default search action
Joel Reardon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i7]Nikita Samarin, Alex Sanchez, Trinity Chung, Akshay Dan Bhavish Juleemun, Conor Gilsenan, Nick Merrill, Joel Reardon, Serge Egelman:
The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services. CoRR abs/2407.10589 (2024) - 2023
- [c15]Aniketh Girish, Tianrui Hu, Vijay Prakash, Daniel J. Dubois, Srdjan Matic, Danny Yuxing Huang, Serge Egelman, Joel Reardon, Juan Tapiador, David R. Choffnes, Narseo Vallina-Rodriguez:
In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes. IMC 2023: 437-456 - [c14]Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez:
Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem. USENIX Security Symposium 2023: 2115-2132 - 2022
- [c13]Aniketh Girish, Vijay Prakash, Serge Egelman, Joel Reardon, Juan Tapiador, Danny Yuxing Huang, Srdjan Matic, Narseo Vallina-Rodriguez:
Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods. StudentWorkshop@CoNEXT 2022: 26-28 - 2020
- [j5]Catherine Han, Irwin Reyes, Álvaro Feal, Joel Reardon, Primal Wijesekera, Narseo Vallina-Rodriguez, Amit Elazari Bar On, Kenneth A. Bamberger, Serge Egelman:
The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. Proc. Priv. Enhancing Technol. 2020(3): 222-242 (2020) - [c12]Paul-Olivier Dehaye, Joel Reardon:
Proximity Tracing in an Ecosystem of Surveillance Capitalism. WPES@CCS 2020: 191-203 - [i6]Paul-Olivier Dehaye, Joel Reardon:
SwissCovid: a critical analysis of risk assessment by Swiss authorities. CoRR abs/2006.10719 (2020) - [i5]Kaihua Qin, Henryk Hadass, Arthur Gervais, Joel Reardon:
Applying Private Information Retrieval to Lightweight Bitcoin Clients. CoRR abs/2008.11358 (2020) - [i4]Paul-Olivier Dehaye, Joel Reardon:
Proximity Tracing in an Ecosystem of Surveillance Capitalism. CoRR abs/2009.06077 (2020) - [i3]Debjyoti Mukherjee, Alireza Ahmadi, Maryam Vahdat Pour, Joel Reardon:
An Empirical Study on User Reviews Targeting Mobile Apps' Security & Privacy. CoRR abs/2010.06371 (2020)
2010 – 2019
- 2019
- [j4]Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman:
50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System. login Usenix Mag. 44(4) (2019) - [c11]Kaihua Qin, Henryk Hadass, Arthur Gervais, Joel Reardon:
Applying Private Information Retrieval to Lightweight Bitcoin Clients. CVCBT 2019: 60-72 - [c10]Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman:
50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System. USENIX Security Symposium 2019: 603-620 - 2018
- [j3]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Dynamically Regulating Mobile Application Permissions. IEEE Secur. Priv. 16(1): 64-71 (2018) - [j2]Irwin Reyes, Primal Wijesekera, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah, Narseo Vallina-Rodriguez, Serge Egelman:
"Won't Somebody Think of the Children?" Examining COPPA Compliance at Scale. Proc. Priv. Enhancing Technol. 2018(3): 63-83 (2018) - [c9]Primal Wijesekera, Joel Reardon, Irwin Reyes, Lynn Tsai, Jung-Wei Chen, Nathan Good, David A. Wagner, Konstantin Beznosov, Serge Egelman:
Contextualizing Privacy Decisions for Better Prediction (and Protection). CHI 2018: 268 - 2017
- [c8]Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David A. Wagner, Nathan Good, Jung-Wei Chen:
Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. SOUPS 2017: 145-162 - [c7]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. IEEE Symposium on Security and Privacy 2017: 1077-1093 - [i2]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. CoRR abs/1703.02090 (2017) - 2016
- [b2]Joel Reardon:
Secure Data Deletion. Information Security and Cryptography, Springer 2016, ISBN 978-3-319-28777-5, pp. 3-186 - 2014
- [b1]Joel Reardon:
Secure Data Deletion. ETH Zurich, Zürich, Switzerland, 2014 - [j1]Joel Reardon, David A. Basin, Srdjan Capkun:
On Secure Data Deletion. IEEE Secur. Priv. 12(3): 37-44 (2014) - 2013
- [c6]Joel Reardon, Hubert Ritzdorf, David A. Basin, Srdjan Capkun:
Secure data deletion from persistent media. CCS 2013: 271-284 - [c5]Joel Reardon, David A. Basin, Srdjan Capkun:
SoK: Secure Data Deletion. IEEE Symposium on Security and Privacy 2013: 301-315 - 2012
- [c4]Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin:
User-level secure deletion on log-structured file systems. AsiaCCS 2012: 63-64 - [c3]Joel Reardon, Srdjan Capkun, David A. Basin:
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. USENIX Security Symposium 2012: 333-348 - 2011
- [i1]Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin:
Secure Deletion on Log-structured File Systems. CoRR abs/1106.0917 (2011)
2000 – 2009
- 2009
- [c2]Joel Reardon, Ian Goldberg:
Improving Tor using a TCP-over-DTLS Tunnel. USENIX Security Symposium 2009: 119-134 - [c1]Chris Alexander, Joel Reardon, Ian Goldberg:
Plinko: polling with a physical implementation of a noisy channel. WPES 2009: 109-112
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint