default search action
Partha Das Chowdhury
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2005
- [b1]Partha Das Chowdhury:
Anonymity and trust in the electronic world. University of Hertfordshire, UK, 2005
Journal Articles
- 2024
- [j2]Partha Das Chowdhury, Karen Renaud:
Advocating a Policy Push Toward Inclusive and Secure "Digital-First" Societies. IEEE Secur. Priv. 22(5): 23-31 (2024) - 2023
- [j1]Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid:
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-21 (2023)
Conference and Workshop Papers
- 2023
- [c14]Partha Das Chowdhury, Karen Renaud:
'Ought' should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach. NSPW 2023: 76-91 - [c13]Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid:
Towards Human-Centric Endpoint Security. Security Protocols Workshop 2023: 211-219 - [c12]Partha Das Chowdhury:
Towards Human-Centric Endpoint Security (Transcript of Discussion). Security Protocols Workshop 2023: 220-227 - 2022
- [c11]Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo Marvin Ramokapane, Awais Rashid:
From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs. NSPW 2022: 60-74 - 2021
- [c10]Joseph Gardiner, Partha Das Chowdhury, Jacob Halsey, Mohammad Tahaei, Tariq Elahi, Awais Rashid:
Building a Privacy Testbed: Use Cases and Design Considerations. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 185-193 - [c9]Partha Das Chowdhury, Joseph Hallett, Nikhil Patnaik, Mohammad Tahaei, Awais Rashid:
Developers Are Neither Enemies Nor Users: They Are Collaborators. SecDev 2021: 47-55 - 2017
- [c8]Partha Das Chowdhury, Bruce Christianson:
Self Attestation of Things. Security Protocols Workshop 2017: 76-84 - [c7]Partha Das Chowdhury:
Self Attestation of Things (Transcript of Discussion). Security Protocols Workshop 2017: 85-92 - 2014
- [c6]Partha Das Chowdhury, Bruce Christianson:
Beyond Trust. Security Protocols Workshop 2014: 340-344 - [c5]Partha Das Chowdhury:
Beyond Trust (Transcript of Discussion). Security Protocols Workshop 2014: 345-349 - 2010
- [c4]Partha Das Chowdhury, Bruce Christianson:
More Security or Less Insecurity. Security Protocols Workshop 2010: 115-119 - 2005
- [c3]Bruce Christianson, Partha Das Chowdhury, James A. Malcolm:
Auditable Anonymous Delegation. ICISS 2005: 66-76 - [c2]Partha Das Chowdhury, Bruce Christianson, James A. Malcolm:
Anonymous Context Based Role Activation Mechanism. Security Protocols Workshop 2005: 315-321 - 2004
- [c1]Partha Das Chowdhury, Bruce Christianson, James A. Malcolm:
Anonymous Authentication. Security Protocols Workshop 2004: 299-305
Informal and Other Publications
- 2024
- [i5]Priyanka Badva, Partha Das Chowdhury, Kopo M. Ramokapane, Barnaby Craggs, Awais Rashid:
Assessing Effectiveness of Cyber Essentials Technical Controls. CoRR abs/2406.15210 (2024) - 2023
- [i4]Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross J. Anderson, Awais Rashid:
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications. CoRR abs/2301.05653 (2023) - [i3]Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid:
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. CoRR abs/2307.02332 (2023) - 2022
- [i2]Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo M. Ramokapane, Awais Rashid:
The Political Economy of Privacy Enhancing Technologies. CoRR abs/2202.08548 (2022) - [i1]Partha Das Chowdhury, Mohammad Tahaei, Awais Rashid:
Better Call Saltzer & Schroeder: A Retrospective Security Analysis of SolarWinds & Log4j. CoRR abs/2211.02341 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint