Follow
Partha Das Chowdhury
Title
Cited by
Cited by
Year
Developers Are Neither Enemies Nor Users: They Are Collaborators
PD Chowdhury, J Hallett, N Patnaik, M Tahaei, A Rashid
IEEE SecDev, 2021
162021
From utility to capability: A new paradigm to conceptualize and develop inclusive PETs
P Das Chowdhury, A Domínguez Hernández, KM Ramokapane, A Rashid
Proceedings of the 2022 New Security Paradigms Workshop, 60-74, 2022
92022
Anonymity and trust in the electronic world
PD Chowdhury
University of Hertfordshire, 2005
82005
Anonymous context based role activation mechanism
P Das Chowdhury, B Christianson, J Malcolm
International Workshop on Security Protocols, 315-321, 2005
62005
Anonymous authentication
PD Chowdhury, B Christianson, J Malcolm
Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28 …, 2006
52006
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications
PD Chowdhury, M Sameen, J Blessing, N Boucher, J Gardiner, T Burrows, ...
arXiv preprint arXiv:2301.05653, 2023
42023
More security or less insecurity
PD Chowdhury, B Christianson
Cambridge International Workshop on Security Protocols, 115-119, 2010
42010
Towards a Framework for Evaluating CSAM Prevention and Detection Tools in the Context of End-to-end Encryption Environments: a Case Study
C Peersman, JT Llanos, C May-Chahal, R McConville, PD Chowdhury, ...
REPHRAIN, 2023
32023
Uncorrelatable electronic transactions using ring signatures
PD Chowdhury, B Christianson
Proceedings of the Wholes Workshop of Multiple Views of Privacy, 2004
22004
‘Ought’should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach
P Das Chowdhury, K Renaud
Proceedings of the 2023 New Security Paradigms Workshop, 76-91, 2023
12023
From Utility to Capability: A Manifesto for Equitable Security and Privacy for All
PD Chowdhury, L Coles-Kemp, K Follis, S Milivojevic, A Rashid, G Liveley, ...
12023
Better Call Saltzer\& Schroeder: A Retrospective Security Analysis of SolarWinds\& Log4j
PD Chowdhury, M Tahaei, A Rashid
arXiv preprint arXiv:2211.02341, 2022
12022
The Political Economy of Privacy Enhancing Technologies.
PD Chowdhury, A Domínguez, KM Ramokapane, A Rashid
arXiv preprint arXiv 2202, 2022
12022
Building a Privacy Testbed: Use Cases and Design Considerations
J Gardiner, PD Chowdhury, J Halsey, M Tahaei, T Elahi, A Rashid
ESORICS SECPRE, 2021
12021
Auditable anonymous delegation
B Christianson, PD Chowdhury, J Malcolm
International Conference on Information Systems Security, 66-76, 2005
12005
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, ambivalences and opportunities
A Domínguez Hernández, KM Ramokapane, P Das Chowdhury, ...
Proceedings of the ACM on Human-Computer Interaction 7 (CSCW2), 1-21, 2023
2023
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities
A Domínguez Hernández, KM Ramokapane, P Das Chowdhury, ...
arXiv e-prints, arXiv: 2307.02332, 2023
2023
Towards Human-Centric Endpoint Security (Transcript of Discussion)
PD Chowdhury
Cambridge International Workshop on Security Protocols, 220-227, 2023
2023
Towards Human-Centric Endpoint Security
J Blessing, PD Chowdhury, M Sameen, R Anderson, J Gardiner, A Rashid
Cambridge International Workshop on Security Protocols, 211-219, 2023
2023
Towards Human-Centric Endpoint Security
PD Chowdhury, J Blessing, M Sameen, R Anderson, J Gardiner, A Rashid
Proceedings of the International Security Protocols Workshop, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20