What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Franziska Roesner
Google Scholar
39
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
To Reveal or Conceal: Privacy and Marginalization in Avatars.
Mattea Sim
Basia Radka
Emi Yoshikawa
Franziska Roesner
Kurt Hugenberg
Tadayoshi Kohno
2025
conf/sp
"You Have to Ignore the Dangers": User Perceptions of the Security and Privacy Benefits of WhatsApp Mods.
Collins W. Munyendo
Kentrell Owens
Faith Strong
Shaoqi Wang
Adam J. Aviv
Tadayoshi Kohno
Franziska Roesner
2025
conf/ndss
IsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic Systems.
Yuhao Wu
Franziska Roesner
Tadayoshi Kohno
Ning Zhang
Umar Iqbal
2024
conf/uss
When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality.
Kaiming Cheng
Arkaprabha Bhattacharya
Michelle Lin
Jaewook Lee
Aroosh Kumar
Jeffery F. Tian
Tadayoshi Kohno
Franziska Roesner
2024
conf/uss
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse.
Miranda Wei
Sunny Consolvo
Patrick Gage Kelley
Tadayoshi Kohno
Tara Matthews
Sarah Meiklejohn
Franziska Roesner
Renee Shelby
Kurt Thomas
Rebecca Umbach
2024
conf/uss
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors.
Miranda Wei
Jaron Mink
Yael Eiger
Tadayoshi Kohno
Elissa M. Redmiles
Franziska Roesner
2023
conf/uss
Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality.
Kaiming Cheng
Jeffery F. Tian
Tadayoshi Kohno
Franziska Roesner
2023
conf/nspw
A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design.
Mattea Sim
Kurt Hugenberg
Tadayoshi Kohno
Franziska Roesner
2023
conf/sp
Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy.
Miranda Wei
Pardis Emami Naeini
Franziska Roesner
Tadayoshi Kohno
2022
conf/uss
Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives.
Kentrell Owens
Anita Alem
Franziska Roesner
Tadayoshi Kohno
2022
conf/uss
"Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice.
Christine Geeng
Mike Harris
Elissa M. Redmiles
Franziska Roesner
2022
conf/soups
Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships.
Miranda Wei
Eric Zeng
Tadayoshi Kohno
Franziska Roesner
2021
conf/soups
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic.
Pardis Emami Naeini
Tiona Francisco
Tadayoshi Kohno
Franziska Roesner
2020
journals/popets
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts.
Shrirang Mare
Franziska Roesner
Tadayoshi Kohno
2020
conf/soups
Usable Sexurity: Studying People's Concerns and Strategies When Sexting.
Christine Geeng
Jevan A. Hutson
Franziska Roesner
2019
conf/uss
Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study.
Eric Zeng
Franziska Roesner
2019
conf/uss
Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors.
Christine Chen
Nicola Dell
Franziska Roesner
2019
conf/uss
Secure Multi-User Content Sharing for Augmented Reality Applications.
Kimberly Ruth
Tadayoshi Kohno
Franziska Roesner
2019
conf/sp
Analysis of the Susceptibility of Smart Home Programming Interfaces to End User Error.
Mitali Palekar
Earlence Fernandes
Franziska Roesner
2018
conf/sp
Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users.
Kiron Lebeck
Kimberly Ruth
Tadayoshi Kohno
Franziska Roesner
2018
conf/sp
Computer Security and Privacy for Refugees in the United States.
Lucy Simko
Ada Lerner
Samia Ibtasam
Franziska Roesner
Tadayoshi Kohno
2017
conf/ccs
Rewriting History: Changing the Archived Web from the Present.
Ada Lerner
Tadayoshi Kohno
Franziska Roesner
2017
conf/uss
When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers.
Susan E. McGregor
Elizabeth Anne Watkins
Mahdi Nasrullah Al-Ameen
Kelly Caine
Franziska Roesner
2017
conf/uss
Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms.
Elizabeth Anne Watkins
Mahdi Nasrullah Al-Ameen
Franziska Roesner
Kelly Caine
Susan E. McGregor
2017
conf/sp
Securing Augmented Reality Output.
Kiron Lebeck
Kimberly Ruth
Tadayoshi Kohno
Franziska Roesner
2017
conf/soups
End User Security and Privacy Concerns with Smart Homes.
Eric Zeng
Shrirang Mare
Franziska Roesner
2017
conf/eurosp
Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists.
Ada Lerner
Eric Zeng
Franziska Roesner
2016
journals/popets
Individual versus Organizational Computer Security and Privacy Concerns in Journalism.
Susan E. McGregor
Franziska Roesner
Kelly Caine
2016
conf/ccs
AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems.
