Ada Lerner

According to our database1, Ada Lerner authored at least 17 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SoK: Technical Implementation and Human Impact of Internet Privacy Regulations.
CoRR, 2023

"It's a Fair Game", or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents.
CoRR, 2023

2022
The Buffet Overflow Café.
IEEE Secur. Priv., 2022

Buying Privacy: User Perceptions of Privacy Threats from Mobile Apps.
CoRR, 2022

How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys.
CoRR, 2022

Replication: How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2021
Defining Privacy: How Users Interpret Technical Terms in Privacy Policies.
Proc. Priv. Enhancing Technol., 2021

2020
Privacy and Activism in the Transgender Community.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2018
Computer Security and Privacy for Refugees in the United States.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Rewriting History: Changing the Archived Web from the Present.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Excavating Web Trackers Using Web Archaeology.
login Usenix Mag., 2016

Rangzen: Anonymously Getting the Word Out in a Blackout.
CoRR, 2016

Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Analyzing the Use of Quick Response Codes in the Wild.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions.
Proceedings of the Financial Cryptography and Data Security, 2015

2013
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...