Author of the publication

Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness.

, and . USENIX Security Symposium, page 257-272. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CCS'13 co-located workshop summary for SPSM 2013., and . ACM Conference on Computer and Communications Security, page 1489-1490. ACM, (2013)Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate., , , , , , , and . IEEE Symposium on Security and Privacy, page 211-226. IEEE, (2019)Towards Comprehensible and Effective Permission Systems.. University of California, Berkeley, USA, (2012)base-search.net (ftcdlib:qt8h695639).AdDroid: privilege separation for applications and advertisers in Android., , , and . AsiaCCS, page 71-72. ACM, (2012)Object views: fine-grained sharing in browsers., , and . WWW, page 721-730. ACM, (2010)The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators., , , , , and . USENIX Security Symposium, page 1715-1732. USENIX Association, (2019)Measuring HTTPS Adoption on the Web., , , , , and . USENIX Security Symposium, page 1323-1338. USENIX Association, (2017)Choice Architecture and Smartphone Privacy: There's a Price for That., , and . WEIS, (2012)Mining Permission Request Patterns from Android and Facebook Applications., , , and . ICDM, page 870-875. IEEE Computer Society, (2012)A Week to Remember: The Impact of Browser Warning Storage Policies., and . SOUPS, page 15-25. USENIX Association, (2016)