Author of the publication

Understanding Sensitivity by Analyzing Anonymity Guest editor's introduction.

, , , and . IEEE Secur. Priv., 13 (2): 14-21 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cover locations: availing location-based services without revealing the location., , and . WPES, page 143-152. ACM, (2011)Exploring decision making with Android's runtime permission dialogs using in-context surveys., , , and . SOUPS, page 195-210. USENIX Association, (2017)On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot., and . Privacy Enhancing Technologies, volume 6205 of Lecture Notes in Computer Science, page 19-37. Springer, (2010)Reducing Permission Requests in Mobile Apps., , , , , , and . Internet Measurement Conference, page 259-266. ACM, (2019)On the effectiveness of anonymizing networks for web search privacy., and . AsiaCCS, page 483-489. ACM, (2011)User Anonymity on Twitter., , and . IEEE Secur. Priv., 15 (3): 84-87 (2017)Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams., , , and . CoRR, (2024)PriGen: Towards Automated Translation of Android Applications' Code to Privacy Captions., , , and . CoRR, (2023)Towards Fine-Grained Localization of Privacy Behaviors., , , and . EuroS&P, page 258-277. IEEE, (2023)Hark: A Deep Learning System for Navigating Privacy Feedback at Scale., , , , and . SP, page 2469-2486. IEEE, (2022)