Federated identity management systems: A privacy-based characterization E Birrell, FB Schneider IEEE security & privacy 11 (5), 36-48, 2013 | 71 | 2013 |
Approximately strategy-proof voting E Birrell, R Pass CORNELL UNIV ITHACA NY DEPT OF COMPUTER SCIENCE, 2011 | 47 | 2011 |
Enforcing privacy policies with meta-code HD Johansen, E Birrell, R Van Renesse, FB Schneider, M Stenhaug, ... Proceedings of the 6th Asia-Pacific Workshop on Systems, 1-7, 2015 | 34 | 2015 |
Ancile: Enhancing privacy for ubiquitous computing with use-based privacy E Bagdasaryan, G Berlstein, J Waterman, E Birrell, N Foster, ... Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society …, 2019 | 23 | 2019 |
SGX enforcement of use-based privacy E Birrell, A Gjerdrum, R van Renesse, H Johansen, D Johansen, ... Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 155-167, 2018 | 21 | 2018 |
Replication: How well do my results generalize now? The external validity of online privacy and security surveys J Tang, E Birrell, A Lerner Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 367-385, 2022 | 19 | 2022 |
Defining privacy: How users interpret technical terms in privacy policies J Tang, H Shoemaker, A Lerner, E Birrell Proceedings on Privacy Enhancing Technologies 2021 (3), 2021 | 19 | 2021 |
The knot quandle E Birrell Instructions for Authors. All submissions should, 33, 2007 | 19 | 2007 |
Randomness-Dependent Message Security. E Birrell, KM Chung, R Pass, S Telang TCC 13, 700-720, 2013 | 17 | 2013 |
A reactive approach for use-based privacy E Birrell, FB Schneider | 12 | 2017 |
(Un)clear and (In)conspicuous: The right to opt-out of sale under CCPA S O'Connor, R Nurwono, A Siebel, E Birrell Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021 | 11 | 2021 |
Prospective Consent: The Effect of Framing on Cookie Consent Decisions E Ma, E Birrell CHI Conference on Human Factors in Computing Systems Extended Abstracts, 1-6, 2022 | 9 | 2022 |
How well do my results generalize now? The external validity of online privacy and security surveys J Tang, E Birrell, A Lerner arXiv preprint arXiv:2202.14036, 2022 | 8 | 2022 |
Fine-grained user privacy from avenance tags E Birrell, FB Schneider | 8 | 2014 |
Composition of zero-knowledge proofs with efficient provers E Birrell, S Vadhan Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 5 | 2010 |
Poli-see: An Interactive Tool for Visualizing Privacy Policies W Guo, J Rodolitz, E Birrell Proceedings of the 19th Workshop on Privacy in the Electronic Society, 57-71, 2020 | 4 | 2020 |
Policy-based federated learning K Katevas, E Bagdasaryan, J Waterman, MM Safadieh, E Birrell, ... arXiv preprint arXiv:2003.06612, 2020 | 3 | 2020 |
“Ask App Not to Track”: The Effect of Opt-In Tracking Authorization on Mobile Privacy A DeGiulio, H Lee, E Birrell Emerging Technologies for Authorization and Authentication: 4th …, 2022 | 1 | 2022 |
Prospects for Improving Password Selection E Ma, S Hasama, E Lumba, E Birrell arXiv preprint arXiv:2201.01350, 2022 | 1 | 2022 |
Technology and the Fourth Amendment E Birrell Retrieved March 5, 2015 | 1 | 2015 |