Author of the publication

When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources.

, , , , and . SOUPS, page 1:1-1:14. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disaster privacy/privacy disaster., , , , and . J. Assoc. Inf. Sci. Technol., 71 (9): 1002-1014 (2020)Choice Architecture and Smartphone Privacy: There's a Price for That., , and . WEIS, (2012)Phinding Phish: An Evaluation of Anti-Phishing Toolbars., , , and . NDSS, The Internet Society, (2007)You've been warned: an empirical study of the effectiveness of web browser phishing warnings., , and . CHI, page 1065-1074. ACM, (2008)It's not what you know, but who you know: a social approach to last-resort authentication., , and . CHI, page 1983-1992. ACM, (2009)Timing is everything?: the effects of timing and placement of online privacy indicators., , , and . CHI, page 319-328. ACM, (2009)Does my password go up to eleven?: the impact of password meters on password selection., , , , and . CHI, page 2379-2388. ACM, (2013)Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms., , and . CHI, page 1669-1678. ACM, (2015)Privacy and Security Threat Models and Mitigation Strategies of Older Adults., , , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Recovering High-Value Secrets with SGX and Social Authentication., , and . WAY@SOUPS, USENIX Association, (2016)