default search action
Rachel Greenstadt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j25]Kejsi Take, Victoria Zhong, Chris Geeng, Emmi Bevensee, Damon McCoy, Rachel Greenstadt:
Stoking the Flames: Understanding Escalation in an Online Harassment Community. Proc. ACM Hum. Comput. Interact. 8(CSCW1): 1-23 (2024) - [j24]Kejsi Take, Jordyn Young, Rasika Bhalerao, Kevin Gallagher, Andrea Forte, Damon McCoy, Rachel Greenstadt:
What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites. Proc. Priv. Enhancing Technol. 2024(4): 311-326 (2024) - [c63]Ritik Roongta, Rachel Greenstadt:
From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser Extensions. AsiaCCS 2024 - [i13]Chau Tran, Kejsi Take, Kaylea Champion, Benjamin Mako Hill, Rachel Greenstadt:
Challenges in Restructuring Community-based Moderation. CoRR abs/2402.17880 (2024) - 2023
- [j23]Nora McDonald, Rachel Greenstadt, Andrea Forte:
Intersectional Thinking about PETs: A Study of Library Privacy. Proc. Priv. Enhancing Technol. 2023(2): 480-495 (2023) - [c62]Victoria Zhong, Susan McGregor, Rachel Greenstadt:
"I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology. USENIX Security Symposium 2023: 5073-5090 - [c61]Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald:
How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities. USENIX Security Symposium 2023: 5647-5664 - [c60]Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt:
Can Deepfakes be created on a whim? WWW (Companion Volume) 2023: 1324-1334 - [i12]Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt:
Can deepfakes be created by novice users? CoRR abs/2304.14576 (2023) - 2022
- [j22]Chau Tran, Kaylea Champion, Benjamin Mako Hill, Rachel Greenstadt:
The Risks, Benefits, and Consequences of Prepublication Moderation: Evidence from 17 Wikipedia Language Editions. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-25 (2022) - [j21]Kejsi Take, Kevin Gallagher, Andrea Forte, Damon McCoy, Rachel Greenstadt:
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites. Proc. Priv. Enhancing Technol. 2022(3): 159-178 (2022) - [c59]Janith Weerasinghe, Rhia Singh, Rachel Greenstadt:
Using Authorship Verification to Mitigate Abuse in Online Communities. ICWSM 2022: 1075-1086 - [c58]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. WWW 2022: 2707-2718 - [i11]Chau Tran, Kaylea Champion, Benjamin Mako Hill, Rachel Greenstadt:
The Risks, Benefits, and Consequences of Prepublication Moderation: Evidence from 17 Wikipedia Language Editions. CoRR abs/2202.05548 (2022) - [i10]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. CoRR abs/2205.15943 (2022) - 2021
- [j20]Edwin Dauber, Robert F. Erbacher, Gregory Shearer, Michael J. Weisman, Frederica Free-Nelson, Rachel Greenstadt:
Supervised Authorship Segmentation of Open Source Code Projects. Proc. Priv. Enhancing Technol. 2021(4): 464-479 (2021) - [c57]Rhia Singh, Janith Weerasinghe, Rachel Greenstadt:
Writing Style Change Detection on Multi-Author Documents. CLEF (Working Notes) 2021: 2137-2145 - [c56]Janith Weerasinghe, Rhia Singh, Rachel Greenstadt:
Feature Vector Difference based Authorship Verification for Open-World Settings. CLEF (Working Notes) 2021: 2201-2207 - [c55]Maxwell Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
A large-scale characterization of online incitements to harassment across platforms. Internet Measurement Conference 2021: 621-638 - [e3]Michael D. Bailey, Rachel Greenstadt:
30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021. USENIX Association 2021, ISBN 978-1-939133-24-3 [contents] - 2020
- [j19]Rosanna Bellini, Emily Tseng, Nora McDonald, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell:
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-27 (2020) - [c54]Janith Weerasinghe, Rachel Greenstadt:
Feature Vector Difference based Neural Network and Logistic Regression Models for Authorship Verification. CLEF (Working Notes) 2020 - [c53]Aviel J. Stein, Aviel Kapllani, Spiros Mancoridis, Rachel Greenstadt:
Exploring Paraphrasing Techniques on Formal Language for Generating Semantics Preserving Source Code Transformations. ICSC 2020: 242-248 - [c52]Chau Tran, Kaylea Champion, Andrea Forte, Benjamin Mako Hill, Rachel Greenstadt:
Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor. SP 2020: 186-202 - [c51]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. USENIX Security Symposium 2020: 1893-1909 - [c50]Janith Weerasinghe, Bailey Flanigan, Aviel J. Stein, Damon McCoy, Rachel Greenstadt:
The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse. WWW 2020: 1874-1884 - [i9]Yigit Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt:
Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain. CoRR abs/2001.11137 (2020) - [i8]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. CoRR abs/2005.14341 (2020)
2010 – 2019
- 2019
- [j18]Kaylea Champion, Nora McDonald, Stephanie Bankes, Joseph Zhang, Rachel Greenstadt, Andrea Forte, Benjamin Mako Hill:
A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users. Proc. ACM Hum. Comput. Interact. 3(CSCW): 53:1-53:26 (2019) - [j17]Edwin Dauber, Aylin Caliskan, Richard E. Harang, Gregory Shearer, Michael J. Weisman, Frederica Free-Nelson, Rachel Greenstadt:
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments. Proc. Priv. Enhancing Technol. 2019(3): 389-408 (2019) - [j16]Janith Weerasinghe, Kediel Morales, Rachel Greenstadt:
"Because... I was told... so much": Linguistic Indicators of Mental Health Status on Twitter. Proc. Priv. Enhancing Technol. 2019(4): 152-171 (2019) - [c49]Nora McDonald, Benjamin Mako Hill, Rachel Greenstadt, Andrea Forte:
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers. CHI 2019: 671 - [i7]Chau Tran, Kaylea Champion, Andrea Forte, Benjamin Mako Hill, Rachel Greenstadt:
Tor Users Contributing to Wikipedia: Just Like Everybody Else? CoRR abs/1904.04324 (2019) - [i6]Kaylea Champion, Nora McDonald, Stephanie Bankes, Joseph Zhang, Rachel Greenstadt, Andrea Forte, Benjamin Mako Hill:
A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users. CoRR abs/1909.07929 (2019) - 2018
- [j15]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(1): 1-4 (2018) - [j14]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(2): 1-3 (2018) - [j13]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(3): 1-4 (2018) - [j12]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(4): 1-4 (2018) - [c48]Edwin Dauber, Aylin Caliskan, Richard E. Harang, Rachel Greenstadt:
Git blame who?: stylistic authorship attribution of small, incomplete source code fragments. ICSE (Companion Volume) 2018: 356-357 - [c47]Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan:
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. NDSS 2018 - [i5]Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy:
Under the Underground: Predicting Private Interactions in Underground Forums. CoRR abs/1805.04494 (2018) - 2017
- [j11]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(1): 1-3 (2017) - [j10]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(2): 1-3 (2017) - [j9]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(3): 1 (2017) - [j8]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(4): 1-4 (2017) - [j7]Lex Fridman, Steven Weber, Rachel Greenstadt, Moshe Kam:
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location. IEEE Syst. J. 11(2): 513-521 (2017) - [c46]Rebekah Overdorf, Marc Juárez, Gunes Acar, Rachel Greenstadt, Claudia Díaz:
How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services. CCS 2017: 2021-2036 - [c45]Edwin Dauber, Rebekah Overdorf, Rachel Greenstadt:
Stylometric Authorship Attribution of Collaborative Documents. CSCML 2017: 115-135 - [c44]Andrea Forte, Nazanin Andalibi, Rachel Greenstadt:
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians. CSCW 2017: 1800-1811 - [c43]Bander Alsulami, Edwin Dauber, Richard E. Harang, Spiros Mancoridis, Rachel Greenstadt:
Source Code Authorship Attribution Using Long Short-Term Memory Based Networks. ESORICS (1) 2017: 65-82 - [c42]Rachel Greenstadt:
Using Stylometry to Attribute Programmers and Writers. IH&MMSec 2017: 91 - [i4]Edwin Dauber, Aylin Caliskan Islam, Richard E. Harang, Rachel Greenstadt:
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments. CoRR abs/1701.05681 (2017) - [i3]Rebekah Overdorf, Marc Juárez, Gunes Acar, Rachel Greenstadt, Claudia Díaz:
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services. CoRR abs/1708.08475 (2017) - 2016
- [j6]Rebekah Overdorf, Rachel Greenstadt:
Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution. Proc. Priv. Enhancing Technol. 2016(3): 155-171 (2016) - 2015
- [j5]Lex Fridman, Ariel Stolerman, Sayandeep Acharya, Patrick Brennan, Patrick Juola, Rachel Greenstadt, Moshe Kam:
Multi-modal decision fusion for continuous authentication. Comput. Electr. Eng. 41: 142-156 (2015) - [c41]Vaibhav Garg, Sadia Afroz, Rebekah Overdorf, Rachel Greenstadt:
Computer-Supported Cooperative Crime. Financial Cryptography 2015: 32-43 - [c40]Michael J. Mayhew, Michael Atighetchi, Aaron Adler, Rachel Greenstadt:
Use of machine learning in big data analytics for insider threat detection. MILCOM 2015: 915-922 - [c39]Aylin Caliskan Islam, Richard E. Harang, Andrew Liu, Arvind Narayanan, Clare R. Voss, Fabian Yamaguchi, Rachel Greenstadt:
De-anonymizing Programmers via Code Stylometry. USENIX Security Symposium 2015: 255-270 - [i2]Lex Fridman, Steven Weber, Rachel Greenstadt, Moshe Kam:
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location. CoRR abs/1503.08479 (2015) - [i1]Aylin Caliskan Islam, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan:
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. CoRR abs/1512.08546 (2015) - 2014
- [c38]Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Díaz, Rachel Greenstadt:
A Critical Evaluation of Website Fingerprinting Attacks. CCS 2014: 263-274 - [c37]Ariel Stolerman, Alex Fridman, Rachel Greenstadt, Patrick Brennan, Patrick Juola:
Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion. IFIP Int. Conf. Digital Forensics 2014: 165-183 - [c36]Ariel Stolerman, Rebekah Overdorf, Sadia Afroz, Rachel Greenstadt:
Breaking the Closed-World Assumption in Stylometric Authorship Attribution. IFIP Int. Conf. Digital Forensics 2014: 185-205 - [c35]Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy:
Doppelgänger Finder: Taking Stylometry to the Underground. IEEE Symposium on Security and Privacy 2014: 212-226 - [c34]Aylin Caliskan Islam, Jonathan Walsh, Rachel Greenstadt:
Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social Network. WPES 2014: 35-46 - 2013
- [j4]Prathaban Mookiah, John M. Walsh, Rachel Greenstadt, Kapil R. Dandekar:
Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j3]Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt:
Keyboard-Behavior-Based Authentication. IT Prof. 15(4): 8-11 (2013) - [j2]Alex Fridman, Ariel Stolerman, Sayandeep Acharya, Patrick Brennan, Patrick Juola, Rachel Greenstadt, Moshe Kam:
Decision Fusion for Multimodal Active Authentication. IT Prof. 15(4): 29-33 (2013) - [c33]Alex Kantchelian, Sadia Afroz, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph, J. D. Tygar:
Approaches to adversarial drift. AISec 2013: 99-110 - [c32]Sayandeep Acharya, Alex Fridman, Patrick Brennan, Patrick Juola, Rachel Greenstadt, Moshe Kam:
User authentication through biometric sensors and decision fusion. CISS 2013: 1-6 - [c31]Jeffrey Segall, Michael J. Mayhew, Michael Atighetchi, Rachel Greenstadt:
Assessing trustworthiness in collaborative environments. CSIIRW 2013: 52 - [c30]Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt:
Honor among thieves: A common's analysis of cybercrime economies. eCrime 2013: 1-11 - [c29]Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt:
Towards Active Linguistic Authentication. IFIP Int. Conf. Digital Forensics 2013: 385-398 - [c28]Aaron Adler, Michael J. Mayhew, Jeffrey Cleveland, Michael Atighetchi, Rachel Greenstadt:
Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests. MILCOM 2013: 1880-1887 - [c27]Ariel Stolerman, Aylin Caliskan, Rachel Greenstadt:
From Language to Family and Back: Native Language and Language Family Identification from English Text. HLT-NAACL 2013: 32-39 - [c26]Sadia Afroz, Aylin Caliskan Islam, Jordan Santell, Aaron Chapin, Rachel Greenstadt:
How Privacy Flaws Affect Consumer Perception. STAST 2013: 10-17 - [c25]Nikhil Gulati, Rachel Greenstadt, Kapil R. Dandekar, John M. Walsh:
GMM Based Semi-Supervised Learning for Channel-Based Authentication Scheme. VTC Fall 2013: 1-6 - [c24]Jeffrey Segall, Rachel Greenstadt:
The illiterate editor: metadata-driven revert detection in Wikipedia. OpenSym 2013: 11:1-11:8 - 2012
- [j1]Michael Brennan, Sadia Afroz, Rachel Greenstadt:
