What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Apu Kapadia
Google Scholar
33
publications in security and cryptology related venues
Year
Venue
Title
2021
journals/popets
Defending Against Microphone-Based Attacks with Personalized Noise.
Yuchen Liu
Ziyu Xiang
Eun Ji Seong
Apu Kapadia
Donald S. Williamson
2021
conf/uss
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication.
Cheng Guo
Brianne Campbell
Apu Kapadia
Michael K. Reiter
Kelly Caine
2020
conf/uss
"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications.
Taslima Akter
Bryan Dosono
Tousif Ahmed
Apu Kapadia
Bryan C. Semaan
2020
conf/sp
Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.
Rakibul Hasan
David J. Crandall
Mario Fritz
Apu Kapadia
2020
conf/sp
Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings.
Mary Jean Amon
Rakibul Hasan
Kurt Hugenberg
Bennett I. Bertenthal
Apu Kapadia
2018
conf/soups
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography.
Yasmeen Rashidi
Tousif Ahmed
Felicia Patel
Emily Fath
Apu Kapadia
Christena Nippert-Eng
Norman Makoto Su
2017
journals/popets
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings.
Qatrunnada Ismail
Tousif Ahmed
Kelly Caine
Apu Kapadia
Michael K. Reiter
2016
journals/popets
Editors' Introduction.
Claudia Díaz
Apu Kapadia
2016
journals/popets
Editors' Introduction.
Claudia Díaz
Apu Kapadia
2016
journals/popets
Editors' Introduction.
Claudia Díaz
Apu Kapadia
2016
journals/popets
Editor's Introduction.
Apu Kapadia
2016
conf/soups
Addressing Physical Safety, Security, and Privacy for People with Visual Impairments.
Tousif Ahmed
Patrick Shaffer
Kay Connelly
David J. Crandall
Apu Kapadia
2015
journals/popets
Editors' Introduction.
Apu Kapadia
Steven J. Murdoch
2015
journals/popets
Editors' Introduction.
Apu Kapadia
Steven J. Murdoch
2014
conf/ccs
Community-Enhanced De-anonymization of Online Social Networks.
Shirin Nilizadeh
Apu Kapadia
Yong-Yeol Ahn
2014
conf/ndss
PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces.
Robert Templeman
Mohammed Korayem
David J. Crandall
Apu Kapadia
2014
conf/wisec
Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems.
Luke Hutton
Tristan Henderson
Apu Kapadia
2013
conf/ndss
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones.
Robert Templeman
Zahid Rahman
David J. Crandall
Apu Kapadia
2012
conf/ccs
PERM: practical reputation-based blacklisting without TTPS.
Man Ho Au
Apu Kapadia
2012
conf/uss
GANGRENE: Exploring the Mortality of Flash Memory.
Robert Templeman
Apu Kapadia
2012
conf/fc
My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules.
Sameer Patil
Yann Le Gall
Adam J. Lee
Apu Kapadia
2012
conf/nspw
Pools, clubs and security: designing for a party not a person.
Zheng Dong
Vaibhav Garg
L. Jean Camp
Apu Kapadia
2012
conf/soups
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice.
Sameer Patil
Gregory Norcie
Apu Kapadia
Adam J. Lee
2012
conf/ndss
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
Man Ho Au
Apu Kapadia
Willy Susilo
2011
conf/soups
Eyeing your exposure: quantifying and controlling information sharing for improved privacy.
Roman Schlegel
Apu Kapadia
Adam J. Lee
2011
conf/ndss
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
Roman Schlegel
Kehuan Zhang
Xiao-yong Zhou
Mehool Intwala
Apu Kapadia
XiaoFeng Wang
2010
conf/ccs
ReDS: reputation for directory services in P2P systems.
Ruj Akavipat
Apurv Dhadphale
Apu Kapadia
Matthew Wright
2008
conf/ccs
PEREA: towards practical TTP-free revocation in anonymous authentication.
Patrick P. Tsang
Man Ho Au
Apu Kapadia
Sean W. Smith
2008
conf/ndss
Halo: High-Assurance Locate for Distributed Hash Tables.
Apu Kapadia
Nikos Triandopoulos
2007
conf/ccs
Blacklistable anonymous credentials: blocking misbehaving users without ttps.
Patrick P. Tsang
Man Ho Au
Apu Kapadia
Sean W. Smith
2007
conf/soups
TwoKind authentication: usable authenticators for untrustworthy environments.
Katelin Bailey
Linden Vongsathorn
Apu Kapadia
Chris Masone
Sean W. Smith
2007
conf/ndss
Attribute-Based Publishing with Hidden Credentials and Hidden Policies.
Apu Kapadia
Patrick P. Tsang
Sean W. Smith
2004
conf/ccs
KNOW Why your access was denied: regulating feedback for usable security.
Apu Kapadia
Geetanjali Sampemane
Roy H. Campbell
Coauthors
Adam J. Lee
(3)
Apu Kapadia
(33)
Apurv Dhadphale
(1)
Bennett I. Bertenthal
(1)
Brianne Campbell
(1)
Bryan C. Semaan
(1)
Bryan Dosono
(1)
Cheng Guo
(1)
Chris Masone
(1)
Christena Nippert-Eng
(1)
Claudia Díaz
(3)
David J. Crandall
(4)
Donald S. Williamson
(1)
Emily Fath
(1)
Eun Ji Seong
(1)
Felicia Patel
(1)
Geetanjali Sampemane
(1)
Gregory Norcie
(1)
Katelin Bailey
(1)
Kay Connelly
(1)
Kehuan Zhang
(1)
Kelly Caine
(2)
Kurt Hugenberg
(1)
L. Jean Camp
(1)
Linden Vongsathorn
(1)
Luke Hutton
(1)
Man Ho Au
(4)
Mario Fritz
(1)
Mary Jean Amon
(1)
Matthew Wright
(1)
Mehool Intwala
(1)
Michael K. Reiter
(2)
Mohammed Korayem
(1)
Nikos Triandopoulos
(1)
Norman Makoto Su
(1)
Patrick P. Tsang
(3)
Patrick Shaffer
(1)
Qatrunnada Ismail
(1)
Rakibul Hasan
(2)
Robert Templeman
(3)
Roman Schlegel
(2)
Roy H. Campbell
(1)
Ruj Akavipat
(1)
Sameer Patil
(2)
Sean W. Smith
(4)
Shirin Nilizadeh
(1)
Steven J. Murdoch
(2)
Taslima Akter
(1)
Tousif Ahmed
(4)
Tristan Henderson
(1)
Vaibhav Garg
(1)
Willy Susilo
(1)
Xiao-yong Zhou
(1)
XiaoFeng Wang
(1)
Yann Le Gall
(1)
Yasmeen Rashidi
(1)
Yong-Yeol Ahn
(1)
Yuchen Liu
(1)
Zahid Rahman
(1)
Zheng Dong
(1)
Ziyu Xiang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to