팔로우
Serge Egelman
University of California, Berkeley / International Computer Science Institute (ICSI) / AppCensus
cs.berkeley.edu의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Android Permissions: User Attention, Comprehension, and Behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
15572012
The effect of online privacy information on purchasing behavior: An experimental study
JY Tsai, S Egelman, L Cranor, A Acquisti
Information Systems Research 22 (2), 254-268, 2011
12922011
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, J Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
9032008
Crying Wolf: An Empirical Study of SSL Warning Effectiveness.
J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
USENIX Security Symposium, 399-416, 2009
6372009
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
5812011
Phinding phish: Evaluating anti-phishing tools
Y Zhang, S Egelman, L Cranor, J Hong
Network and Distributed Systems Symposium (NDSS), 2006
554*2006
Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS)
S Egelman, E Peer
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
4062015
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
3952012
Facebook and Privacy: It’s Complicated
M Johnson, S Egelman, SM Bellovin
Symposium on Usable Privacy and Security (SOUPS), 2012
3142012
Does my password go up to eleven?: the impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
3052013
Android Permissions Remystified: A Field Study on Contextual Integrity.
P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov
USENIX Security Symposium, 499-514, 2015
2742015
“Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale
I Reyes, P Wijesekera, J Reardon, AEB On, A Razaghpanah, ...
Proceedings on Privacy Enhancing Technologies 2018 (3), 63-83, 2018
2692018
It's no secret. measuring the security and reliability of authentication via “secret” questions
S Schechter, AJB Brush, S Egelman
2009 30th IEEE Symposium on Security and Privacy, 375-390, 2009
2572009
50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System
J Reardon, Á Feal, P Wijesekera, AEB On, N Vallina-Rodriguez, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 603-620, 2019
2302019
Are You Ready to Lock?
S Egelman, S Jain, RS Portnoff, K Liao, S Consolvo, D Wagner
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2242014
Choice architecture and smartphone privacy: There’s a price for that
S Egelman, AP Felt, D Wagner
The Economics of Information Security and Privacy, 211-236, 2013
2242013
Privacy Attitudes of Smart Speaker Users
N Malkin, J Deatrick, A Tong, P Wijesekera, S Egelman, D Wagner
Proceedings on Privacy Enhancing Technologies 2019 (4), 250-271, 2019
2112019
Timing is everything?: the effects of timing and placement of online privacy indicators
S Egelman, J Tsai, LF Cranor, A Acquisti
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
2082009
Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat
S Pearman, J Thomas, PE Naeini, H Habib, L Bauer, N Christin, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1982017
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences
P Wijesekera, A Baokar, L Tsai, J Reardon, S Egelman, D Wagner, ...
2017 IEEE Symposium on Security and Privacy (SP), 1077-1093, 2017
1922017
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20