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. ACM Trans. Inf. Syst. Secur. 15(3): 12:1-12:22 (2012) - [c23]Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan, Ariel Stolerman, Rachel Greenstadt:
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization. Privacy Enhancing Technologies 2012: 299-318 - [c22]Aylin Caliskan, Rachel Greenstadt:
Translate Once, Translate Twice, Translate Thrice and Attribute: Identifying Authors and Machine Translation Tools in Translated Text. ICSC 2012: 121-125 - [c21]Matthew Burkholder, Rachel Greenstadt:
Privacy in Online Review Sites. IEEE Symposium on Security and Privacy Workshops 2012: 45-52 - [c20]Sadia Afroz, Michael Brennan, Rachel Greenstadt:
Detecting Hoaxes, Frauds, and Deception in Writing Style Online. IEEE Symposium on Security and Privacy 2012: 461-475 - 2011
- [c19]Sadia Afroz, Rachel Greenstadt:
PhishZoo: Detecting Phishing Websites by Looking at Them. ICSC 2011: 368-375 - [c18]Michael Brennan, Rachel Greenstadt:
Coalescing Twitter Trends: The Under-Utilization of Machine Learning in Social Media. SocialCom/PASSAT 2011: 641-646 - [e2]Yan Chen, Alvaro A. Cárdenas, Rachel Greenstadt, Benjamin I. P. Rubinstein:
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011. ACM 2011, ISBN 978-1-4503-1003-1 [contents] - 2010
- [c17]Michael Robert Brennan, Stacey Wrazien, Rachel Greenstadt:
Learning to Extract Quality Discourse in Online Communities. Collaboratively-Built Knowledge Sources and AI 2010 - [c16]Andrew Feit, Lenrik Toval, Raffi Hovagimian, Rachel Greenstadt:
A Travel-Time Optimizing Edge Weighting Scheme for Dynamic Re-Planning. Bridging the Gap Between Task and Motion Planning 2010 - [c15]Michael Brennan, Stacey Wrazien, Rachel Greenstadt:
Using machine learning to augment collaborative filtering of community discussions. AAMAS 2010: 1569-1570 - [e1]Rachel Greenstadt:
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0088-9 [contents]
2000 – 2009
- 2009
- [c14]Rachel Greenstadt:
An overview of privacy improvements to k-optimal DCOP algorithms. AAMAS (2) 2009: 1279-1280 - [c13]Rachel Greenstadt, Sadia Afroz, Michael Brennan:
Mixed-initiative security agents. AISec 2009: 35-38 - [c12]Michael Robert Brennan, Rachel Greenstadt:
Practical Attacks Against Authorship Recognition Techniques. IAAI 2009 - [c11]Paul L. Snyder, Rachel Greenstadt, Giuseppe Valetto:
Myconet: A Fungi-Inspired Model for Superpeer-Based Peer-to-Peer Overlay Topologies. SASO 2009: 40-50 - [p3]Oliver Day, Brandon Palmen, Rachel Greenstadt:
Reinterpreting the Disclosure Debate for Web Infections. Managing Information Risk and the Economics of Security 2009: 179-197 - 2008
- [c10]Rachel Greenstadt, Jacob Beal:
Cognitive security for personal devices. AISec 2008: 27-30 - [c9]Oliver Day, Rachel Greenstadt, Brandon Palmen:
Reinterpreting the Disclosure Debate for Web Infections. WEIS 2008 - 2007
- [c8]Rachel Greenstadt, Barbara J. Grosz, Michael D. Smith:
SSDPOP: improving the privacy of DCOP with secret sharing. AAMAS 2007: 171 - 2006
- [c7]Rachel Greenstadt, Jonathan P. Pearce, Milind Tambe:
Analysis of Privacy Loss in Distributed Constraint Optimization. AAAI 2006: 647-653 - [c6]Rachel Greenstadt:
Privatizing Constraint Optimization. AAAI 2006: 1916-1917 - [c5]Rachel Greenstadt, Jonathan P. Pearce, Emma Bowring, Milind Tambe:
Experimental analysis of privacy loss in DCOP algorithms. AAMAS 2006: 1424-1426 - [c4]Rachel Greenstadt, Michael D. Smith:
Collaborative Scheduling: Threats and Promises. WEIS 2006 - 2005
- [c3]Rachel Greenstadt, Michael D. Smith:
Protecting Personal Information: Obstacles and Directions. WEIS 2005 - 2004
- [p2]Stuart E. Schechter, Rachel Greenstadt, Michael D. Smith:
Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment. Economics of Information Security 2004: 59-69 - [p1]Tony Vila, Rachel Greenstadt, David Molnar:
Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market. Economics of Information Security 2004: 143-153 - 2003
- [c2]Tony Vila, Rachel Greenstadt, David Molnar:
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. ICEC 2003: 403-407 - 2002
- [c1]John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts:
Covert Messaging through TCP Timestamps. Privacy Enhancing Technologies 2002: 194-208
Coauthor Index
Aylin Caliskan
aka: Aylin Caliskan Islam
aka: Aylin Caliskan Islam