What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Rachel Greenstadt
Google Scholar
36
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings.
Cat Mai
Bruno Coelho
Julia B. Kieserman
Lexie Matsumoto
Kyle Spinelli
Eric Yang
Athanasios Andreou
Rachel Greenstadt
Tobias Lauinger
Damon McCoy
2025
journals/popets
An Analysis of Chinese Censorship Bias in LLMs.
Mohamed Ahmed
Jeffrey Knockel
Rachel Greenstadt
2025
journals/popets
Sheep's clothing, wolfish intent: Automated detection and evaluation of problematic 'allowed' advertisements.
Ritik Roongta
Julia Jose
Hussam Habib
Rachel Greenstadt
2024
journals/popets
What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites.
Kejsi Take
Jordyn Young
Rasika Bhalerao
Kevin Gallagher
Andrea Forte
Damon McCoy
Rachel Greenstadt
2024
conf/asiaccs
From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser Extensions.
Ritik Roongta
Rachel Greenstadt
2023
journals/popets
Intersectional Thinking about PETs: A Study of Library Privacy.
Nora McDonald
Rachel Greenstadt
Andrea Forte
2023
conf/uss
How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities.
Alan F. Luo
Noel Warford
Samuel Dooley
Rachel Greenstadt
Michelle L. Mazurek
Nora McDonald
2023
conf/uss
"I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology.
Victoria Zhong
Susan E. McGregor
Rachel Greenstadt
2022
journals/popets
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites.
Kejsi Take
Kevin Gallagher
Andrea Forte
Damon McCoy
Rachel Greenstadt
2021
journals/popets
Supervised Authorship Segmentation of Open Source Code Projects.
Edwin Dauber
Robert F. Erbacher
Gregory Shearer
Michael J. Weisman
Frederica Free-Nelson
Rachel Greenstadt
2020
conf/uss
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Emily Tseng
Rosanna Bellini
Nora McDonald
Matan Danos
Rachel Greenstadt
Damon McCoy
Nicola Dell
Thomas Ristenpart
2020
conf/sp
Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor.
Chau Tran
Kaylea Champion
Andrea Forte
Benjamin Mako Hill
Rachel Greenstadt
2019
journals/popets
"Because... I was told... so much": Linguistic Indicators of Mental Health Status on Twitter.
Janith Weerasinghe
Kediel O. Morales
Rachel Greenstadt
2019
journals/popets
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments.
Edwin Dauber
Aylin Caliskan
Richard E. Harang
Gregory Shearer
Michael J. Weisman
Frederica Free-Nelson
Rachel Greenstadt
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
conf/ndss
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Aylin Caliskan
Fabian Yamaguchi
Edwin Dauber
Richard E. Harang
Konrad Rieck
Rachel Greenstadt
Arvind Narayanan
2017
journals/popets
Editors' Introduction.
Claudia Díaz
Rachel Greenstadt
Damon McCoy
2017
journals/popets
Editors' Introduction.
Claudia Díaz
Rachel Greenstadt
Damon McCoy
2017
journals/popets
Editors' Introduction.
Claudia Díaz
Rachel Greenstadt
Damon McCoy
2017
journals/popets
Editors' Introduction.
Claudia Díaz
Rachel Greenstadt
Damon McCoy
2017
conf/ccs
How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services.
Rebekah Overdorf
Marc Juárez
Gunes Acar
Rachel Greenstadt
Claudia Díaz
2017
conf/ih
Using Stylometry to Attribute Programmers and Writers.
Rachel Greenstadt
2017
conf/esorics
Source Code Authorship Attribution Using Long Short-Term Memory Based Networks.
Bander Alsulami
Edwin Dauber
Richard E. Harang
Spiros Mancoridis
Rachel Greenstadt
2016
journals/popets
Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution.
Rebekah Overdorf
Rachel Greenstadt
2015
conf/uss
De-anonymizing Programmers via Code Stylometry.
