Princeton School of Public and International Affairs

Filter
Conference contribution

Search results

  • 2021

    Privacy policies over time: Curation and analysis of a million-document dataset

    Amos, R., Acar, G., Lucherini, E., Kshirsagar, M., Narayanan, A. & Mayer, J., Apr 19 2021, The Web Conference 2021 - Proceedings of the World Wide Web Conference, WWW 2021. Association for Computing Machinery, Inc, p. 2165-2176 12 p. (The Web Conference 2021 - Proceedings of the World Wide Web Conference, WWW 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • What makes a dark pattern... dark? design attributes, normative considerations, and measurement methods

    Mathur, A. & Mayer, J., May 6 2021, CHI 2021 - Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems: Making Waves, Combining Strengths. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2020

    An empirical study of wireless carrier authentication for SIM swaps

    Lee, K., Kaiser, B., Mayer, J. & Narayanan, A., 2020, Proceedings of the 16th Symposium on Usable Privacy and Security, SOUPS 2020. USENIX Association, p. 61-80 20 p. (Proceedings of the 16th Symposium on Usable Privacy and Security, SOUPS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • No WAN's Land: Mapping U.S. Broadband Coverage with Millions of Address Queries to ISPs

    Major, D., Teixeira, R. & Mayer, J., Oct 27 2020, IMC 2020 - Proceedings of the 2020 ACM Internet Measurement Conference. Association for Computing Machinery, p. 393-419 27 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    SPORC: Group collaboration using untrusted cloud resources

    Feldman, A. J., Zeller, W. P., Freedman, M. J. & Felten, E. W., Jan 1 2019, Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010. USENIX Association, p. 337-350 14 p. (Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SPORC: Group collaboration using untrusted cloud resources

    Feldman, A. J., Zeller, W. P., Freedman, M. J. & Felten, E. W., 2019, Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010. USENIX Association, p. 337-350 14 p. (Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • The illusion of change: Correcting for biases in change inference for sparse, societal-scale data

    Cadamuro, G., Vinayak, R. K., Blumenstock, J., Kakade, S. & Shapiro, J. N., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 2608-2615 8 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Watching you watch: The tracking ecosystem of over-the-top TV streaming devices

    Moghaddam, H. M., Acar, G., Burgess, B., Mathur, A., Huang, D. Y., Feamster, N. G., Felten, E. W., Mittal, P. & Narayanan, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-147 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • When code isn't law

    Felten, E. W., Oct 28 2019, Proceedings of the Symposium on Computer Science and Law, CSLAW 2019. Association for Computing Machinery, Inc, (Proceedings of the Symposium on Computer Science and Law, CSLAW 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Arbitrum: Scalable, private smart contracts

    Kalodner, H., Goldfeder, S., Chen, X., Weinberg, S. M. & Felten, E. W., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1353-1370 18 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Arbitrum: Scalable, private smart contracts

    Kalodner, H., Goldfeder, S., Chen, X., Weinberg, S. M. & Felten, E. W., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1353-1370 18 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • 2017

    Toward an open-source neutronics code for circulating-fuel reactors

    De Troullioud De Lanversin, J., Glaser, A. & Göttsche, M., Jan 1 2017, Advanced and Next Generation Reactors, Fusion Technology; Codes, Standards, Conformity Assessment, Licensing, and Regulatory Issues. American Society of Mechanical Engineers (ASME), (International Conference on Nuclear Engineering, Proceedings, ICONE; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Unmaking the bomb: Verifying limits on the stockpiles of nuclear weapons

    Glaser, A., Nov 15 2017, Nuclear Weapons and Related Security Issues. Corden, P., Macfarlane, A., Fainberg, T. & Hafemeister, D. (eds.). American Institute of Physics Inc., 020006. (AIP Conference Proceedings; vol. 1898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2015

    Coniks: Bringing key transparency to end users

    Melara, M. S., Blankstein, A., Bonneau, J., Felten, E. W. & Freedman, M. J., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 383-398 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Coniks: Bringing key transparency to end users

    Melara, M. S., Blankstein, A., Bonneau, J., Felten, E. W. & Freedman, M. J., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 383-398 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    98 Scopus citations
  • Cookies that give you away: The surveillance implications of web tracking

    Englehardt, S., Reisman, D., Eubank, C., Zimmerman, P., Mayer, J., Narayanan, A. & Felten, E. W., May 18 2015, WWW 2015 - Proceedings of the 24th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 289-299 11 p. (WWW 2015 - Proceedings of the 24th International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    89 Scopus citations
  • Evaluation of the use of fiber optic sensors in identification of fresco fracturing patterns

    Glisic, B., Sigurdardottir, D. & Dobkin, D. P., Jan 1 2015, Sensors and Smart Structures Technologies for Civil, Mechanical, and Aerospace Systems 2015. Sohn, H., Wang, K-W. & Lynch, J. P. (eds.). SPIE, 943521. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9435).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SoK: Research perspectives and challenges for bitcoin and cryptocurrencies

    Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A. & Felten, E. W., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 104-121 18 p. 7163021. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    503 Scopus citations
  • 2014

    Mixcoin: Anonymity for bitcoin with accountable mixes

    Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J. A. & Felten, E. W., 2014, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers. Safavi-Naini, R. & Christin, N. (eds.). Springer Verlag, p. 486-504 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8437).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    185 Scopus citations
  • 2013

    Small modular reactors: Uranium resource requirements, waste generation and proliferation risk assessment

    Ramana, M. V., Glaser, A. & Hopkins, L. B., 2013, Plant Systems, Construction, Structures and Components; Next Generation Reactors and Advanced Reactors. American Society of Mechanical Engineers (ASME), (International Conference on Nuclear Engineering, Proceedings, ICONE; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Varieties of (de) humanization: Divided by competition and status

    Fiske, S. T., 2013, Objectification and (De)Humanization: 60th Nebraska Symposium on Motivation. Springer Science and Business Media, LLC, p. 53-71 19 p. (Nebraska Symposium on Motivation; vol. 60).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • 2011

    Bubble trouble: Off-line de-anonymization of bubble forms

    Calandrino, J. A., Clarkson, W. & Felten, E. W., Jan 1 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 267-280 14 p. (Proceedings of the 20th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bubble trouble: Off-line de-anonymization of bubble forms

    Calandrino, J. A., Clarkson, W. & Felten, E. W., 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 267-280 14 p. (Proceedings of the 20th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Long range trace detection by Radar REMPI

    Dogariu, A., Stein, C., Glaser, A. & Miles, R. B., Sep 19 2011, Advanced Environmental, Chemical, and Biological Sensing Technologies VIII. Vol. 8024. 80240G

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sulfur hexafluoride detection by Radar resonance enhanced multiphoton ionization

    Stein, C., Dogariu, A., Glaser, A. & Miles, R. B., 2011, 42nd AIAA Plasmadynamics and Lasers Conference. (42nd AIAA Plasmadynamics and Lasers Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • "You might also like:" Privacy risks of collaborative filtering

    Calandrino, J. A., Kilzer, A., Narayanan, A., Felten, E. W. & Shmatikov, V., Aug 29 2011, Proceedings - 2011 IEEE Symposium on Security and Privacy, SP 2011. p. 231-246 16 p. 5958032. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    179 Scopus citations
  • 2010

    Argos: Princeton University's entry in the 2009 intelligent ground vehicle competition

    Abiola, S. O., Baldassano, C. A., Franken, G. H., Harris, R. J., Hendrick, B. A., Mayer, J. R., Partridge, B. A., Starr, E. W., Tait, A. N., Yu, D. D. & Zhu, T. H., May 7 2010, Proceedings of SPIE-IS and T Electronic Imaging - Intelligent Robots and Computer Vision XXVII: Algorithms and Techniques. 75390N. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 7539).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2009

    Fingerprinting blank paper using commodity scanners

    Clarkson, W., Weyrich, T., Finkelstein, A., Heninger, N., Halderman, J. A. & Felten, E. W., 2009, 2009 30th IEEE Symposium on Security and Privacy. p. 301-314 14 p. 5207652. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    74 Scopus citations
  • From dehumanization and objectification to rehumanization: Neuroimaging studies on the building blocks of empathy

    Fiske, S. T., Jun 2009, Values, Empathy, and Fairness across Social Barriers. Blackwell Publishing Inc., p. 31-34 4 p. (Annals of the New York Academy of Sciences; vol. 1167).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Scopus citations
  • 2008

    Coping with outside-the-box attacks

    Felten, E. W., 2008, Computer Aided Verification - 20th International Conference, CAV 2008, Proceedings. p. 3-4 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5123 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2006

    Considering advanced biorefineries in context

    Laser, M., Sokhansanj, S., Bransby, D., Martin, R. L., Jin, H., Lynd, L. R., Larson, E. D. & Dale, B. E., 2006, 2006 AIChE Annual Meeting. (AIChE Annual Meeting, Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Password management strategies for online accounts

    Gaw, S. & Felten, E. W., Dec 1 2006, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006. p. 44-55 12 p. (ACM International Conference Proceeding Series; vol. 149).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    174 Scopus citations
  • Secrecy, flagging, and paranoia: Adoption criteria in encrypted e-mail

    Gaw, S., Felten, E. W. & Fernandez-Kelly, P., Jul 17 2006, CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI. p. 591-600 10 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    57 Scopus citations
  • 2005

    A distributed reputation approach to cooperative internet routing protection

    Yu, H., Rexford, J. L. & Felten, E. W., Dec 1 2005, 2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols. p. 73-78 6 p. 1532057. (2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Mature technology biorefinery scenarios emphasizing fuels and power

    Laser, M., Jin, H., Jayawardhana, K., Lynd, L. R., Larson, E. D., Celik, F. & Dale, B., Jan 1 2005, 05AIChE: 2005 AIChE Annual Meeting and Fall Showcase, Conference Proceedings. American Institute of Chemical Engineers, (AIChE Annual Meeting Conference Proceedings; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2004

