default search action
Nathan Malkin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Kelsey R. Fulton, Joseph Lewis, Nathan Malkin, Michelle L. Mazurek:
Write, Read, or Fix? Exploring Alternative Methods for Secure Development Studies. SOUPS @ USENIX Security Symposium 2024: 81-100 - [c13]Phoebe Moh, Andrew Yang, Nathan Malkin, Michelle L. Mazurek:
Understanding How People Share Passwords. SOUPS @ USENIX Security Symposium 2024: 219-237 - 2023
- [j8]Nathan Malkin:
Contextual Integrity, Explained: A More Usable Privacy Definition. IEEE Secur. Priv. 21(1): 58-65 (2023) - [c12]Nathan Reitinger, Nathan Malkin, Omer Akgul, Michelle L. Mazurek, Ian Miers:
Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging. SP 2023: 274-292 - [c11]Phoebe Moh, Pubali Datta, Noel Warford, Adam Bates, Nathan Malkin, Michelle L. Mazurek:
Characterizing Everyday Misuse of Smart Home Devices. SP 2023: 2835-2849 - [c10]Nathan Malkin, Alan F. Luo, Julio Poveda, Michelle L. Mazurek:
Optimistic Access Control for the Smart Home. SP 2023: 3043-3060 - 2022
- [j7]Nathan Malkin, David A. Wagner, Serge Egelman:
Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-28 (2022) - [j6]Gary Liu, Nathan Malkin:
Effects of Privacy Permissions on User Choices in Voice Assistant App Stores. Proc. Priv. Enhancing Technol. 2022(4): 421-439 (2022) - [c9]Nathan Malkin:
Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging. NSPW 2022: 104-116 - [c8]Nathan Malkin, David A. Wagner, Serge Egelman:
Runtime Permissions for Privacy in Proactive Intelligent Assistants. SOUPS @ USENIX Security Symposium 2022: 633-651 - [c7]Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas:
SoK: A Framework for Unifying At-Risk User Research. SP 2022: 2344-2360 - 2021
- [i2]Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas:
SoK: A Framework for Unifying At-Risk User Research. CoRR abs/2112.07047 (2021) - 2020
- [j5]Eyal Péer, Serge Egelman, Marian Harbach, Nathan Malkin, Arunesh Mathur, Alisa Frik:
Nudge me right: Personalizing online security nudges to people's decision-making styles. Comput. Hum. Behav. 109: 106347 (2020)
2010 – 2019
- 2019
- [j4]Madiha Tabassum, Tomasz Kosinski, Alisa Frik, Nathan Malkin, Primal Wijesekera, Serge Egelman, Heather Richter Lipford:
Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 153:1-153:23 (2019) - [j3]Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, David A. Wagner:
Privacy Attitudes of Smart Speaker Users. Proc. Priv. Enhancing Technol. 2019(4): 250-271 (2019) - [c6]Alisa Frik, Nathan Malkin, Marian Harbach, Eyal Péer, Serge Egelman:
A Promise Is A Promise: The Effect of Commitment Devices on Computer Security Intentions. CHI 2019: 604 - [c5]Nathan Malkin, Serge Egelman, David A. Wagner:
Privacy controls for always-listening devices. NSPW 2019: 78-91 - [c4]Frank Li, Lisa Rogers, Arunesh Mathur, Nathan Malkin, Marshini Chetty:
Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines. SOUPS @ USENIX Security Symposium 2019 - 2018
- [c3]Robert W. Reeder, Adrienne Porter Felt, Sunny Consolvo, Nathan Malkin, Christopher Thompson, Serge Egelman:
An Experience Sampling Study of User Reactions to Browser Warnings in the Field. CHI 2018: 512 - [i1]Arunesh Mathur, Nathan Malkin, Marian Harbach, Eyal Péer, Serge Egelman:
Quantifying Users' Beliefs about Software Updates. CoRR abs/1805.04594 (2018) - 2017
- [j2]Linda Naeun Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David A. Wagner:
A Usability Evaluation of Tor Launcher. Proc. Priv. Enhancing Technol. 2017(3): 90 (2017) - 2016
- [j1]Nathan Malkin, Marian Harbach, Alexander De Luca, Serge Egelman:
The Anatomy Of Smartphone Unlocking: Why and How Android Users Around the World Lock their Phones. GetMobile Mob. Comput. Commun. 20(3): 42-46 (2016) - [c2]Marian Harbach, Alexander De Luca, Nathan Malkin, Serge Egelman:
Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking. CHI 2016: 4823-4827 - [c1]Nathan Malkin, Serge Egelman, David A. Wagner:
Recovering High-Value Secrets with SGX and Social Authentication. WAY@SOUPS 2016
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint