default search action
Apu Kapadia
Person information
- affiliation: Indiana University Bloomington, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Apu Kapadia, Yang Wang:
Inclusive Privacy and Security. IEEE Secur. Priv. 22(5): 10-12 (2024) - [c77]Sophie Stephenson, Christopher Nathaniel Page, Miranda Wei, Apu Kapadia, Franziska Roesner:
Sharenting on TikTok: Exploring Parental Sharing Behaviors and the Discourse Around Children's Online Privacy. CHI 2024: 114:1-114:17 - [c76]Sabid Bin Habib Pias, Ran Huang, Donald S. Williamson, Minjeong Kim, Apu Kapadia:
The Impact of Perceived Tone, Age, and Gender on Voice Assistant Persuasiveness in the Context of Product Recommendations. CUI 2024: 20 - [c75]Taslima Akter, Manohar Swaminathan, Apu Kapadia:
Toward Effective Communication of AI-Based Decisions in Assistive Tools: Conveying Confidence and Doubt to People with Visual Impairments at Accelerated Speech. W4A 2024: 177-189 - [e4]Patrick Gage Kelley, Apu Kapadia:
Twentieth Symposium on Usable Privacy and Security, SOUPS 2024, Philadelphia, PA, USA, August 11-13, 2024. USENIX Association 2024 [contents] - [i11]Sabid Bin Habib Pias, Alicia Freel, Timothy Trammel, Taslima Akter, Donald S. Williamson, Apu Kapadia:
The Drawback of Insight: Detailed Explanations Can Reduce Agreement with XAI. CoRR abs/2404.19629 (2024) - [i10]Sabid Bin Habib Pias, Ran Huang, Donald S. Williamson, Minjeong Kim, Apu Kapadia:
The Impact of Perceived Tone, Age, and Gender on Voice Assistant Persuasiveness in the Context of Product Recommendations. CoRR abs/2405.04791 (2024) - [i9]Sabid Bin Habib Pias, Alicia Freel, Ran Huang, Donald S. Williamson, Minjeong Kim, Apu Kapadia:
Building Trust Through Voice: How Vocal Tone Impacts User Perception of Attractiveness of Voice Assistants. CoRR abs/2409.18941 (2024) - 2023
- [j33]Carl E. Landwehr, Michael K. Reiter, Laurie A. Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, Apu Kapadia:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [j32]Filippo Menczer, David J. Crandall, Yong-Yeol Ahn, Apu Kapadia:
Addressing the harms of AI-generated inauthentic content. Nat. Mac. Intell. 5(7): 679-680 (2023) - [j31]Aaron Necaise, Tangila Islam Tanni, Aneka Williams, Yan Solihin, Apu Kapadia, Mary Jean Amon:
User Preferences for Interdependent Privacy Preservation Strategies in Social Media. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-30 (2023) - [j30]Mary Jean Amon, Aaron Necaise, Nika Kartvelishvili, Aneka Williams, Yan Solihin, Apu Kapadia:
Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social Media. ACM Trans. Comput. Hum. Interact. 30(3): 40:1-40:32 (2023) - [c74]Renita Washburn, Tangila Islam Tanni, Yan Solihin, Apu Kapadia, Mary Jean Amon:
Bottom-up psychosocial interventions for interdependent privacy: Effectiveness based on individual and content differences. CHI 2023: 188:1-188:20 - [e3]Patrick Gage Kelley, Apu Kapadia:
Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023. USENIX Association 2023 [contents] - [i8]Yuchen Liu, Apu Kapadia, Donald S. Williamson:
Privacy-preserving and Privacy-attacking Approaches for Speech and Audio - A Survey. CoRR abs/2309.15087 (2023) - 2022
- [j29]Mary Jean Amon, Nika Kartvelishvili, Bennett I. Bertenthal, Kurt Hugenberg, Apu Kapadia:
Sharenting and Children's Privacy in the United States: Parenting Style, Practices, and Perspectives on Sharing Young Children's Photos on Social Media. Proc. ACM Hum. Comput. Interact. 6(CSCW1): 116:1-116:30 (2022) - [j28]Imtiaz Ahmad, Taslima Akter, Zachary Buher, Rosta Farzan, Apu Kapadia, Adam J. Lee:
Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-31 (2022) - [j27]Sruti Bhagavatula, Lujo Bauer, Apu Kapadia:
"Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-27 (2022) - [j26]Sabid Bin Habib Pias, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, Adam J. Lee:
Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-30 (2022) - [j25]Taslima Akter, Tousif Ahmed, Apu Kapadia, Manohar Swaminathan:
Shared Privacy Concerns of the Visually Impaired and Sighted Bystanders with Camera-Based Assistive Technologies. ACM Trans. Access. Comput. 15(2): 11:1-11:33 (2022) - [c73]Rakibul Hasan, Cristobal Cheyre, Yong-Yeol Ahn, Roberto Hoyle, Apu Kapadia:
The Impact of Viral Posts on Visibility and Behavior of Professionals: A Longitudinal Study of Scientists on Twitter. ICWSM 2022: 323-334 - [c72]Yuchen Liu, Apu Kapadia, Donald S. Williamson:
Preventing sensitive-word recognition using self-supervised learning to preserve user-privacy for automatic speech recognition. INTERSPEECH 2022: 4207-4211 - [e2]Sonia Chiasson, Apu Kapadia:
Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022. USENIX Association 2022 [contents] - 2021
- [j24]Sanchari Das, Tousif Ahmed, Apu Kapadia, Sameer Patil:
Does This Photo Make Me Look Good?: How Social Media Feedback on Photos Impacts Posters, Outsiders, and Friends. Proc. ACM Hum. Comput. Interact. 5(CSCW1): 46:1-46:32 (2021) - [j23]Yuchen Liu, Ziyu Xiang, Eun Ji Seong, Apu Kapadia, Donald S. Williamson:
Defending Against Microphone-Based Attacks with Personalized Noise. Proc. Priv. Enhancing Technol. 2021(2): 130-150 (2021) - [c71]Shawn E. Fagan, Lauren Wade, Kurt Hugenberg, Apu Kapadia, Bennett I. Bertenthal:
Sharing Photos on Social Media: Visual Attention Affects Real-World Decision Making. AHFE (10) 2021: 199-206 - [c70]Rakibul Hasan, Bennett I. Bertenthal, Kurt Hugenberg, Apu Kapadia:
Your Photo is so Funny that I don't Mind Violating Your Privacy by Sharing it: Effects of Individual Humor Styles on Online Photo-sharing Behaviors. CHI 2021: 556:1-556:14 - [c69]Sruti Bhagavatula, Lujo Bauer, Apu Kapadia:
What breach? Measuring online awareness of security incidents by studying real-world browsing behavior. EuroUSEC 2021: 180-199 - [c68]Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine:
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. USENIX Security Symposium 2021: 1-18 - 2020
- [j22]Yasmeen Rashidi, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su:
"It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media. Proc. ACM Hum. Comput. Interact. 4(CSCW): 023:1-023:25 (2020) - [j21]Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, Adam J. Lee:
Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum. Comput. Interact. 4(CSCW2): 116:1-116:28 (2020) - [j20]Roberto Hoyle, Luke Stark, Qatrunnada Ismail, David J. Crandall, Apu Kapadia, Denise L. Anthony:
Privacy Norms and Preferences for Photos Posted Online. ACM Trans. Comput. Hum. Interact. 27(4): 30:1-30:27 (2020) - [c67]Taslima Akter, Tousif Ahmed, Apu Kapadia, Manohar Swaminathan:
Privacy Considerations of the Visually Impaired with Camera Based Assistive Technologies: Misrepresentation, Impropriety, and Fairness. ASSETS 2020: 32:1-32:14 - [c66]Shawn Fagan, Lauren Wade, Kurt Hugenberg, Apu Kapadia, Bennett I. Bertenthal:
Visual Attention and Real-World Decision Making: Sharing Photos on Social Media. CogSci 2020 - [c65]Rakibul Hasan, David J. Crandall, Mario Fritz, Apu Kapadia:
Automatically Detecting Bystanders in Photos to Reduce Privacy Risks. SP 2020: 318-335 - [c64]Mary Jean Amon, Rakibul Hasan, Kurt Hugenberg, Bennett I. Bertenthal, Apu Kapadia:
Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings. SP 2020: 1350-1366 - [c63]Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan C. Semaan:
"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. USENIX Security Symposium 2020: 1929-1948 - [i7]Sruti Bhagavatula, Lujo Bauer, Apu Kapadia:
What breach? Measuring online awareness of security incidents by studying real-world browsing behavior. CoRR abs/2010.09843 (2020) - [i6]Sruti Bhagavatula, Lujo Bauer, Apu Kapadia:
(How) Do people change their passwords after a breach? CoRR abs/2010.09853 (2020)
2010 – 2019
- 2019
- [c62]Rakibul Hasan, Yifang Li, Eman T. Hassan, Kelly Caine, David J. Crandall, Roberto Hoyle, Apu Kapadia:
Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms. CHI 2019: 367 - [i5]Tousif Ahmed, Rakibul Hasan, Kay Connelly, David J. Crandall, Apu Kapadia:
Conveying Situational Information to People with Visual Impairments. CoRR abs/1904.06117 (2019) - 2018
- [j19]Tousif Ahmed, Apu Kapadia, Venkatesh Potluri, Manohar Swaminathan:
Up to a Limit?: Privacy Concerns of Bystanders and Their Willingness to Share Additional Information with Visually Impaired Users of Assistive Technologies. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3): 89:1-89:27 (2018) - [c61]Rakibul Hasan, Eman T. Hassan, Yifang Li, Kelly Caine, David J. Crandall, Roberto Hoyle, Apu Kapadia:
Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy. CHI 2018: 47 - [c60]Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su:
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography. SOUPS @ USENIX Security Symposium 2018: 143-157 - 2017
- [j18]Tousif Ahmed, Roberto Hoyle, Patrick Shaffer, Kay Connelly, David J. Crandall, Apu Kapadia:
Understanding the Physical Safety, Security, and Privacy Concerns of People with Visual Impairments. IEEE Internet Comput. 21(3): 56-63 (2017) - [j17]Bryan Dosono, Yasmeen Rashidi, Taslima Akter, Bryan C. Semaan, Apu Kapadia:
Challenges in Transitioning from Civil to Military Culture: Hyper-Selective Disclosure through ICTs. Proc. ACM Hum. Comput. Interact. 1(CSCW): 41:1-41:23 (2017) - [j16]Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia, Michael K. Reiter:
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings. Proc. Priv. Enhancing Technol. 2017(4): 119-137 (2017) - [c59]Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J. Lee, Kami Vaniea:
Was my message read?: Privacy and Signaling on Facebook Messenger. CHI 2017: 3838-3842 - [c58]Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J. Lee, Kami Vaniea:
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks. CSCW 2017: 555-566 - [c57]Eman T. Hassan, Rakibul Hasan, Patrick Shaffer, David J. Crandall, Apu Kapadia:
Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos. CVPR Workshops 2017: 1333-1342 - 2016
- [j15]Apu Kapadia:
Editor's Introduction. Proc. Priv. Enhancing Technol. 2016(1): 1-3 (2016) - [j14]Claudia Díaz, Apu Kapadia:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2016(2): 1-3 (2016) - [j13]Claudia Díaz, Apu Kapadia:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2016(3): 1-3 (2016) - [j12]Claudia Díaz, Apu Kapadia:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2016(4): 1-3 (2016) - [c56]Mohammed Korayem, Robert Templeman, Dennis Chen, David J. Crandall, Apu Kapadia:
Enhancing Lifelogging Privacy by Detecting Screens. CHI 2016: 4309-4314 - [c55]Shirin Nilizadeh, Anne Groggel, Peter Lista, Srijita Das, Yong-Yeol Ahn, Apu Kapadia, Fabio Rojas:
Twitter's Glass Ceiling: The Effect of Perceived Gender on Online Visibility. ICWSM 2016: 289-298 - [c54]Tousif Ahmed, Patrick Shaffer, Kay Connelly, David J. Crandall, Apu Kapadia:
