Is this app safe? A large scale study on application permissions and risk signals PH Chia, Y Yamamoto, N Asokan Proceedings of the 21st international conference on World Wide Web, 311-320, 2012 | 327 | 2012 |
Interdependent privacy: Let me share your data G Biczók, PH Chia Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 122 | 2013 |
Re-evaluating the wisdom of crowds in assessing web security PH Chia, SJ Knapskog Financial Cryptography and Data Security: 15th International Conference, FC …, 2012 | 32 | 2012 |
Colonel Blotto in the phishing war PH Chia, J Chuang Decision and Game Theory for Security: Second International Conference …, 2011 | 32 | 2011 |
Use of ratings from personalized communities for trustworthy application installation PH Chia, AP Heiner, N Asokan Information Security Technology for Applications: 15th Nordic Conference on …, 2012 | 22* | 2012 |
KHyperLogLog: Estimating reidentifiability and joinability of large data at scale PH Chia, D Desfontaines, IM Perera, D Simmons-Marengo, C Li, WY Day, ... 2019 IEEE Symposium on Security and Privacy (SP), 350-364, 2019 | 21 | 2019 |
Community-based web security: complementary roles of the serious and casual contributors PH Chia, J Chuang Proceedings of the ACM 2012 conference on Computer Supported Cooperative …, 2012 | 14 | 2012 |
Colonel Blotto in web security PH Chia The Eleventh Workshop on Economics and Information Security, WEIS Rump Session, 2012 | 10 | 2012 |
Exploring the use of explicit trust links for filtering recommenders: a study on Epinions. com PH Chia, G Pitsilis Journal of information processing 19, 332-344, 2011 | 9 | 2011 |
Does trust matter for user preferences? A study on Epinions ratings G Pitsilis, PH Chia Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010 …, 2010 | 8 | 2010 |
Whack-a-mole: Asymmetric conflict and guerrilla warfare in web security PH Chia, J Chuang, Y Chen Proceedings of the 15th Annual Workshop on the Economics of Information Security, 2016 | 3 | 2016 |
Analyzing the gold star scheme in a split tor network B Westermann, PH Chia, D Kesdogan Security and Privacy in Communication Networks: 7th International ICST …, 2012 | 2 | 2012 |
Analyzing the incentives in Community-based Security Systems PH Chia 2011 IEEE International Conference on Pervasive Computing and Communications …, 2011 | 2 | 2011 |
Secure software installation via social rating PH Chia Helsinki University of Technology, 2008 | 2 | 2008 |
Information Security on the Web and App Platforms: An Economic and Socio-Behavioral Perspective PH Chia NTNU, 2012 | 1 | 2012 |
Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions. com (Special Issue on Trust Management) PHUI CHIA, G PITSILIS 情報処理学会論文誌 論文誌ジャーナル 52 (7), 2166-2178, 2011 | | 2011 |
Certification intermediaries and the alternative (poster) PH Chia International Conference on Financial Cryptography and Data Security, 425-425, 2010 | | 2010 |
Bitcoin: P2P Digital Currency PH Chia | | |
KHyperLogLog PH Chia, D Desfontaines, IM Perera, D Simmons-Marengo, C Li, WY Day, ... | | |
Economics of Information Security PH Chia | | |