Aylin Caliskan Islam
Richard E. Harang
Andrew Liu
Arvind Narayanan
Clare R. Voss
Fabian Yamaguchi
Rachel Greenstadt
2015
conf/fc
Computer-Supported Cooperative Crime.
Vaibhav Garg
Sadia Afroz
Rebekah Overdorf
Rachel Greenstadt
2014
conf/ccs
A Critical Evaluation of Website Fingerprinting Attacks.
Marc Juarez
Sadia Afroz
Gunes Acar
Claudia Díaz
Rachel Greenstadt
2014
conf/sp
Doppelgänger Finder: Taking Stylometry to the Underground.
Sadia Afroz
Aylin Caliskan Islam
Ariel Stolerman
Rachel Greenstadt
Damon McCoy
2013
conf/ccs
Approaches to adversarial drift.
Alex Kantchelian
Sadia Afroz
Ling Huang
Aylin Caliskan Islam
Brad Miller
Michael Carl Tschantz
Rachel Greenstadt
Anthony D. Joseph
J. D. Tygar
2012
conf/sp
Privacy in Online Review Sites.
Matthew Burkholder
Rachel Greenstadt
2012
conf/sp
Detecting Hoaxes, Frauds, and Deception in Writing Style Online.
Sadia Afroz
Michael Brennan
Rachel Greenstadt
2009
conf/ccs
Mixed-initiative security agents.
Rachel Greenstadt
Sadia Afroz
Michael Brennan
2008
conf/ccs
Cognitive security for personal devices.
Rachel Greenstadt
Jacob Beal
Coauthors
Alan F. Luo
(1)
Alex Kantchelian
(1)
Andrea Forte
(4)
Andrew Liu
(1)
Anthony D. Joseph
(1)
Ariel Stolerman
(1)
Arvind Narayanan
(2)
Athanasios Andreou
(1)
Aylin Caliskan
(2)
Aylin Caliskan Islam
(3)
Bander Alsulami
(1)
Benjamin Mako Hill
(1)
Brad Miller
(1)
Bruno Coelho
(1)
Carmela Troncoso
(4)
Cat Mai
(1)
Chau Tran
(1)
Clare R. Voss
(1)
Claudia Díaz
(6)
Damon McCoy
(13)
Edwin Dauber
(4)
Emily Tseng
(1)
Eric Yang
(1)
Fabian Yamaguchi
(2)
Frederica Free-Nelson
(2)
Gregory Shearer
(2)
Gunes Acar
(2)
Hussam Habib
(1)
J. D. Tygar
(1)
Jacob Beal
(1)
Janith Weerasinghe
(1)
Jeffrey Knockel
(1)
Jordyn Young
(1)
Julia B. Kieserman
(1)
Julia Jose
(1)
Kaylea Champion
(1)
Kediel O. Morales
(1)
Kejsi Take
(2)
Kevin Gallagher
(2)
Konrad Rieck
(1)
Kyle Spinelli
(1)
Lexie Matsumoto
(1)
Ling Huang
(1)
Marc Juarez
(2)
Matan Danos
(1)
Matthew Burkholder
(1)
Michael Brennan
(2)
Michael Carl Tschantz
(1)
Michael J. Weisman
(2)
Michelle L. Mazurek
(1)
Mohamed Ahmed
(1)
Nicola Dell
(1)
Noel Warford
(1)
Nora McDonald
(3)
Rachel Greenstadt
(36)
Rasika Bhalerao
(1)
Rebekah Overdorf
(3)
Richard E. Harang
(4)
Ritik Roongta
(2)
Robert F. Erbacher
(1)
Rosanna Bellini
(1)
Sadia Afroz
(6)
Samuel Dooley
(1)
Spiros Mancoridis
(1)
Susan E. McGregor
(1)
Thomas Ristenpart
(1)
Tobias Lauinger
(1)
Vaibhav Garg
(1)
Victoria Zhong
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to