Addressing Physical Safety, Security, and Privacy for People with Visual Impairments. SOUPS 2016: 341-354 - 2015
- [j11]Apu Kapadia, Steven J. Murdoch:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2015(1): 1-3 (2015) - [j10]Apu Kapadia, Steven J. Murdoch:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2015(2): 1-3 (2015) - [j9]Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz:
Location Privacy for Mobile Crowd Sensing through Population Mapping. Sensors 15(7): 15285-15310 (2015) - [c53]Qatrunnada Ismail, Tousif Ahmed, Apu Kapadia, Michael K. Reiter:
Crowdsourced Exploration of Security Configurations. CHI 2015: 467-476 - [c52]Sameer Patil, Roberto Hoyle, Roman Schlegel, Apu Kapadia, Adam J. Lee:
Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback. CHI 2015: 1415-1418 - [c51]Roberto Hoyle, Robert Templeman, Denise L. Anthony, David J. Crandall, Apu Kapadia:
Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras. CHI 2015: 1645-1648 - [c50]Tousif Ahmed, Roberto Hoyle, Kay Connelly, David J. Crandall, Apu Kapadia:
Privacy Concerns and Behaviors of People with Visual Impairments. CHI 2015: 3523-3532 - [c49]Zheng Dong, Apu Kapadia, Jim Blythe, L. Jean Camp:
Beyond the lock icon: real-time detection of phishing websites using public key certificates. eCrime 2015: 1-12 - 2014
- [j8]Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew K. Wright:
ReDS: A Framework for Reputation-Enhanced DHTs. IEEE Trans. Parallel Distributed Syst. 25(2): 321-331 (2014) - [c48]Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn:
Community-Enhanced De-anonymization of Online Social Networks. CCS 2014: 537-548 - [c47]Sameer Patil, Roman Schlegel, Apu Kapadia, Adam J. Lee:
Reflection or action?: how feedback and control affect location sharing decisions. CHI 2014: 101-110 - [c46]Alana Libonati, Kelly Caine, Apu Kapadia, Michael K. Reiter:
Defending against device theft with human notarization. CollaborateCom 2014: 8-17 - [c45]Roberto Hoyle, Robert Templeman, Steven Armes, Denise L. Anthony, David J. Crandall, Apu Kapadia:
Privacy behaviors of lifeloggers using wearable cameras. UbiComp 2014: 571-582 - [c44]Robert Templeman, Apu Kapadia, Roberto Hoyle, David J. Crandall:
Reactive security: responding to visual stimuli from wearable cameras. UbiComp Adjunct 2014: 1297-1306 - [c43]Robert Templeman, Mohammed Korayem, David J. Crandall, Apu Kapadia:
PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. NDSS 2014 - [c42]Luke Hutton, Tristan Henderson, Apu Kapadia:
Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems. WISEC 2014: 81-86 - [i4]Mohammed Korayem, Robert Templeman, Dennis Chen, David J. Crandall, Apu Kapadia:
ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras. CoRR abs/1412.0008 (2014) - 2013
- [c41]Roberto Hoyle, Sameer Patil, Dejanae White, Jerald Dawson, Paul Whalen, Apu Kapadia:
Attire: conveying information exposure through avatar apparel. CSCW Companion 2013: 19-22 - [c40]Vaibhav Garg, Sameer Patil, Apu Kapadia, L. Jean Camp:
Peer-produced privacy protection. ISTAS 2013: 147-154 - [c39]Robert Templeman, Zahid Rahman, David J. Crandall, Apu Kapadia:
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. NDSS 2013 - 2012
- [c38]Man Ho Au, Apu Kapadia:
PERM: practical reputation-based blacklisting without TTPS. CCS 2012: 929-940 - [c37]Sameer Patil, Gregory Norcie, Apu Kapadia, Adam J. Lee:
"Check out where I am!": location-sharing motivations, preferences, and practices. CHI Extended Abstracts 2012: 1997-2002 - [c36]Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, Apu Kapadia:
