Micah Sherr
Orcid: 0000-0001-7413-7673
According to our database1,
Micah Sherr
authored at least 91 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
"Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
ACM Trans. Priv. Secur., 2022
Proc. Priv. Enhancing Technol., 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Generating risk reduction recommendations to decrease vulnerability of public online profiles.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Public Information Exposure Detection: Helping Users Understand Their Web Footprints.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
The design and implementation of the A<sup>3</sup> application-aware anonymity platform.
Comput. Networks, 2014
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014
Proceedings of the 2014 IEEE 28th International Parallel and Distributed Processing Symposium, 2014
2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Proceedings of the 35th International ACM SIGIR conference on research and development in Information Retrieval, 2012
Proceedings of the Practical Aspects of Declarative Languages, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011
Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Second International CIKM Workshop on Cloud Data Management, 2010
2009
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the 7th international conference on Peer-to-peer systems, 2008
2007
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007
Proceedings of the Security Protocols, 2007
Proceedings of the Security Protocols, 2007
2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
2005
Proceedings of the Security Protocols, 2005
2002
Metadata tables to enable dynamic data modeling and web interface design: the SEER example.
Int. J. Medical Informatics, 2002