Replication: How well do my results generalize now? The external validity of online privacy and security surveys J Tang, E Birrell, A Lerner Eighteenth symposium on usable privacy and security (SOUPS 2022), 367-385, 2022 | 117 | 2022 |
Federated identity management systems: A privacy-based characterization E Birrell, FB Schneider IEEE security & privacy 11 (5), 36-48, 2013 | 88 | 2013 |
Defining privacy: How users interpret technical terms in privacy policies J Tang, H Shoemaker, A Lerner, E Birrell Proceedings on Privacy Enhancing Technologies, 2021 | 51 | 2021 |
Approximately strategy-proof voting E Birrell, R Pass IJCAI Proceedings-International Joint Conference on Artificial Intelligence …, 2011 | 49 | 2011 |
Enforcing privacy policies with meta-code HD Johansen, E Birrell, R Van Renesse, FB Schneider, M Stenhaug, ... Proceedings of the 6th Asia-Pacific Workshop on Systems, 1-7, 2015 | 39 | 2015 |
Prospective consent: The effect of framing on cookie consent decisions E Ma, E Birrell CHI Conference on human factors in computing systems extended abstracts, 1-6, 2022 | 34 | 2022 |
(Un)clear and (In)conspicuous: The right to opt-out of sale under CCPA S O'Connor, R Nurwono, A Siebel, E Birrell Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021 | 30 | 2021 |
Ancile: Enhancing privacy for ubiquitous computing with use-based privacy E Bagdasaryan, G Berlstein, J Waterman, E Birrell, N Foster, ... Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society …, 2019 | 28 | 2019 |
SGX enforcement of use-based privacy E Birrell, A Gjerdrum, R van Renesse, H Johansen, D Johansen, ... Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 155-167, 2018 | 28 | 2018 |
The knot quandle E Birrell Instructions for Authors. All submissions should, 33, 2007 | 21 | 2007 |
Poli-see: An interactive tool for visualizing privacy policies W Guo, J Rodolitz, E Birrell Proceedings of the 19th Workshop on Privacy in the Electronic Society, 57-71, 2020 | 18 | 2020 |
Randomness-dependent message security E Birrell, KM Chung, R Pass, S Telang Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 18 | 2013 |
A US-UK usability evaluation of consent management platform cookie consent interface design on desktop and mobile ER Bouma-Sims, M Li, Y Lin, A Sakura-Lemessy, A Nisenoff, E Young, ... Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023 | 14 | 2023 |
A reactive approach for use-based privacy E Birrell, FB Schneider | 12 | 2017 |
Prospects for improving password selection J Amador, Y Ma, S Hasama, E Lumba, G Lee, E Birrell Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 263-282, 2023 | 10* | 2023 |
“Ask App Not to Track”: The Effect of Opt-In Tracking Authorization on Mobile Privacy A DeGiulio, H Lee, E Birrell International Workshop on Emerging Technologies for Authorization and …, 2021 | 10 | 2021 |
Data safety vs. app privacy: Comparing the usability of android and ios privacy labels Y Lin, J Juneja, E Birrell, LF Cranor arXiv preprint arXiv:2312.03918, 2023 | 8 | 2023 |
The Impact of Visibility on the Right to Opt-out of Sale under CCPA A Siebel, E Birrell arXiv preprint arXiv:2206.10545, 2022 | 8 | 2022 |
Fine-grained user privacy from avenance tags E Birrell, FB Schneider | 8 | 2014 |
Two steps forward and one step back: The right to opt-out of sale under CPRA J Charatan, E Birrell arXiv preprint arXiv:2312.15094, 2023 | 5 | 2023 |