What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Allison McDonald
Google Scholar
7
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
"I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators.
Ananta Soneji
Vaughn Hamilton
Adam Doupé
Allison McDonald
Elissa M. Redmiles
2022
conf/eurosp
Ethical Practices for Security Research with At-Risk Populations.
Rasika Bhalerao
Vaughn Hamilton
Allison McDonald
Elissa M. Redmiles
Angelika Strohmayer
2021
conf/uss
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence.
Yixin Zou
Allison McDonald
Julia Narakornpichit
Nicola Dell
Thomas Ristenpart
Kevin A. Roundy
Florian Schaub
Acar Tamersoy
2021
conf/uss
"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online.
Allison McDonald
Catherine Barwulor
Michelle L. Mazurek
Florian Schaub
Elissa M. Redmiles
2020
conf/sp
Can Voters Detect Malicious Manipulation of Ballot Marking Devices?
Matthew Bernhard
Allison McDonald
Henry Meng
Jensen Hwa
Nakul Bajaj
Kevin Chang
J. Alex Halderman
2018
conf/uss
Quack: Scalable Remote Measurement of Application-Layer Censorship.
Benjamin VanderSloot
Allison McDonald
Will Scott
J. Alex Halderman
Roya Ensafi
2017
conf/uss
An ISP-Scale Deployment of TapDance.
Sergey Frolov
Frederick Douglas
Will Scott
Allison McDonald
Benjamin VanderSloot
Rod Hynes
Adam Kruger
Michalis Kallitsis
David G. Robinson
Steve Schultze
Nikita Borisov
J. Alex Halderman
Eric Wustrow
Coauthors
Acar Tamersoy
(1)
Adam Doupé
(1)
Adam Kruger
(1)
Allison McDonald
(7)
Ananta Soneji
(1)
Angelika Strohmayer
(1)
Benjamin VanderSloot
(2)
Catherine Barwulor
(1)
David G. Robinson
(1)
Elissa M. Redmiles
(3)
Eric Wustrow
(1)
Florian Schaub
(2)
Frederick Douglas
(1)
Henry Meng
(1)
J. Alex Halderman
(3)
Jensen Hwa
(1)
Julia Narakornpichit
(1)
Kevin A. Roundy
(1)
Kevin Chang
(1)
Matthew Bernhard
(1)
Michalis Kallitsis
(1)
Michelle L. Mazurek
(1)
Nakul Bajaj
(1)
Nicola Dell
(1)
Nikita Borisov
(1)
Rasika Bhalerao
(1)
Rod Hynes
(1)
Roya Ensafi
(1)
Sergey Frolov
(1)
Steve Schultze
(1)
Thomas Ristenpart
(1)
Vaughn Hamilton
(2)
Will Scott
(2)
Yixin Zou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to