Follow
Eleanor Birrell
Eleanor Birrell
Verified email at pomona.edu - Homepage
Title
Cited by
Cited by
Year
Federated identity management systems: A privacy-based characterization
E Birrell, FB Schneider
IEEE security & privacy 11 (5), 36-48, 2013
792013
Replication: How well do my results generalize now? The external validity of online privacy and security surveys
J Tang, E Birrell, A Lerner
Eighteenth symposium on usable privacy and security (SOUPS 2022), 367-385, 2022
67*2022
Approximately strategy-proof voting
E Birrell, R Pass
IJCAI Proceedings-International Joint Conference on Artificial Intelligence …, 2011
492011
Enforcing privacy policies with meta-code
HD Johansen, E Birrell, R Van Renesse, FB Schneider, M Stenhaug, ...
Proceedings of the 6th Asia-Pacific Workshop on Systems, 1-7, 2015
372015
Defining privacy: How users interpret technical terms in privacy policies
J Tang, H Shoemaker, A Lerner, E Birrell
Proceedings on Privacy Enhancing Technologies, 2021
292021
Prospective consent: The effect of framing on cookie consent decisions
E Ma, E Birrell
CHI Conference on Human Factors in Computing Systems Extended Abstracts, 1-6, 2022
262022
Ancile: Enhancing privacy for ubiquitous computing with use-based privacy
E Bagdasaryan, G Berlstein, J Waterman, E Birrell, N Foster, ...
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society …, 2019
262019
SGX enforcement of use-based privacy
E Birrell, A Gjerdrum, R van Renesse, H Johansen, D Johansen, ...
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 155-167, 2018
262018
(Un)clear and (In)conspicuous: The right to opt-out of sale under CCPA
S O'Connor, R Nurwono, A Siebel, E Birrell
Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021
222021
The knot quandle
E Birrell
Instructions for Authors. All submissions should, 33, 2007
202007
Randomness-dependent message security
E Birrell, KM Chung, R Pass, S Telang
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
192013
Poli-see: An interactive tool for visualizing privacy policies
W Guo, J Rodolitz, E Birrell
Proceedings of the 19th Workshop on Privacy in the Electronic Society, 57-71, 2020
122020
A reactive approach for use-based privacy
E Birrell, FB Schneider
122017
A us-uk usability evaluation of consent management platform cookie consent interface design on desktop and mobile
ER Bouma-Sims, M Li, Y Lin, A Sakura-Lemessy, A Nisenoff, E Young, ...
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023
92023
Fine-grained user privacy from avenance tags
E Birrell, FB Schneider
82014
The Impact of Visibility on the Right to Opt-out of Sale under CCPA
A Siebel, E Birrell
arXiv preprint arXiv:2206.10545, 2022
62022
“Ask App Not to Track”: The Effect of Opt-In Tracking Authorization on Mobile Privacy
A DeGiulio, H Lee, E Birrell
International Workshop on Emerging Technologies for Authorization and …, 2021
62021
Composition of zero-knowledge proofs with efficient provers
E Birrell, S Vadhan
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
52010
Prospects for improving password selection
J Amador, Y Ma, S Hasama, E Lumba, G Lee, E Birrell
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 263-282, 2023
42023
Policy-based federated learning
K Katevas, E Bagdasaryan, J Waterman, MM Safadieh, E Birrell, ...
arXiv preprint arXiv:2003.06612, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20