Apu Kapadia

Personal Homepage

Publication Statistics

Publication period start
Publication period end
Number of co-authors

Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications


Patil, Sameer, Kapadia, Apu (2012): Are you exposed?: conveying information exposure. In: Companion Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work , 2012, . pp. 191-194. http://dx.doi.org/10.1145/2141512.2141575

Patil, Sameer, Norcie, Greg, Kapadia, Apu, Lee, Adam J. (2012): Reasons, rewards, regrets: privacy considerations in location sharing as an interactive pr. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 5. http://dx.doi.org/10.1145/2335356.2335363

Schlegel, Roman, Kapadia, Apu, Lee, Adam J. (2011): Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 14. http://dx.doi.org/10.1145/2078827.2078846

Kapadia, Apu, Triandopoulos, Nikos, Cornelius, Cory, Peebles, Daniel, Kotz, David (2008): AnonySense: Opportunistic and Privacy-Preserving Context Collection. In: Indulska, Jadwiga, Patterson, Donald J., Rodden, Tom, Ott, Max (eds.) Pervasive 2008 - Pervasive Computing, 6th International Conference May 19-22, 2008, Sydney, Australia. pp. 280-297. http://dx.doi.org/10.1007/978-3-540-79576-6_17

Kapadia, Apu, Henderson, Tristan, Fielding, Jeffrey J., Kotz, David (2007): Virtual Walls: Protecting Digital Privacy in Pervasive Environments. In: LaMarca, Anthony, Langheinrich, Marc, Truong, Khai N. (eds.) PERVASIVE 2007 - Pervasive Computing 5th International Conference May 13-16, 2007, Toronto, Canada. pp. 162-179. http://dx.doi.org/10.1007/978-3-540-72037-9_10

Bailey, Katelin, Vongsathorn, Linden, Kapadia, Apu, Masone, Chris, Smith, Sean W. (2007): TwoKind authentication: usable authenticators for untrustworthy environments. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 169-170. http://cups.cs.cmu.edu/soups/2007/posters/p169_bailey.pdf