Author: Apu Kapadia
Publication Overview
Publication period start: 2012
Number of co-authors: 14
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Bailey,
Katelin,
Vongsathorn,
Linden,
Kapadia,
Apu,
Masone,
Chris,
Smith,
Sean W.
(2007):
TwoKind authentication: usable authenticators for untrustworthy environments.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 169-170.
https://cups.cs.cmu.edu/soups/2007/posters/p169_bailey.pdf
Kapadia,
Apu,
Triandopoulos,
Nikos,
Cornelius,
Cory,
Peebles,
Daniel,
Kotz,
David
(2008):
AnonySense: Opportunistic and Privacy-Preserving Context Collection.
In:
Indulska,
Jadwiga,
Patterson,
Donald J.,
Rodden,
Tom,
Ott,
Max
(eds.)
Pervasive 2008 - Pervasive Computing, 6th International Conference
May 19-22,
2008,
Sydney, Australia.
pp. 280-297.
https://dx.doi.org/10.1007/978-3-540-79576-6_17
Kapadia,
Apu,
Henderson,
Tristan,
Fielding,
Jeffrey J.,
Kotz,
David
(2007):
Virtual Walls: Protecting Digital Privacy in Pervasive Environments.
In:
LaMarca,
Anthony,
Langheinrich,
Marc,
Truong,
Khai N.
(eds.)
PERVASIVE 2007 - Pervasive Computing 5th International Conference
May 13-16,
2007,
Toronto, Canada.
pp. 162-179.
https://dx.doi.org/10.1007/978-3-540-72037-9_10
Patil,
Sameer,
Kapadia,
Apu
(2012):
Are you exposed?: conveying information exposure.
In:
Companion Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work
,
2012,
.
pp. 191-194.
https://dx.doi.org/10.1145/2141512.2141575
Schlegel,
Roman,
Kapadia,
Apu,
Lee,
Adam J.
(2011):
Eyeing your exposure: quantifying and controlling information sharing for improved privacy.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 14.
https://dx.doi.org/10.1145/2078827.2078846
Patil,
Sameer,
Norcie,
Greg,
Kapadia,
Apu,
Lee,
Adam J.
(2012):
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive pr.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 5.
https://dx.doi.org/10.1145/2335356.2335363