Cachet: a decentralized architecture for privacy preserving social networking with caching. CoNEXT 2012: 337-348 - [c35]Sameer Patil, Apu Kapadia:
Are you exposed?: conveying information exposure. CSCW (Companion) 2012: 191-194 - [c34]Sameer Patil, Yann Le Gall, Adam J. Lee, Apu Kapadia:
My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules. Financial Cryptography Workshops 2012: 86-97 - [c33]Man Ho Au, Apu Kapadia, Willy Susilo:
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. NDSS 2012 - [c32]Zheng Dong, Vaibhav Garg, L. Jean Camp, Apu Kapadia:
Pools, clubs and security: designing for a party not a person. NSPW 2012: 77-86 - [c31]Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia:
DECENT: A decentralized architecture for enforcing privacy in online social networks. PerCom Workshops 2012: 326-332 - [c30]Yann Le Gall, Adam J. Lee, Apu Kapadia:
PlexC: a policy language for exposure control. SACMAT 2012: 219-228 - [c29]Sameer Patil, Gregory Norcie, Apu Kapadia, Adam J. Lee:
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. SOUPS 2012: 5 - [c28]Robert Templeman, Apu Kapadia:
GANGRENE: Exploring the Mortality of Flash Memory. HotSec 2012 - [e1]Ting Yu, V. N. Venkatakrishan, Apu Kapadia:
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012. ACM 2012, ISBN 978-1-4503-1664-4 [contents] - [i3]Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew K. Wright:
ReDS: A Framework for Reputation-Enhanced DHTs. CoRR abs/1209.4867 (2012) - [i2]Robert Templeman, Zahid Rahman, David J. Crandall, Apu Kapadia:
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. CoRR abs/1209.5982 (2012) - 2011
- [j7]Minho Shin, Cory Cornelius, Daniel Peebles, Apu Kapadia, David Kotz, Nikos Triandopoulos:
AnonySense: A system for anonymous opportunistic sensing. Pervasive Mob. Comput. 7(1): 16-30 (2011) - [j6]Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sean W. Smith:
Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Trans. Dependable Secur. Comput. 8(2): 256-269 (2011) - [j5]Man Ho Au, Patrick P. Tsang, Apu Kapadia:
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. ACM Trans. Inf. Syst. Secur. 14(4): 29:1-29:34 (2011) - [c27]Apu Kapadia, Steven A. Myers, XiaoFeng Wang, Geoffrey C. Fox:
Toward securing sensor clouds. CTS 2011: 280-289 - [c26]Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, XiaoFeng Wang:
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. NDSS 2011 - [c25]Roman Schlegel, Apu Kapadia, Adam J. Lee:
Eyeing your exposure: quantifying and controlling information sharing for improved privacy. SOUPS 2011: 14 - [c24]Huina Mao, Xin Shuai, Apu Kapadia:
Loose tweets: an analysis of privacy leaks on twitter. WPES 2011: 1-12 - [c23]Shirin Nilizadeh, Naveed Alam, Nathaniel Husted, Apu Kapadia:
Pythia: a privacy aware, peer-to-peer network for social search. WPES 2011: 43-48 - [i1]Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia:
A Decentralized Architecture for Enforcing Privacy in Online Social Networks. CoRR abs/1111.5377 (2011) - 2010
- [j4]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Trans. Inf. Syst. Secur. 13(4): 39:1-39:33 (2010) - [c22]Ruj Akavipat, Apurv Dhadphale, Apu Kapadia, Matthew Wright:
ReDS: reputation for directory services in P2P systems. Insider Threats@CCS 2010: 47-54 - [c21]Matthew K. Wright, Apu Kapadia, Mohan Kumar, Apurv Dhadphale:
ReDS: reputation for directory services in P2P systems. CSIIRW 2010: 71 - [c20]Apu Kapadia, Steven A. Myers, XiaoFeng Wang, Geoffrey C. Fox:
Secure cloud computing with brokered trusted sensor networks. CTS 2010: 581-592 - [c19]Emily K. Adams, Mehool Intwala, Apu Kapadia:
