Author: Apu Kapadia

Publication Overview

Publication period start: 2012
Number of co-authors: 14

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Bailey, Katelin, Vongsathorn, Linden, Kapadia, Apu, Masone, Chris, Smith, Sean W. (2007): TwoKind authentication: usable authenticators for untrustworthy environments. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 169-170. https://cups.cs.cmu.edu/soups/2007/posters/p169_bailey.pdf
Kapadia, Apu, Triandopoulos, Nikos, Cornelius, Cory, Peebles, Daniel, Kotz, David (2008): AnonySense: Opportunistic and Privacy-Preserving Context Collection. In: Indulska, Jadwiga, Patterson, Donald J., Rodden, Tom, Ott, Max (eds.) Pervasive 2008 - Pervasive Computing, 6th International Conference May 19-22, 2008, Sydney, Australia. pp. 280-297. https://dx.doi.org/10.1007/978-3-540-79576-6_17
Kapadia, Apu, Henderson, Tristan, Fielding, Jeffrey J., Kotz, David (2007): Virtual Walls: Protecting Digital Privacy in Pervasive Environments. In: LaMarca, Anthony, Langheinrich, Marc, Truong, Khai N. (eds.) PERVASIVE 2007 - Pervasive Computing 5th International Conference May 13-16, 2007, Toronto, Canada. pp. 162-179. https://dx.doi.org/10.1007/978-3-540-72037-9_10
Patil, Sameer, Kapadia, Apu (2012): Are you exposed?: conveying information exposure. In: Companion Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work , 2012, . pp. 191-194. https://dx.doi.org/10.1145/2141512.2141575
Schlegel, Roman, Kapadia, Apu, Lee, Adam J. (2011): Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 14. https://dx.doi.org/10.1145/2078827.2078846
Patil, Sameer, Norcie, Greg, Kapadia, Apu, Lee, Adam J. (2012): Reasons, rewards, regrets: privacy considerations in location sharing as an interactive pr. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 5. https://dx.doi.org/10.1145/2335356.2335363
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,044 others.

Learn to design a life you love.

Next email in
6
days
9
hrs
34
mins
44
secs