Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators., , , , , and . NDSS, The Internet Society, (2020)Truly Visual Caller ID? An Analysis of Anti-Robocall Applications and their Accessibility to Visually Impaired Users., , , , , and . ISTAS, page 266-279. IEEE, (2020)Designing Media Provenance Indicators to Combat Fake Media., , and . RAID, page 324-339. ACM, (2021)On media and disinformation: Examining viewer judgment of political video authenticity., , , , and . ISTAS, page 1-9. IEEE, (2021)Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services., , , , and . SOUPS, page 97-114. USENIX Association, (2017)Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers., , , , , , and . IEEE Symposium on Security and Privacy, page 1000-1014. IEEE, (2019)An Open Road Evaluation of a Self-Driving Vehicle Human-Machine Interface Designed for Visually Impaired Users., , , , and . Int. J. Hum. Comput. Interact., 35 (11): 1018-1032 (2019)Characterizing security and privacy practices in emerging digital credit applications., , , and . WiSec, page 94-107. ACM, (2019)Prime III: Voting for a More Accessible Future., , , and . ASSETS, page 335-336. ACM, (2017)Designing Indicators to Combat Fake Media., , and . CoRR, (2020)