What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Miranda Wei
Google Scholar
12
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/soups
"TikTok, Do Your Thing": User Reactions to Social Surveillance in the Public Sphere.
Meira Gilbert
Miranda Wei
Lindah Kotut
2024
conf/uss
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse.
Miranda Wei
Sunny Consolvo
Patrick Gage Kelley
Tadayoshi Kohno
Tara Matthews
Sarah Meiklejohn
Franziska Roesner
Renee Shelby
Kurt Thomas
Rebecca Umbach
2024
conf/uss
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors.
Miranda Wei
Jaron Mink
Yael Eiger
Tadayoshi Kohno
Elissa M. Redmiles
Franziska Roesner
2024
conf/soups
"Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imagery.
Natalie Grace Brigham
Miranda Wei
Tadayoshi Kohno
Elissa M. Redmiles
2023
conf/uss
A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords.
Alexandra Nisenoff
Maximilian Golla
Miranda Wei
Juliette Hainline
Hayley Szymanek
Annika Braun
Annika Hildebrandt
Blair Christensen
David Langenberg
Blase Ur
2023
conf/sp
Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy.
Miranda Wei
Pardis Emami Naeini
Franziska Roesner
Tadayoshi Kohno
2022
conf/soups
Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships.
Miranda Wei
Eric Zeng
Tadayoshi Kohno
Franziska Roesner
2021
conf/soups
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.
Christian Stransky
Dominik Wermke
Johanna Schrader
Nicolas Huaman
Yasemin Acar
Anna Lena Fehlhaber
Miranda Wei
Blase Ur
Sascha Fahl
2020
conf/uss
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data.
Miranda Wei
Madison Stamos
Sophie Veys
Nathan Reitinger
Justin Goodman
Margot Herman
Dorota Filipczuk
Ben Weinshel
Michelle L. Mazurek
Blase Ur
2019
conf/ccs
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Ben Weinshel
Miranda Wei
Mainack Mondal
Euirim Choi
Shawn Shan
Claire Dolin
Michelle L. Mazurek
Blase Ur
2018
conf/ccs
"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications.
Maximilian Golla
Miranda Wei
Juliette Hainline
Lydia Filipe
Markus Dürmuth
Elissa M. Redmiles
Blase Ur
2018
conf/uss
Exploring User Mental Models of End-to-End Encrypted Communication Tools.
Ruba Abu-Salma
Elissa M. Redmiles
Blase Ur
Miranda Wei
Coauthors
Alexandra Nisenoff
(1)
Anna Lena Fehlhaber
(1)
Annika Braun
(1)
Annika Hildebrandt
(1)
Ben Weinshel
(2)
Blair Christensen
(1)
Blase Ur
(6)
Christian Stransky
(1)
Claire Dolin
(1)
David Langenberg
(1)
Dominik Wermke
(1)
Dorota Filipczuk
(1)
Elissa M. Redmiles
(4)
Eric Zeng
(1)
Euirim Choi
(1)
Franziska Roesner
(4)
Hayley Szymanek
(1)
Jaron Mink
(1)
Johanna Schrader
(1)
Juliette Hainline
(2)
Justin Goodman
(1)
Kurt Thomas
(1)
Lindah Kotut
(1)
Lydia Filipe
(1)
Madison Stamos
(1)
Mainack Mondal
(1)
Margot Herman
(1)
Markus Dürmuth
(1)
Maximilian Golla
(2)
Meira Gilbert
(1)
Michelle L. Mazurek
(2)
Miranda Wei
(12)
Natalie Grace Brigham
(1)
Nathan Reitinger
(1)
Nicolas Huaman
(1)
Pardis Emami Naeini
(1)
Patrick Gage Kelley
(1)
Rebecca Umbach
(1)
Renee Shelby
(1)
Ruba Abu-Salma
(1)
Sarah Meiklejohn
(1)
Sascha Fahl
(1)
Shawn Shan
(1)
Sophie Veys
(1)
Sunny Consolvo
(1)
Tadayoshi Kohno
(5)
Tara Matthews
(1)
Yael Eiger
(1)
Yasemin Acar
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to