Publications
Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
(2016). Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms.
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
(2015). The Key to Getting People to Be Safer Online: Make the Appeals More Personal.
Wall Street Journal.
(2021).
(2015). The Usable Security & Privacy Group.
30 Years of Innovation: ICSI 30th Anniversary Celebration.
(2018).
(2014). Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
(2015). The Myth of the Average User: Improving Privacy and Security Systems through Individualization.
Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
(2015).
(1987).
(2012).
(1993).
(2006).
(2007). Practical Data-Centric Storage.
Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
(2006). Resolving Inter-Domain Policy Disputes.
ACM SIGCOMM Computer Communication Review. 37(4), 157-168.
(2007). Resolving Inter-Domain Policy Disputes.
157-168.
(2007).
(2007). A Modular Network Layer for Sensornets.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06). 249-262.
(2006).
(2006). The ICSI Meeting Corpus: Close-Talking and Far-Field, Multi-Channel Transcriptions for Speech and Language Researchers.
Proceedings of the Workshop on Compiling and Processing Spoken Language Corpora at the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 8-11.
(2004).
(2001). Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems.
Journal of the Association for Computing Machinery. 19(2), 248-264.
(1972).
(2011). New Techniques for Making Transport Protocols Robust to Corruption-Based Loss.
ACM SIGCOMM Computer Communication Review. 34(5), 75-88.
(2004).
(2003).