Emily Stark

Affiliations:
  • Google, Chrome Security Team, USA


According to our database1, Emily Stark authored at least 15 papers between 2009 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Expect-CT Extension for HTTP.
RFC, June, 2022

SoK: SCT Auditing in Certificate Transparency.
Proc. Priv. Enhancing Technol., 2022

"It builds trust with the customers" - Exploring User Perceptions of the Padlock Icon in Browser UI.
Proceedings of the 43rd IEEE Security and Privacy, 2022

2021
Certificate Transparency in Google Chrome: Past, Present, and Future.
IEEE Secur. Priv., 2021

2020
Measuring Identity Confusion with Uniform Resource Locators.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Quasi-isometric groups with no common model geometry.
J. Lond. Math. Soc., 2019

The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators.
Proceedings of the 28th USENIX Security Symposium, 2019

Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2017
Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2014
Building Web Applications on Top of Encrypted Data Using Mylar.
login Usenix Mag., 2014

Building Web Applications on Top of Encrypted Data Using Mylar.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

2012
Evading Censorship with Browser-Based Proxies.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

The Case for Prefetching and Prevalidating TLS Server Certificates.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2009
Coordinating tasks on the commons: designing for personal goals, expertise and serendipity.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Symmetric Cryptography in Javascript.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009


  Loading...