Federated identity management systems: A privacy-based characterization E Birrell, FB Schneider IEEE security & privacy 11 (5), 36-48, 2013 | 79 | 2013 |
Replication: How well do my results generalize now? The external validity of online privacy and security surveys J Tang, E Birrell, A Lerner Eighteenth symposium on usable privacy and security (SOUPS 2022), 367-385, 2022 | 67* | 2022 |
Approximately strategy-proof voting E Birrell, R Pass IJCAI Proceedings-International Joint Conference on Artificial Intelligence …, 2011 | 49 | 2011 |
Enforcing privacy policies with meta-code HD Johansen, E Birrell, R Van Renesse, FB Schneider, M Stenhaug, ... Proceedings of the 6th Asia-Pacific Workshop on Systems, 1-7, 2015 | 38 | 2015 |
Defining privacy: How users interpret technical terms in privacy policies J Tang, H Shoemaker, A Lerner, E Birrell Proceedings on Privacy Enhancing Technologies, 2021 | 29 | 2021 |
Prospective consent: The effect of framing on cookie consent decisions E Ma, E Birrell CHI Conference on Human Factors in Computing Systems Extended Abstracts, 1-6, 2022 | 26 | 2022 |
Ancile: Enhancing privacy for ubiquitous computing with use-based privacy E Bagdasaryan, G Berlstein, J Waterman, E Birrell, N Foster, ... Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society …, 2019 | 26 | 2019 |
SGX enforcement of use-based privacy E Birrell, A Gjerdrum, R van Renesse, H Johansen, D Johansen, ... Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 155-167, 2018 | 26 | 2018 |
(Un)clear and (In)conspicuous: The right to opt-out of sale under CCPA S O'Connor, R Nurwono, A Siebel, E Birrell Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021 | 22 | 2021 |
The knot quandle E Birrell Instructions for Authors. All submissions should, 33, 2007 | 20 | 2007 |
Randomness-dependent message security E Birrell, KM Chung, R Pass, S Telang Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 19 | 2013 |
Poli-see: An interactive tool for visualizing privacy policies W Guo, J Rodolitz, E Birrell Proceedings of the 19th Workshop on Privacy in the Electronic Society, 57-71, 2020 | 12 | 2020 |
A reactive approach for use-based privacy E Birrell, FB Schneider | 12 | 2017 |
A us-uk usability evaluation of consent management platform cookie consent interface design on desktop and mobile ER Bouma-Sims, M Li, Y Lin, A Sakura-Lemessy, A Nisenoff, E Young, ... Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023 | 9 | 2023 |
Fine-grained user privacy from avenance tags E Birrell, FB Schneider | 8 | 2014 |
The Impact of Visibility on the Right to Opt-out of Sale under CCPA A Siebel, E Birrell arXiv preprint arXiv:2206.10545, 2022 | 6 | 2022 |
“Ask App Not to Track”: The Effect of Opt-In Tracking Authorization on Mobile Privacy A DeGiulio, H Lee, E Birrell International Workshop on Emerging Technologies for Authorization and …, 2021 | 6 | 2021 |
Composition of zero-knowledge proofs with efficient provers E Birrell, S Vadhan Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 5 | 2010 |
Prospects for improving password selection J Amador, Y Ma, S Hasama, E Lumba, G Lee, E Birrell Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 263-282, 2023 | 4 | 2023 |
Policy-based federated learning K Katevas, E Bagdasaryan, J Waterman, MM Safadieh, E Birrell, ... arXiv preprint arXiv:2003.06612, 2020 | 4 | 2020 |