Sherr, Micah
64  results:
Search for persons X
?
1

Editors' Introduction:

Sherr, Micah ; Shafiq, Zubair
Proceedings on Privacy Enhancing Technologies.  2024 (2024)  2 - p. 1-4 , 2024
 
?
2

Editors' Introduction:

Sherr, Micah ; Shafiq, Zubair
Proceedings on Privacy Enhancing Technologies.  2024 (2024)  3 - p. 1-3 , 2024
 
?
3

You Can Find Me Here: A Study of the Early Adoption of Geof..:

, In: Passive and Active Measurement; Lecture Notes in Computer Science,
Fainchtein, Rahel A. ; Sherr, Micah - p. 228-245 , 2024
 
?
4

Cadence: A Simulator for Human Movement-based Communication..:

, In: Proceedings of the 16th Cyber Security Experimentation and Test Workshop,
Berger, Harel ; Sherr, Micah ; Aviv, Adam - p. 26-31 , 2023
 
?
5

Editors' Introduction:

Mazurek, Michelle ; Sherr, Micah
Proceedings on Privacy Enhancing Technologies.  2023 (2023)  1 - p. 1-4 , 2023
 
?
6

Learning to Behave: Improving Covert Channel Security with ..:

Wails, Ryan ; Stange, Andrew ; Troper, Eliana...
Proceedings on Privacy Enhancing Technologies.  2022 (2022)  3 - p. 179-199 , 2022
 
?
7

Accountable Private Set Cardinality for Distributed Measure..:

Fenske, Ellis ; Mani, Akshaya ; Johnson, Aaron.
ACM Transactions on Privacy and Security.  25 (2022)  4 - p. 1-35 , 2022
 
?
8

User Perceptions of the Privacy and Usability of Smart DNS:

, In: Annual Computer Security Applications Conference,
 
?
9

Predictive effects of creative abilities and attitudes on p..:

Daker, Richard J. ; Colaizzi, Griffin A. ; Mastrogiannis, Ariana M....
Translational Issues in Psychological Science.  8 (2022)  1 - p. 104-124 , 2022
 
?
10

Residue-Free Computing:

Arkema, Logan ; Sherr, Micah
Proceedings on Privacy Enhancing Technologies.  2021 (2021)  4 - p. 389-405 , 2021
 
?
11

Holes in the Geofence: Privacy Vulnerabilities in "Smart" D..:

Fainchtein, Rahel A. ; Aviv, Adam J. ; Sherr, Micah..
Proceedings on Privacy Enhancing Technologies.  2021 (2021)  2 - p. 151-172 , 2021
 
?
12

Ephemeral Exit Bridges for Tor:

, In: 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Zhang, Zhao ; Vaidya, Tavish ; Subramanian, Kartik.. - p. 253-265 , 2020
 
?
13

Bypassing Tor Exit Blocking with Exit Bridge Onion Services:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
Zhang, Zhao ; Zhou, Wenchao ; Sherr, Micah - p. 3-16 , 2020
 
?
14

Does Being Verified Make You More Credible? : Account Ve..:

, In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems,
 
?
15

Whisper : a unilateral defense against VoIP traffic re-i..:

, In: Proceedings of the 35th Annual Computer Security Applications Conference,
Vaidya, Tavish ; Walsh, Tim ; Sherr, Micah - p. 286-296 , 2019
 
1-15