . EuroS&P Workshops, page 210-219. IEEE, (2020)Designing a privacy label: assisting consumer understanding of online privacy practices.. CHI Extended Abstracts, page 3347-3352. ACM, (2009)"Discover AI in Daily Life": An AI Literacy Lesson for Middle School Students., , , , , , and . SIGCSE (2), page 1327. ACM, (2023)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , and . SOUPS @ USENIX Security Symposium, page 299-318. USENIX Association, (2021)Correct horse battery staple: exploring the usability of system-assigned passphrases., , , , , , , , and . SOUPS, page 7. ACM, (2012)How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 65-80. USENIX Association, (2012)Molecular tetris: crowdsourcing molecular docking using path-planning and haptic devices., , , , , , and . MIG, page 133-138. ACM, (2014)A "nutrition label" for privacy., , , and . SOUPS, ACM, (2009)The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing., , , , , , and . SOUPS, ACM, (2009)"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns., , , , , and . USENIX Security Symposium, page 1181-1198. USENIX Association, (2021)