Follow
Sauvik Das
Title
Cited by
Cited by
Year
ACCessory: Password Inference using Accelerometers on Smartphones
E Owusu, J Han, S Das, A Perrig, J Zhang
4442012
Self-Censorship on Facebook
S Das, A Kramer
ICWSM, 2013
2922013
The post that wasn't: exploring self-censorship on facebook
M Sleeper, R Balebako, S Das, AL McConahy, J Wiese, LF Cranor
Proceedings of the 2013 conference on Computer supported cooperative work …, 2013
2622013
Accomplice: Location inference using accelerometers on smartphones
J Han, E Owusu, LT Nguyen, S Das, A Perrig, J Zhang
2012 Fourth International Conference on Communication Systems and Networks …, 2012
2172012
Casa: context-aware scalable authentication
E Hayashi, S Das, S Amini, J Hong, I Oakley
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-10, 2013
2002013
Toward supporting stories with procedurally generated game worlds
K Hartsook, A Zook, S Das, MO Riedl
2011 IEEE Conference on Computational Intelligence and Games (CIG'11), 297-304, 2011
1402011
The effect of social influence on security sensitivity
S Das, THJ Kim, LA Dabbish, JI Hong
10th Symposium On Usable Privacy and Security (SOUPS 2014), 143-157, 2014
1242014
Increasing security sensitivity with social proof: A large-scale experimental confirmation
S Das, ADI Kramer, LA Dabbish, JI Hong
🎖 Proceedings of the 2014 ACM SIGSAC conference on computer and …, 2014
902014
Detecting user activities using the accelerometer on Android smartphones
S Das, L Green, B Perez, M Murphy, A Perrig
90*2010
The role of social influence in security feature adoption
S Das, ADI Kramer, LA Dabbish, JI Hong
Proceedings of the 18th ACM conference on computer supported cooperative …, 2015
822015
Expert and {Non-Expert} Attitudes towards (Secure) Instant Messaging
A De Luca, S Das, M Ortlieb, I Ion, B Laurie
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 147-157, 2016
562016
Exploring Capturable Everyday Memory for Autobiographical Authentication
S Das, E Hayashi, J Hong
🏆 UbiComp, 2013
482013
Breaking! A Typology of Security and Privacy News and How It’s Shared
S Das, J Lo, L Dabbish, JI Hong
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2, 2018
332018
Thumprint: Socially-inclusive local group authentication through shared secret knocks
S Das, G Laput, C Harrison, JI Hong
🎖 Proceedings of the 2017 CHI Conference on Human Factors in Computing …, 2017
332017
A Typology of Perceived Triggers for {End-User} Security and Privacy Behaviors
S Das, LA Dabbish, JI Hong
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 97-115, 2019
322019
Evolving the ecosystem of personal behavioral data
J Wiese, S Das, JI Hong, J Zimmerman
Human–Computer Interaction 32 (5-6), 447-510, 2017
302017
"We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together
H Watson, E Moju-Igbene, A Kumari, S Das
🎖Proceedings of the 2020 CHI Conference on Human Factors in Computing …, 2020
252020
Individually vulnerable, collectively safe: The security and privacy practices of households with older adults
S Murthy, KS Bhat, S Das, N Kumar
Proceedings of the ACM on Human-Computer Interaction 5 (CSCW1), 1-24, 2021
162021
Blind and Human: Exploring More Usable Audio CAPTCHA Designs
V Fanelle, S Karimi, A Shah, B Subramanian, S Das
🏆 Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 111-125, 2020
132020
A market in your social network: the effects of extrinsic rewards on friendsourcing and relationships
H Zhu, S Das, Y Cao, S Yu, A Kittur, R Kraut
🎖Proceedings of the 2016 CHI Conference on Human Factors in Computing …, 2016
132016
The system can't perform the operation now. Try again later.
Articles 1–20