Shrirang Mare

Orcid: 0000-0002-2007-9436

According to our database1, Shrirang Mare authored at least 27 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Examining Source Effects on Perceptions of Fake News in Rural India.
Proc. ACM Hum. Comput. Interact., 2022

Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

2021
"We Even Borrowed Money From Our Neighbor": Understanding Mobile-based Frauds Through Victims' Experiences.
Proc. ACM Hum. Comput. Interact., 2021

2020
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts.
Proc. Priv. Enhancing Technol., 2020

Toward a Secure Internet of Things: Directions for Research.
IEEE Secur. Priv., 2020

Privacy in Crisis: Participants' Privacy Preferences for Health and Marketing Data during a Pandemic.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020

Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

2019
Towards Digitization of Collaborative Savings Among Low-Income Groups.
Proc. ACM Hum. Comput. Interact., 2019

Consumer Smart Homes: Where We Are and Where We Need to Go.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Understanding mobile money grievances from tweets.
Proceedings of the Tenth International Conference on Information and Communication Technologies and Development, 2019

Examining the use and non-use of mobile payment systems for merchant payments in India.
Proceedings of the Conference on Computing & Sustainable Societies, 2019

An assessment of SMS fraud in Pakistan.
Proceedings of the Conference on Computing & Sustainable Societies, 2019

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

2018
SAW: Wristband-based Authentication for Desktop Computers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Examining Security and Privacy Research in Developing Regions.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

ThinSIM-based Attacks on Mobile Money Systems.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

2017
End User Security and Privacy Concerns with Smart Homes.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Security and privacy design considerations for low-literate users in developing regions.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Seamless Authentication for Ubiquitous Devices.
PhD thesis, 2016

A Study of Authentication in Daily Life.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

2014
Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth.
Mob. Networks Appl., 2014

ZEBRA: Zero-Effort Bilateral Recurring Authentication.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Provenance framework for mHealth.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
An amulet for trustworthy wearable mHealth.
Proceedings of the 2012 Workshop on Mobile Computing Systems and Applications, 2012

2011
Adapt-lite: privacy-aware, secure, and efficient mhealth sensing.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Adaptive Security and Privacy for mHealth Sensing.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

2010
Experimental validation of analytical performance models for IEEE 802.11 networks.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010


  Loading...