default search action
Jessica Staddon
Person information
- affiliation: Google Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Arkaprabha Bhattacharya, Kevin Lee, Vineeth Ravi, Jessica Staddon, Rosanna Bellini:
Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints. CHI 2024: 354:1-354:20 - [i7]Arkaprabha Bhattacharya, Kevin Lee, Vineeth Ravi, Jessica Staddon, Rosanna Bellini:
Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints. CoRR abs/2403.13944 (2024)
2010 – 2019
- 2019
- [c40]Jessica Staddon, Noelle Easterday:
"it's a generally exhausting field" A Large-Scale Study of Security Incident Management Workflows and Pain Points. PST 2019: 1-12 - 2017
- [c39]Pradeep K. Murukannaiah, Chinmaya Dabral, Karthik Sheshadri, Esha Sharma, Jessica Staddon:
Learning a Privacy Incidents Database. HotSoS 2017: 35-44 - [c38]Karthik Sheshadri, Nirav Ajmeri, Jessica Staddon:
No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016. PST 2017: 159-168 - [i6]Adwait Nadkarni, William Enck, Somesh Jha, Jessica Staddon:
Policy by Example: An Approach for Security Policy Specification. CoRR abs/1707.03967 (2017) - 2016
- [c37]Julia Brande Earp, Jessica Staddon:
"I had no idea this was a thing": on the importance of understanding the user experience of personalized transparency tools. STAST 2016: 79-86 - [c36]Andrew McNamara, Akash Verma, Jon Stallings, Jessica Staddon:
Predicting Mobile App Privacy Preferences with Psychographics. WPES@CCS 2016: 47-58 - 2014
- [c35]Manya Sleeper, Sunny Consolvo, Jessica Staddon:
Exploring the benefits and uses of web analytics tools for non-transactional websites. Conference on Designing Interactive Systems 2014: 681-684 - 2013
- [c34]Jessica Staddon, Alessandro Acquisti, Kristen LeFevre:
Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox. SocialCom 2013: 295-302 - [c33]Stephan Micklitz, Martin Ortlieb, Jessica Staddon:
"I hereby leave my email to...": Data Usage Control and the Digital Estate. IEEE Symposium on Security and Privacy Workshops 2013: 42-44 - 2012
- [c32]Saranga Komanduri, Lujun Fang, David A. Huffaker, Jessica Staddon:
Around the Water Cooler: Shared Discussion Topics and Contact Closeness in Social Search. ICWSM 2012 - [c31]Jessica Staddon, David A. Huffaker, Larkin Brown, Aaron Sedley:
Are privacy concerns a turn-off?: engagement and privacy in social networks. SOUPS 2012: 10 - 2011
- [c30]Alex Braunstein, Laura A. Granka, Jessica Staddon:
Indirect content privacy surveys: measuring privacy without asking about it. SOUPS 2011: 15 - [c29]Jessica Staddon, Andrew Swerdlow:
Public vs. Publicized: Content Use Trends and Privacy Expectations. HotSec 2011 - 2010
- [c28]Richard Chow, Ji Fang, Philippe Golle, Jessica Staddon:
The Web as a Privacy Lab. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 - [c27]Nathan Gnanasambandam, Jessica Staddon:
Personalized Privacy Policies: Challenges for Data Loss Prevention. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 - [c26]Richard Chow, Jessica Staddon:
A framework for privacy-conducive recommendations. WPES 2010: 105-108
2000 – 2009
- 2009
- [j5]Eric A. Bier, Richard Chow, Philippe Golle, Tracy Holloway King, Jessica Staddon:
The Rules of Redaction: Identify, Protect, Review (and Repeat). IEEE Secur. Priv. 7(6): 46-53 (2009) - [c25]Jessica Staddon:
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. AISec 2009: 11-14 - [c24]Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina:
Controlling data in the cloud: outsourcing computation without outsourcing control. CCSW 2009: 85-90 - [c23]Richard Chow, Ian Oberst, Jessica Staddon:
Sanitization's slippery slope: the design and study of a text revision assistant. SOUPS 2009 - [e2]Dirk Balfanz, Jessica Staddon:
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-781-3 [contents] - 2008
- [c22]Jessica Staddon:
Sponsored ad-based similarity: an approach to mining collective advertiser intelligence. AdKDD@KDD 2008: 50-56 - [c21]Jessica Staddon, Richard Chow:
