26 Publications (Page 1 of 2)
2020
Making sense of risk in an increasingly cyber‐physical world
Lee, Adam JFarzan, RostaKapadia, Apu and Ahmad, Imtiaz
Critical Quarterly, vol. 62, (no. 1), pp. 48, April 2020. | Journal Article
2019
Conveying Situational Information to People with Visual Impairments
Ahmed, TousifAhmed, TousifAhmed, TousifHasan, RakibulHasan, RakibulHasan, RakibulConnelly, KayConnelly, KayConnelly, KayCrandall, DavidCrandall, DavidCrandall, DavidKapadia, ApuKapadia, Apu and Kapadia, Apu
2019-04-12. | Journal Article
 
Race and the beauty premium: Mechanical Turk workers' evaluations of Twitter accounts
Groggel, AnneGroggel, AnneGroggel, AnneGroggel, AnneNilizadeh, ShirinNilizadeh, ShirinNilizadeh, ShirinNilizadeh, ShirinAhn, Yong-YeolAhn, Yong-YeolAhn, Yong-YeolAhn, Yong YeolKapadia, ApuKapadia, ApuKapadia, ApuKapadia, ApuRojas, FabioRojas, FabioRojas, Fabio and Rojas, Fabio
Information, Communication & Society, vol. 22, (no. 5), pp. 716, 4/16/2019. | Journal Article
2018
Up to a Limit?
Ahmed, TousifKapadia, ApuPotluri, Venkatesh and Swaminathan, Manohar
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 2, (no. 3), pp. 27, 09-18-2018. | Journal Article
2017
Challenges in Transitioning from Civil to Military Culture
Dosono, BryanRashidi, YasmeenAkter, TaslimaSemaan, Bryan and Kapadia, Apu
Proceedings of the ACM on Human-Computer Interaction, vol. 1, (no. CSCW), pp. 23, 12-06-2017. | Journal Article
 
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings
Ismail, QatrunnadaAhmed, TousifCaine, KellyKapadia, Apu and Reiter, Michael
Proceedings on Privacy Enhancing Technologies, vol. 2017, (no. 4), pp. 137, 2017-10-1. | Journal Article
 
Understanding Physical Safety, Security, and Privacy Concerns of People with Visual Impairments
Ahmed, TousifAhmed, TousifHoyle, RobertoHoyle, RobertoShaffer, PatrickShaffer, PatrickConnelly, KayConnelly, KayCrandall, DavidCrandall, DavidKapadia, Apu and Kapadia, Apu
IEEE Internet Computing, pp. 1, 20170616. | Journal Article
2015
Location Privacy for Mobile Crowd Sensing through Population Mapping.
Shin, MinhoCornelius, CoryKapadia, ApuTriandopoulos, Nikos and Kotz, David
Sensors (Basel, Switzerland), vol. 15, (no. 7), pp. 15285-15310, 2015. | Journal Article
2014
ReDS: A Framework for Reputation-Enhanced DHTs
Akavipat, RujAl-Ameen, Mahdi NKapadia, ApuRahman, ZahidSchlegel, Roman and Wright, Matthew
IEEE Transactions on Parallel and Distributed Systems, vol. 25, (no. 2), pp. 331, 2014-Feb.. | Journal Article
 
ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras
Korayem, MohammedKorayem, MohammedTempleman, RobertTempleman, RobertChen, DennisChen, DennisCrandall, DavidCrandall, DavidKapadia, Apu and Kapadia, Apu
2014-11-27. | Journal Article
2012
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
Templeman, RobertTempleman, RobertRahman, ZahidRahman, ZahidCrandall, DavidCrandall, DavidKapadia, Apu and Kapadia, Apu
2012-09-26. | Journal Article
 
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice
Patil, SameerPatil, SameerNorcie, GregNorcie, GregKapadia, ApuKapadia, ApuLee, Adam and Lee, Adam
2012. | Journal Article
2011
AnonySense: A system for anonymous opportunistic sensing
Shin, MinhoShin, MinhoCornelius, CoryCornelius, CoryPeebles, DanPeebles, DanKapadia, ApuKapadia, ApuKotz, DavidKotz, DavidTriandopoulos, Nikos and Triandopoulos, Nikos
Pervasive and Mobile Computing, vol. 7, (no. 1), pp. 30, 2011. | Journal Article
 
DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks
Jahid, SoniaNilizadeh, ShirinMittal, PrateekBorisov, Nikita and Kapadia, Apu
2011-11-22. | Journal Article
 
Nymble: Blocking Misbehaving Users in Anonymizing Networks
Tsang, Patrick PTsang, Patrick PKapadia, ApuKapadia, ApuCornelius, CoryCornelius, CorySmith, Sean W and Smith, Sean W
IEEE Transactions on Dependable and Secure Computing, vol. 8, (no. 2), pp. 256-269, 2011. | Journal Article
2010
BLAC
Tsang, Patrick PTsang, Patrick PAu, Man HoAu, Man HoKapadia, ApuKapadia, ApuSmith, Sean W and Smith, Sean W
ACM Transactions on Information and System Security (TISSEC), vol. 13, (no. 4), pp. 33, 12-01-2010. | Journal Article
 
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Kapadia, Apu and Smith, Sean W
ACM Transactions on Information and System Security, vol. 13, (no. 4), 2010. | Journal Article
2007
A Case (Study) For Usability in Secure Email Communication
Kapadia, Apu
IEEE Security & Privacy Magazine, vol. 5, (no. 2), pp. 80-84, 2007. | Journal Article
 
Blacklistable anonymous credentials:blocking misbehaving users without ttps
Tsang, Patrick PHo Allen Au, ManKapadia, Apu and Smith, Sean W
Conference on Computer and Communications Security: Proceedings of the 14th ACM conference on Computer and communications security; 28-31 Oct. 2007. 2007. | Conference Proceeding
 
TwoKind authentication:usable authenticators for untrustworthy environments
Bailey, KatelinVongsathorn, LindenKapadia, ApuMasone, Chris and Smith, Sean W
ACM International Conference Proceeding Series; Vol. 229: Proceedings of the 3rd symposium on Usable privacy and security; 18-20 July 2007. 2007. | Conference Proceeding
2005
Models for privacy in ubiquitous computing environments (Dissertation)
Kapadia, Apu (2005).
2004
A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures
Al Muhtadi, JalalCampbell, R.Kapadia, ApuNaldurg, P. and Ranganathan, A.
IEEE Distributed Systems Online, vol. 5, (no. 9), pp. 1, 2004. | Journal Article
 
KNOW Why your access was denied:regulating feedback for usable security
Kapadia, ApuSampemane, Geetanjali and Campbell, Roy H
Conference on Computer and Communications Security: Proceedings of the 11th ACM conference on Computer and communications security; 25-29 Oct. 2004. 2004. | Conference Proceeding
2002
Packet Spacing: An Enabling Mechanism for Delivering Multimedia Content in Computational Grids
Feng, AnnetteKapadia, ApuFeng, Wu-Chun and Belford, Geneva
The Journal of Supercomputing, vol. 23, (no. 1), pp. 66, 20020800. | Journal Article
 
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
Al Muhtadi, JalalCampbell, RoyKapadia, ApuMickunas, M. D and Yi, Seung
22nd International Conference on Distributed Systems; Vienna; Austria; 02-05 July 2002. 2002. | Conference Proceeding