Controlling data in the cloud: outsourcing computation without outsourcing control R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009 | 1243 | 2009 |
Privacy-preserving aggregation of time-series data E Shi, HTH Chan, E Rieffel, R Chow, D Song Annual Network & Distributed System Security Symposium (NDSS), 2011 | 842 | 2011 |
Implicit authentication through learning user behavior E Shi, Y Niu, M Jakobsson, R Chow Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 396 | 2011 |
Implicit authentication for mobile devices M Jakobsson, E Shi, P Golle, R Chow Proceedings of the 4th USENIX conference on Hot topics in security 1, 25-27, 2009 | 346 | 2009 |
Adjusting security level of mobile device based on presence or absence of other mobile devices nearby R Chow, PJP Golle, JN Staddon US Patent 8,095,112, 2012 | 339 | 2012 |
Implicit authentication BM Jakobsson, MJ Grandcolas, PJP Golle, R Chow, R Shi US Patent 8,312,157, 2012 | 323 | 2012 |
Authentication in the clouds: a framework and its application to mobile users R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu, E Shi, Z Song Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 1-6, 2010 | 210 | 2010 |
Proactive insider threat detection through graph learning and psychological context O Brdiczka, J Liu, B Price, J Shen, A Patil, R Chow, E Bart, N Ducheneaut 2012 IEEE Symposium on Security and Privacy Workshops, 142-149, 2012 | 162 | 2012 |
Faking contextual data for fun, profit, and privacy R Chow, P Golle Proceedings of the 8th ACM workshop on Privacy in the electronic society …, 2009 | 139 | 2009 |
Guided implicit authentication R Chow US Patent 8,800,056, 2014 | 130 | 2014 |
Implicit authentication BM Jakobsson, R Chow, R Shi US Patent App. 12/955,825, 2012 | 123 | 2012 |
Method and apparatus for facilitating document sanitization R Chow, JN Staddon, IS Oberst US Patent 8,566,350, 2013 | 103 | 2013 |
Detecting privacy leaks using corpus-based association rules R Chow, P Golle, J Staddon Proceedings of the 14th ACM SIGKDD international conference on Knowledge …, 2008 | 96 | 2008 |
Making captchas clickable R Chow, P Golle, M Jakobsson, L Wang, XF Wang Proceedings of the 9th workshop on Mobile computing systems and applications …, 2008 | 93 | 2008 |
Privacy-preserving aggregation of Time-series data R Shi, R Chow, THH Chan US Patent 8,555,400, 2013 | 88 | 2013 |
The last mile for IoT privacy R Chow IEEE Security & Privacy 15 (6), 73-76, 2017 | 74 | 2017 |
Method and apparatus for verifying integrity of redacted documents PJP Golle, JN Staddon, R Chow US Patent 8,245,038, 2012 | 65 | 2012 |
Is this thing on? Crowdsourcing privacy indicators for ubiquitous sensing platforms S Egelman, R Kannavara, R Chow Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015 | 60 | 2015 |
Method and apparatus for providing digital rights management R Chow, S Jain US Patent App. 11/011,860, 2006 | 57 | 2006 |
Selectable captchas BM Jakobsson, PJP Golle, R Chow US Patent 8,307,407, 2012 | 54 | 2012 |