26 Publications (Page 1 of 2)
2020
Making sense of risk in an increasingly cyber‐physical world
Lee, Adam J⋅Farzan, Rosta⋅Kapadia, Apu and Ahmad, Imtiaz
Critical Quarterly, vol. 62, (no. 1), pp. 48, April 2020. | Journal Article
2019
Conveying Situational Information to People with Visual ImpairmentsAhmed, Tousif⋅Ahmed, Tousif⋅Ahmed, Tousif⋅Hasan, Rakibul⋅Hasan, Rakibul⋅Hasan, Rakibul⋅Connelly, Kay⋅Connelly, Kay⋅Connelly, Kay⋅Crandall, David⋅Crandall, David⋅Crandall, David⋅Kapadia, Apu⋅Kapadia, Apu and Kapadia, Apu2019-04-12.
| Journal Article
Race and the beauty premium: Mechanical Turk workers' evaluations of Twitter accountsGroggel, Anne⋅Groggel, Anne⋅Groggel, Anne⋅Groggel, Anne⋅Nilizadeh, Shirin⋅Nilizadeh, Shirin⋅Nilizadeh, Shirin⋅Nilizadeh, Shirin⋅Ahn, Yong-Yeol⋅Ahn, Yong-Yeol⋅Ahn, Yong-Yeol⋅Ahn, Yong Yeol⋅Kapadia, Apu⋅Kapadia, Apu⋅Kapadia, Apu⋅Kapadia, Apu⋅Rojas, Fabio⋅Rojas, Fabio⋅Rojas, Fabio and Rojas, FabioInformation, Communication & Society, vol. 22, (no. 5), pp. 716, 4/16/2019.
| Journal Article
2018
Up to a Limit?
Ahmed, Tousif⋅Kapadia, Apu⋅Potluri, Venkatesh and Swaminathan, Manohar
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 2, (no. 3), pp. 27, 09-18-2018. | Journal Article
2017
Challenges in Transitioning from Civil to Military Culture
Dosono, Bryan⋅Rashidi, Yasmeen⋅Akter, Taslima⋅Semaan, Bryan and Kapadia, Apu
Proceedings of the ACM on Human-Computer Interaction, vol. 1, (no. CSCW), pp. 23, 12-06-2017. | Journal Article
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings
Ismail, Qatrunnada⋅Ahmed, Tousif⋅Caine, Kelly⋅Kapadia, Apu and Reiter, Michael
Proceedings on Privacy Enhancing Technologies, vol. 2017, (no. 4), pp. 137, 2017-10-1. | Journal Article
Understanding Physical Safety, Security, and Privacy Concerns of People with Visual ImpairmentsAhmed, Tousif⋅Ahmed, Tousif⋅Hoyle, Roberto⋅Hoyle, Roberto⋅Shaffer, Patrick⋅Shaffer, Patrick⋅Connelly, Kay⋅Connelly, Kay⋅Crandall, David⋅Crandall, David⋅Kapadia, Apu and Kapadia, ApuIEEE Internet Computing, pp. 1, 20170616.
| Journal Article
2015
Location Privacy for Mobile Crowd Sensing through Population Mapping.Shin, Minho⋅Cornelius, Cory⋅Kapadia, Apu⋅Triandopoulos, Nikos and Kotz, DavidSensors (Basel, Switzerland), vol. 15, (no. 7), pp. 15285-15310, 2015.
| Journal Article
2014
ReDS: A Framework for Reputation-Enhanced DHTs
Akavipat, Ruj⋅Al-Ameen, Mahdi N⋅Kapadia, Apu⋅Rahman, Zahid⋅Schlegel, Roman and Wright, Matthew
IEEE Transactions on Parallel and Distributed Systems, vol. 25, (no. 2), pp. 331, 2014-Feb.. | Journal Article
ScreenAvoider: Protecting Computer Screens from Ubiquitous CamerasKorayem, Mohammed⋅Korayem, Mohammed⋅Templeman, Robert⋅Templeman, Robert⋅Chen, Dennis⋅Chen, Dennis⋅Crandall, David⋅Crandall, David⋅Kapadia, Apu and Kapadia, Apu2014-11-27.
| Journal Article
2012
PlaceRaider: Virtual Theft in Physical Spaces with SmartphonesTempleman, Robert⋅Templeman, Robert⋅Rahman, Zahid⋅Rahman, Zahid⋅Crandall, David⋅Crandall, David⋅Kapadia, Apu and Kapadia, Apu2012-09-26.