    Privacy management for portable recording devices

    Halderman, J. A., Waters, B. & Felten, E. W., 2004, WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society. Association for Computing Machinery (ACM), p. 16-24 9 p. (WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • 2003

    Access control on the Web using proof-carrying authorization

    Bauer, L., Schneider, M. A., Felten, E. W. & Appel, A. W., Jan 1 2003, Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003. Institute of Electrical and Electronics Engineers Inc., p. 117-119 3 p. 1194942. (Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • 2002

    A general and flexible access-control system for the web

    Bauer, L., Schneider, M. A. & Felten, E. W., 2002, Proceedings of the 11th USENIX Security Symposium. USENIX Association, (Proceedings of the 11th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    57 Scopus citations
  • A reflective symmetry descriptor

    Kazhdan, M., Chazelle, B., Dobkin, D., Finkelstein, A. & Funkhouser, T., 2002, Computer Vision - 7th European Conference on Computer Vision, ECCV 2002, Proceedings. Heyden, A., Sparr, G., Nielsen, M. & Johansen, P. (eds.). Springer Verlag, p. 642-656 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2351).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    81 Scopus citations
  • Informed consent in the Mozilla browser: Implementing value-sensitive design

    Friedman, B., Howe, D. C. & Felten, E., 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002. Sprague, R. H. (ed.). IEEE Computer Society, p. 10-19 10 p. 994366. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2002-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    75 Scopus citations
  • 2001

    Matching 3D models with shape distributions

    Osada, R., Funkhouser, T., Chazelle, B. & Dobkin, D., Dec 1 2001, Proceedings - International Conference on Shape Modeling and Applications, SMI 2001. p. 154-166 13 p. 923386. (Proceedings - International Conference on Shape Modeling and Applications, SMI 2001).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    469 Scopus citations
  • 1999

    Multiresolution mesh morphing

    Lee, A. W. F., Dobkin, D., Sweldens, W. & Schröder, P., Jul 1 1999, Proceedings of the 26th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1999. Association for Computing Machinery, Inc, p. 343-350 8 p. (Proceedings of the 26th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1999).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    212 Scopus citations
  • 1997

    Applied computational geometry — Abstract

    Dobkin, D. P., 1997, Algorithms and Data Structures - 5th International Workshop, WADS 1997, Proceedings. Dehne, F., Sack, J-R., Rau-Chaplin, A. & Tamassia, R. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Effect of fuel moisture content on biomass-IGCC performance

    Hughes, W. E. M. & Larson, E. D., 1997, Coal, Biomass and Alternative Fuels; Combustion and Fuels; Oil and Gas Applications; Cycle Innovations. American Society of Mechanical Engineers (ASME), (Proceedings of the ASME Turbo Expo; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • Implementing a general-purpose edge router

    Dobkin, D. P., Gansner, E. R., Koutsofios, E. & North, S. C., 1997, Graph Drawing - 5th International Symposium, GD 1997, Proceedings. DiBattista, G. (ed.). Springer Verlag, p. 262-271 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1353).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • Stream sockets on SHRIMP

    Damianakis, S. N., Dubnicki, C. & Felten, E. W., 1997, Communication and Architectural Support for Network-Based Parallel Computing - 1st International Workshop, CANPC 1997, Proceedings. Stunkel, C. B. & Panda, D. K. (eds.). Springer Verlag, p. 16-30 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1199).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 1996

    Design and implementation of NX message passing using Shrimp virtual memory mapped communication

    Alpert, R., Dubnicki, C., Felten, E. W. & Li, K., 1996, Architecture. Reeves, A. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 111-119 9 p. 537151. (Proceedings of the International Conference on Parallel Processing; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Economic scales for first-generation biomass-gasifier/gas turbine combined cycles fueled from energy plantations

    Larson, E. D. & Marrison, C. I., 1996, Coal, Biomass and Alternative Fuels; Combustion and Fuels; Oil and Gas Applications; Cycle Innovations. Web Portal ASME (American Society of Mechanical Engineers), (ASME 1996 International Gas Turbine and Aeroengine Congress and Exhibition, GT 1996; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • Performance modeling of aeroderivative steam-injected gas turbines and combined cycles fueled from fixed or fluid-bed biomass gasifiers

    Larson, E. D. & Hughes, W. E. M., 1996, Coal, Biomass and Alternative Fuels; Combustion and Fuels; Oil and Gas Applications; Cycle Innovations. Web Portal ASME (American Society of Mechanical Engineers), (ASME 1996 International Gas Turbine and Aeroengine Congress and Exhibition, GT 1996; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Scopus citations
  • Visualizing geometric algorithms - State of the art

    Dobkin, D., 1996, Applied Computational Geometry: Towards Geometric Engineering - FCRC 1996 Workshop, WACG 1996, Selected Papers. Lin, M. C., Lin, M. C. & Manocha, D. (eds.). Springer Verlag, p. 41-44 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1148).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution