Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving the Ecosystem of Personal Behavioral Data., , , and . Hum. Comput. Interact., 32 (5-6): 447-510 (2017)Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks., , , , and . CoRR, (2023)"It's a Fair Game", or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents., , , , , , , and . CoRR, (2023)Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy., , , , and . IEEE Secur. Priv., 19 (5): 66-70 (2021)Blind and Human: Exploring More Usable Audio CAPTCHA Designs., , , , and . SOUPS @ USENIX Security Symposium, page 111-125. USENIX Association, (2020)Iterative Design of An Accessible Crypto Wallet for Blind Users., , , , and . SOUPS, page 381-398. USENIX Association, (2023)WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments., , , , , and . SOUPS @ USENIX Security Symposium, page 281-298. USENIX Association, (2021)Breaking! A Typology of Security and Privacy News and How It's Shared., , , and . CHI, page 1. ACM, (2018)Exploring capturable everyday memory for autobiographical authentication., , and . UbiComp, page 211-220. ACM, (2013)The post that wasn't: exploring self-censorship on facebook., , , , , and . CSCW, page 793-802. ACM, (2013)