Service discovery in pervasive computing environments F Zhu, MW Mutka, LM Ni IEEE Pervasive computing 4 (4), 81-90, 2005 | 615 | 2005 |
Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services F Zhu, M Mutka, L Ni Proceedings of the First IEEE International Conference on Pervasive …, 2003 | 155 | 2003 |
A private, secure, and user-centric information exposure model for service discovery protocols F Zhu, MW Mutka, LM Ni IEEE Transactions on Mobile Computing 5 (4), 418-429, 2006 | 88 | 2006 |
PrudentExposure: A private and user-centric service discovery protocol F Zhu, M Mutka, L Ni Second IEEE Annual Conference on Pervasive Computing and Communications …, 2004 | 80 | 2004 |
Expose or not? A progressive exposure approach for service discovery in pervasive computing environments F Zhu, W Zhu, MW Mutka, L Ni Third IEEE International Conference on Pervasive Computing and …, 2005 | 47 | 2005 |
Private and secure service discovery via progressive and probabilistic exposure F Zhu, W Zhu, MW Mutka, LM Ni IEEE Transactions on Parallel and Distributed Systems 18 (11), 1565-1577, 2007 | 40 | 2007 |
Reducing online identity disclosure using warnings S Carpenter, F Zhu, S Kolimi Applied ergonomics 45 (5), 1337-1342, 2014 | 35 | 2014 |
Understanding identity exposure in pervasive computing environments F Zhu, S Carpenter, A Kulkarni Pervasive and Mobile Computing 8 (5), 777-794, 2012 | 35 | 2012 |
Facilitating secure ad hoc service discovery in public environments F Zhu, M Mutka, L Ni Journal of Systems and Software 76 (1), 45-54, 2005 | 28 | 2005 |
The master key: A private authentication approach for pervasive computing environments F Zhu, MW Mutka, LM Ni Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006 | 22 | 2006 |
Private entity authentication for pervasive computing environments MW Mutka, F Zhu, L Ni US Patent 8,966,252, 2015 | 19 | 2015 |
Reciprocity attacks F Zhu, S Carpenter, A Kulkarni, S Kolimi Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011 | 17 | 2011 |
Understanding and minimizing identity exposure in ubiquitous computing environments F Zhu, S Carpenter, A Kulkarni, C Chidambaram, S Pathak 2009 6th Annual International Mobile and Ubiquitous Systems: Networking …, 2009 | 16 | 2009 |
Private Entity Authentication for Pervasive Computing Environments. F Zhu, MW Mutka, LM Ni Int. J. Netw. Secur. 14 (2), 86-100, 2012 | 14 | 2012 |
Designing warnings to reduce identity disclosure S Carpenter, M Shreeves, P Brown, F Zhu, M Zeng International Journal of Human–Computer Interaction 34 (11), 1077-1084, 2018 | 12 | 2018 |
Contexts and sharing/not sharing private information S Kolimi, F Zhu, S Carpenter Proceedings of the 50th Annual Southeast Regional Conference, 292-297, 2012 | 11 | 2012 |
Systems and methods for providing gaze-based notifications F Zhu, M Zeng, S Carpenter US Patent 10,162,651, 2018 | 9 | 2018 |
Rational exposure: A game theoretic approach to optimize identity exposure in pervasive computing environments F Zhu, W Zhu 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 8 | 2009 |
Understanding and improving secure coding behavior with eye tracking methodologies D Davis, F Zhu Proceedings of the 2020 ACM Southeast Conference, 107-114, 2020 | 7 | 2020 |
Do you see the warning? Cybersecurity warnings via nonconscious processing N Agrawal, F Zhu, S Carpenter Proceedings of the 2020 ACM Southeast Conference, 260-263, 2020 | 7 | 2020 |