Talia Ringer
Dan Grossman
Franziska Roesner
2016
conf/uss
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016.
Ada Lerner
Anna Kornfeld Simpson
Tadayoshi Kohno
Franziska Roesner
2015
conf/uss
Investigating the Computer Security Practices and Needs of Journalists.
Susan E. McGregor
Polina Charters
Tobin Holliday
Franziska Roesner
2015
conf/fc
Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions.
Emily McReynolds
Adam Lerner
Will Scott
Franziska Roesner
Tadayoshi Kohno
2014
conf/ccs
Collaborative Verification of Information Flow for a High-Assurance App Store.
Michael D. Ernst
René Just
Suzanne Millstein
Werner Dietl
Stuart Pernsteiner
Franziska Roesner
Karl Koscher
Paulo Barros
Ravi Bhoraskar
Seungyeop Han
Paul Vines
Edward XueJun Wu
2014
conf/ccs
World-Driven Access Control for Continuous Sensing.
Franziska Roesner
David Molnar
Alexander Moshchuk
Tadayoshi Kohno
Helen J. Wang
2014
conf/fc
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages.
Franziska Roesner
Brian T. Gill
Tadayoshi Kohno
2013
conf/uss
Securing Embedded User Interfaces: Android and Beyond.
Franziska Roesner
Tadayoshi Kohno
2012
conf/sp
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Franziska Roesner
Tadayoshi Kohno
Alexander Moshchuk
Bryan Parno
Helen J. Wang
Crispin Cowan
2011
conf/uss
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
Karl Koscher
Alexei Czeskis
Franziska Roesner
Tadayoshi Kohno
2010
conf/sp
Experimental Security Analysis of a Modern Automobile.
Karl Koscher
Alexei Czeskis
Franziska Roesner
Shwetak N. Patel
Tadayoshi Kohno
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
Coauthors
Ada Lerner
(4)
Adam J. Aviv
(1)
Adam Lerner
(1)
Alexander Moshchuk
(2)
Alexei Czeskis
(2)
Anita Alem
(1)
Anna Kornfeld Simpson
(1)
Arkaprabha Bhattacharya
(1)
Aroosh Kumar
(1)
Basia Radka
(1)
Brian Kantor
(2)
Brian T. Gill
(1)
Bryan Parno
(1)
Christine Chen
(1)
Christine Geeng
(2)
Collins W. Munyendo
(1)
Crispin Cowan
(1)
Damon McCoy
(2)
Dan Grossman
(1)
Danny Anderson
(2)
David Molnar
(1)
Earlence Fernandes
(1)
Edward XueJun Wu
(1)
Elissa M. Redmiles
(2)
Elizabeth Anne Watkins
(2)
Emi Yoshikawa
(1)
Emily McReynolds
(1)
Eric Zeng
(4)
Faith Strong
(1)
Franziska Roesner
(39)
Helen J. Wang
(2)
Hovav Shacham
(2)
Jaewook Lee
(1)
Jaron Mink
(1)
Jeffery F. Tian
(2)
Jevan A. Hutson
(1)
Kaiming Cheng
(2)
Karl Koscher
(3)
Kelly Caine
(3)
Kentrell Owens
(2)
Kimberly Ruth
(3)
Kiron Lebeck
(2)
Kurt Hugenberg
(2)
Kurt Thomas
(1)
Lucy Simko
(1)
Mahdi Nasrullah Al-Ameen
(2)
Mattea Sim
(2)
Michael D. Ernst
(1)
Michelle Lin
(1)
Mike Harris
(1)
Miranda Wei
(4)
Mitali Palekar
(1)
Nicola Dell
(1)
Ning Zhang
(1)
Pardis Emami Naeini
(2)
Patrick Gage Kelley
(1)
Paul Vines
(1)
Paulo Barros
(1)
Polina Charters
(1)
Ravi Bhoraskar
(1)
Rebecca Umbach
(1)
René Just
(1)
Renee Shelby
(1)
Samia Ibtasam
(1)
Sarah Meiklejohn
(1)
Seungyeop Han
(1)
Shaoqi Wang
(1)
Shrirang Mare
(2)
Shwetak N. Patel
(1)
Stefan Savage
(2)
Stephen Checkoway
(2)
Stuart Pernsteiner
(1)
Sunny Consolvo
(1)
Susan E. McGregor
(4)
Suzanne Millstein
(1)
Tadayoshi Kohno
(26)
Talia Ringer
(1)
Tara Matthews
(1)
Tiona Francisco
(1)
Tobin Holliday
(1)
Umar Iqbal
(1)
Werner Dietl
(1)
Will Scott
(1)
Yael Eiger
(1)
Yuhao Wu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to