MeD-Lights: a usable metaphor for patient controlled access to electronic health records. IHI 2010: 800-808 - [c18]Michael N. Gagnon, John Truelove, Apu Kapadia, Joshua W. Haines, Orton Huang:
Towards Net-Centric Cyber Survivability for Ballistic Missile Defense. ISARCS 2010: 125-141
2000 – 2009
- 2008
- [c17]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
PEREA: towards practical TTP-free revocation in anonymous authentication. CCS 2008: 333-344 - [c16]Cory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin, Nikos Triandopoulos:
Anonysense: privacy-aware people-centric sensing. MobiSys 2008: 211-224 - [c15]Apu Kapadia, Nikos Triandopoulos:
Halo: High-Assurance Locate for Distributed Hash Tables. NDSS 2008 - [c14]Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, Daniel Peebles, David Kotz:
AnonySense: Opportunistic and Privacy-Preserving Context Collection. Pervasive 2008: 280-297 - [c13]Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith:
TwoKind authentication: protecting private information in untrustworthy environments. WPES 2008: 39-44 - 2007
- [j3]Apu Kapadia:
A Case (Study) For Usability in Secure Email Communication. IEEE Secur. Priv. 5(2): 80-84 (2007) - [c12]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
Blacklistable anonymous credentials: blocking misbehaving users without ttps. CCS 2007: 72-81 - [c11]Apu Kapadia, Patrick P. Tsang, Sean W. Smith:
Attribute-Based Publishing with Hidden Credentials and Hidden Policies. NDSS 2007 - [c10]Apu Kapadia, Tristan Henderson, Jeffrey J. Fielding, David Kotz:
Virtual Walls: Protecting Digital Privacy in Pervasive Environments. Pervasive 2007: 162-179 - [c9]Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith:
Nymble: Anonymous IP-Address Blocking. Privacy Enhancing Technologies 2007: 113-133 - [c8]Apu Kapadia, Prasad Naldurg, Roy H. Campbell:
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. POLICY 2007: 141-150 - [c7]Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith:
TwoKind authentication: usable authenticators for untrustworthy environments. SOUPS 2007: 169-170 - 2005
- [b1]Apu Kapadia:
Models for Privacy in Ubiquitous Computing Environments. University of Illinois Urbana-Champaign, USA, 2005 - 2004
- [j2]Raquel L. Hill, Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, Prasad Naldurg, Anand Ranganathan:
A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures. IEEE Distributed Syst. Online 5(9) (2004) - [c6]Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell:
KNOW Why your access was denied: regulating feedback for usable security. CCS 2004: 52-61 - [c5]Apu Kapadia, Prasad Naldurg, Roy H. Campbell:
Routing with Confidence: Supporting Discretionary Routing Requirements in Policy Based Networks. POLICY 2004: 45-54 - 2002
- [j1]Annette C. Feng, Apu Kapadia, Wu-chun Feng, Geneva G. Belford:
Packet Spacing: An Enabling Mechanism for Delivering Multimedia Content in Computational Grids. J. Supercomput. 23(1): 51-66 (2002) - [c4]Wu-chun Feng, Apu Kapadia, Sunil Thulasidasan:
GREEN: proactive queue management over a best-effort network. GLOBECOM 2002: 1774-1778 - [c3]Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, M. Dennis Mickunas, Seung Yi:
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. ICDCS 2002: 74-83 - 2001
- [c2]Apu Kapadia, Annette C. Feng, Wu-chun Feng:
The Effects of Inter-packet Spacing on the Delivery of Multimedia Content. ICDCS 2001: 665-672 - 2000
- [c1]Apu Kapadia, Jalal Al-Muhtadi, Roy H. Campbell, M. Dennis Mickunas:
IRBAC 2000: Secure Interoperability Using Dynamic Role Translation. International Conference on Internet Computing 2000: 231-238
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint