Author of the publication

An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.

, , , , , and . SOUPS, page 113-130. USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive design and simulation of tubular supporting structure., , , , , and . Graph. Model., (2015)Explainability Case Studies., , and . CoRR, (2020)The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing., , , , , , and . SOUPS, ACM, (2009)"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns., , , , , and . USENIX Security Symposium, page 1181-1198. USENIX Association, (2021)"There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the future., , , , , , , and . SOUPS, page 579-603. USENIX Association, (2023)Curated city: capturing individual city guides through social curation., , , and . CHI, page 3249-3258. ACM, (2014)Understanding Digital-Safety Experiences of Youth in the U.S., , , , , , and . CHI, page 191:1-191:15. ACM, (2023)Who's viewed you?: the impact of feedback in a mobile location-sharing application., , , , , and . CHI, page 2003-2012. ACM, (2009)When are users comfortable sharing locations with advertisers?, , , and . CHI, page 2449-2452. ACM, (2011)Of passwords and people: measuring the effect of password-composition policies., , , , , , , and . CHI, page 2595-2604. ACM, (2011)