Detecting reviewer bias through web-based association mining. WICOW 2008: 5-10 - [c20]Jessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen:
A content-driven access control system. IDtrust 2008: 26-35 - [c19]Richard Chow, Philippe Golle, Jessica Staddon:
Detecting privacy leaks using corpus-based association rules. KDD 2008: 893-901 - [c18]Philippe Golle, Richard Chow, Jessica Staddon:
Testable commitments. StorageSS 2008: 37-42 - [e1]Dirk Balfanz, Jessica Staddon:
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-291-7 [contents] - 2007
- [j4]Robert Johnson, Jessica Staddon:
Deflation-secure web metering. Int. J. Inf. Comput. Secur. 1(1/2): 39-63 (2007) - [j3]Mihir Bellare, Alexandra Boldyreva, Kaoru Kurosawa, Jessica Staddon:
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. IEEE Trans. Inf. Theory 53(11): 3927-3943 (2007) - [c17]Jessica Staddon, Philippe Golle, Bryce Zimny:
Web-Based Inference Detection. USENIX Security Symposium 2007 - 2005
- [c16]Alexandr Andoni, Jessica Staddon:
Graceful service degradation (or, how to know your payment is late). EC 2005: 9-18 - 2004
- [c15]Philippe Golle, Jessica Staddon, Brent R. Waters:
Secure Conjunctive Keyword Search over Encrypted Data. ACNS 2004: 31-45 - [c14]David P. Woodruff, Jessica Staddon:
Private inference control. CCS 2004: 188-197 - [c13]Philippe Golle, Daniel H. Greene, Jessica Staddon:
Detecting and correcting malicious data in VANETs. Vehicular Ad Hoc Networks 2004: 29-37 - [i5]David P. Woodruff, Jessica Staddon:
Private Inference Control. IACR Cryptol. ePrint Arch. 2004: 130 (2004) - 2003
- [j2]Alice Silverberg, Jessica Staddon, Judy L. Walker:
Applications of list decoding to tracing traitors. IEEE Trans. Inf. Theory 49(5): 1312-1318 (2003) - [c12]Sara Miner More, Michael Malkin, Jessica Staddon, Dirk Balfanz:
Sliding-window self-healing key distribution. SSRS@CCS 2003: 82-90 - [c11]Jessica Staddon:
Dynamic inference control. DMKD 2003: 94-100 - [c10]Mihir Bellare, Alexandra Boldyreva, Jessica Staddon:
Randomness Re-use in Multi-recipient Encryption Schemeas. Public Key Cryptography 2003: 85-99 - [c9]Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong:
Secret Handshakes from Pairing-Based Key Agreements. S&P 2003: 180-196 - 2002
- [c8]Robert Johnson, Jessica Staddon:
FAIR: Fair Audience InfeRence. Digital Rights Management Workshop 2002: 190-207 - [c7]Jessica Staddon, Dirk Balfanz, Glenn Durfee:
Efficient tracing of failed nodes in sensor networks. WSNA 2002: 122-130 - [c6]Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean:
Self-Healing Key Distribution with Revocation. S&P 2002: 241-257 - 2001
- [j1]Jessica Staddon, Douglas R. Stinson, Ruizhong Wei:
Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory 47(3): 1042-1049 (2001) - [c5]Alice Silverberg, Jessica Staddon, Judy L. Walker:
Efficient Traitor Tracing Algorithms Using List Decoding. ASIACRYPT 2001: 175-192 - [c4]Sara K. Miner, Jessica Staddon:
Graph-Based Authentication of Digital Streams. S&P 2001: 232-246 - [i4]Alice Silverberg, Jessica Staddon, Judy L. Walker:
Efficient Traitor Tracing Algorithms using List Decoding. IACR Cryptol. ePrint Arch. 2001: 16 (2001) - 2000
- [c3]Juan A. Garay, Jessica Staddon, Avishai Wool:
Long-Lived Broadcast Encryption. CRYPTO 2000: 333-352 - [i3]Jessica Staddon, Douglas R. Stinson, Ruizhong Wei:
Combinatorial Properties of Frameproof and Traceability Codes. IACR Cryptol. ePrint Arch. 2000: 4 (2000) - [i2]Sara K. Miner, Jessica Staddon:
Graph-Based Authentication of Digital Streams. IACR Cryptol. ePrint Arch. 2000: 58 (2000)
1990 – 1999
- 1999
- [c2]Eli Gafni, Jessica Staddon, Yiqun Lisa Yin:
Efficient Methods for Integrating Traceability and Broadcast Encryption. CRYPTO 1999: 372-387 - 1998
- [c1]Michael Luby, Jessica Staddon:
Combinatorial Bounds for Broadcast Encryption. EUROCRYPT 1998: 512-526 - [i1]Burt Kaliski, Jessica Staddon:
PKCS #1: RSA Cryptography Specifications Version 2.0. RFC 2437: 1-39 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 01:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint