Author of the publication

Security and privacy design considerations for low-literate users in developing regions.

, , and . SOUPS, USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAW: Wristband-based Authentication for Desktop Computers., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (3): 125:1-125:29 (2018)Examining Source Effects on Perceptions of Fake News in Rural India., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW1): 89:1-89:29 (2022)An amulet for trustworthy wearable mHealth., , , , , , , , and . HotMobile, page 7. ACM, (2012)End User Security and Privacy Concerns with Smart Homes., , and . SOUPS, page 65-80. USENIX Association, (2017)Provenance framework for mHealth., , , , , and . COMSNETS, page 1-6. IEEE, (2013)Adaptive Security and Privacy for mHealth Sensing., , , , and . HealthSec, USENIX Association, (2011)Experimental validation of analytical performance models for IEEE 802.11 networks., , and . COMSNETS, page 1-8. IEEE, (2010)Adapt-lite: privacy-aware, secure, and efficient mhealth sensing., , , , and . WPES, page 137-142. ACM, (2011)"We Even Borrowed Money From Our Neighbor": Understanding Mobile-based Frauds Through Victims' Experiences., , , , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW1): 41:1-41:30 (2021)Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts., , and . Proc. Priv. Enhancing Technol., 2020 (2): 436-458 (2020)