Jessica Staddon

Affiliations:
  • Google Research


According to our database1, Jessica Staddon authored at least 48 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints.
CoRR, 2024

2019
"it's a generally exhausting field" A Large-Scale Study of Security Incident Management Workflows and Pain Points.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

2017
Policy by Example: An Approach for Security Policy Specification.
CoRR, 2017

No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Learning a Privacy Incidents Database.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

2016
Predicting Mobile App Privacy Preferences with Psychographics.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

"I had no idea this was a thing": on the importance of understanding the user experience of personalized transparency tools.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016

2014
Exploring the benefits and uses of web analytics tools for non-transactional websites.
Proceedings of the Designing Interactive Systems Conference 2014, DIS '14, Vancouver, BC, 2014

2013
"I hereby leave my email to...": Data Usage Control and the Digital Estate.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Are privacy concerns a turn-off?: engagement and privacy in social networks.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Around the Water Cooler: Shared Discussion Topics and Contact Closeness in Social Search.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

2011
Public vs. Publicized: Content Use Trends and Privacy Expectations.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Indirect content privacy surveys: measuring privacy without asking about it.
Proceedings of the Symposium On Usable Privacy and Security, 2011

2010
A framework for privacy-conducive recommendations.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Personalized Privacy Policies: Challenges for Data Loss Prevention.
Proceedings of the Intelligent Information Privacy Management, 2010

The Web as a Privacy Lab.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
The Rules of Redaction: Identify, Protect, Review (and Repeat).
IEEE Secur. Priv., 2009

Sanitization's slippery slope: the design and study of a text revision assistant.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

Controlling data in the cloud: outsourcing computation without outsourcing control.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Testable commitments.
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008

Detecting privacy leaks using corpus-based association rules.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

A content-driven access control system.
Proceedings of the IDtrust 2008, 2008

Detecting reviewer bias through web-based association mining.
Proceedings of the 2nd ACM Workshop on Information Credibility on the Web, 2008

Sponsored ad-based similarity: an approach to mining collective advertiser intelligence.
Proceedings of the 2nd International Workshop on Data Mining and Audience Intelligence for Advertising, 2008

2007
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Trans. Inf. Theory, 2007

Deflation-secure web metering.
Int. J. Inf. Comput. Secur., 2007

Web-Based Inference Detection.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

2005
Graceful service degradation (or, how to know your payment is late).
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005

2004
Private Inference Control.
IACR Cryptol. ePrint Arch., 2004

Detecting and correcting malicious data in VANETs.
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004

Secure Conjunctive Keyword Search over Encrypted Data.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Applications of list decoding to tracing traitors.
IEEE Trans. Inf. Theory, 2003

Secret Handshakes from Pairing-Based Key Agreements.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Randomness Re-use in Multi-recipient Encryption Schemeas.
Proceedings of the Public Key Cryptography, 2003

Dynamic inference control.
Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003

Sliding-window self-healing key distribution.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

2002
Self-Healing Key Distribution with Revocation.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Efficient tracing of failed nodes in sensor networks.
Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002

FAIR: Fair Audience InfeRence.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Combinatorial properties of frameproof and traceability codes.
IEEE Trans. Inf. Theory, 2001

Efficient Traitor Tracing Algorithms using List Decoding.
IACR Cryptol. ePrint Arch., 2001

2000
Graph-Based Authentication of Digital Streams.
IACR Cryptol. ePrint Arch., 2000

Long-Lived Broadcast Encryption.
Proceedings of the Advances in Cryptology, 2000

1999
Efficient Methods for Integrating Traceability and Broadcast Encryption.
Proceedings of the Advances in Cryptology, 1999

1998
PKCS #1: RSA Cryptography Specifications Version 2.0.
RFC, October, 1998

Combinatorial Bounds for Broadcast Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998


  Loading...