| Journal Article
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practicePatil, Sameer⋅Patil, Sameer⋅Norcie, Greg⋅Norcie, Greg⋅Kapadia, Apu⋅Kapadia, Apu⋅Lee, Adam and Lee, Adam2012.
| Journal Article
2011
AnonySense: A system for anonymous opportunistic sensingShin, Minho⋅Shin, Minho⋅Cornelius, Cory⋅Cornelius, Cory⋅Peebles, Dan⋅Peebles, Dan⋅Kapadia, Apu⋅Kapadia, Apu⋅Kotz, David⋅Kotz, David⋅Triandopoulos, Nikos and Triandopoulos, NikosPervasive and Mobile Computing, vol. 7, (no. 1), pp. 30, 2011.
| Journal Article
DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks
Jahid, Sonia⋅Nilizadeh, Shirin⋅Mittal, Prateek⋅Borisov, Nikita and Kapadia, Apu
2011-11-22. | Journal Article
Nymble: Blocking Misbehaving Users in Anonymizing Networks
Tsang, Patrick P⋅Tsang, Patrick P⋅Kapadia, Apu⋅Kapadia, Apu⋅Cornelius, Cory⋅Cornelius, Cory⋅Smith, Sean W and Smith, Sean W
IEEE Transactions on Dependable and Secure Computing, vol. 8, (no. 2), pp. 256-269, 2011. | Journal Article
2010
BLACTsang, Patrick P⋅Tsang, Patrick P⋅Au, Man Ho⋅Au, Man Ho⋅Kapadia, Apu⋅Kapadia, Apu⋅Smith, Sean W and Smith, Sean WACM Transactions on Information and System Security (TISSEC), vol. 13, (no. 4), pp. 33, 12-01-2010.
| Journal Article
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPsKapadia, Apu and Smith, Sean WACM Transactions on Information and System Security, vol. 13, (no. 4), 2010.
| Journal Article
2007
A Case (Study) For Usability in Secure Email Communication
Kapadia, Apu
IEEE Security & Privacy Magazine, vol. 5, (no. 2), pp. 80-84, 2007. | Journal Article
Blacklistable anonymous credentials:blocking misbehaving users without ttpsTsang, Patrick P⋅Ho Allen Au, Man⋅Kapadia, Apu and Smith, Sean WConference on Computer and Communications Security: Proceedings of the 14th ACM conference on Computer and communications security; 28-31 Oct. 2007. 2007.
| Conference Proceeding
TwoKind authentication:usable authenticators for untrustworthy environmentsBailey, Katelin⋅Vongsathorn, Linden⋅Kapadia, Apu⋅Masone, Chris and Smith, Sean WACM International Conference Proceeding Series; Vol. 229: Proceedings of the 3rd symposium on Usable privacy and security; 18-20 July 2007. 2007.
| Conference Proceeding
2005
Models for privacy in ubiquitous computing environments (Dissertation)
Kapadia, Apu (2005).
2004
A Middleware Architecture for Securing Ubiquitous Computing Cyber InfrastructuresAl Muhtadi, Jalal⋅Campbell, R.⋅Kapadia, Apu⋅Naldurg, P. and Ranganathan, A.IEEE Distributed Systems Online, vol. 5, (no. 9), pp. 1, 2004.
| Journal Article
KNOW Why your access was denied:regulating feedback for usable securityKapadia, Apu⋅Sampemane, Geetanjali and Campbell, Roy HConference on Computer and Communications Security: Proceedings of the 11th ACM conference on Computer and communications security; 25-29 Oct. 2004. 2004. | Conference Proceeding
2002
Packet Spacing: An Enabling Mechanism for Delivering Multimedia Content in Computational Grids
Feng, Annette⋅Kapadia, Apu⋅Feng, Wu-Chun and Belford, Geneva
The Journal of Supercomputing, vol. 23, (no. 1), pp. 66, 20020800. | Journal Article
Routing through the mist: Privacy preserving communication in ubiquitous computing environmentsAl Muhtadi, Jalal⋅Campbell, Roy⋅Kapadia, Apu⋅Mickunas, M. D and Yi, Seung22nd International Conference on Distributed Systems; Vienna; Austria; 02-05 July 2002. 2002.
| Conference Proceeding