Pern Hui Chia
Pern Hui Chia
Verified email at google.com
Title
Cited by
Cited by
Year
Is this app safe? A large scale study on application permissions and risk signals
PH Chia, Y Yamamoto, N Asokan
Proceedings of the 21st international conference on World Wide Web, 311-320, 2012
2782012
Interdependent privacy: Let me share your data
G Biczók, PH Chia
International conference on financial cryptography and data security, 338-353, 2013
832013
Re-evaluating the wisdom of crowds in assessing web security
PH Chia, SJ Knapskog
International Conference on Financial Cryptography and Data Security, 299-314, 2011
282011
Colonel Blotto in the phishing war
PH Chia, J Chuang
International Conference on Decision and Game Theory for Security, 201-218, 2011
262011
Use of ratings from personalized communities for trustworthy application installation
PH Chia, AP Heiner, N Asokan
Nordic Conference on Secure IT Systems, 71-88, 2010
22*2010
Community-based web security: complementary roles of the serious and casual contributors
PH Chia, J Chuang
Proceedings of the ACM 2012 conference on Computer Supported Cooperative …, 2012
142012
KHyperLogLog: Estimating reidentifiability and joinability of large data at scale
PH Chia, D Desfontaines, IM Perera, D Simmons-Marengo, C Li, WY Day, ...
2019 IEEE Symposium on Security and Privacy (SP), 350-364, 2019
92019
Colonel Blotto in web security
PH Chia
The Eleventh Workshop on Economics and Information Security, WEIS Rump Session, 2012
92012
Exploring the use of explicit trust links for filtering recommenders: a study on Epinions. com
PH Chia, G Pitsilis
Journal of information processing 19, 332-344, 2011
72011
Does trust matter for user preferences? A study on Epinions ratings
G Pitsilis, PH Chia
IFIP International Conference on Trust Management, 232-247, 2010
72010
Whack-a-mole: Asymmetric conflict and guerrilla warfare in web security
PH Chia, J Chuang, Y Chen
Proceedings of the 15th Annual Workshop on the Economics of Information Security, 2016
32016
Analyzing the gold star scheme in a split tor network
B Westermann, PH Chia, D Kesdogan
International Conference on Security and Privacy in Communication Systems, 77-95, 2011
22011
Analyzing the incentives in Community-based Security Systems
PH Chia
2011 IEEE International Conference on Pervasive Computing and Communications …, 2011
22011
Secure software installation via social rating
PH Chia
Helsinki University of Technology, 2008
22008
Information Security on the Web and App Platforms: An Economic and Socio-Behavioral Perspective
PH Chia
NTNU, 2012
12012
Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions. com (Special Issue on Trust Management)
PHUI CHIA, G PITSILIS
情報処理学会論文誌 論文誌ジャーナル 52 (7), 2166-2178, 2011
2011
Certification intermediaries and the alternative (poster)
PH Chia
International Conference on Financial Cryptography and Data Security, 425-425, 2010
2010
Bitcoin: P2P Digital Currency
PH Chia
KHyperLogLog
PH Chia, D Desfontaines, IM Perera, D Simmons-Marengo, C Li, WY Day, ...
Economics of Information Security
PH Chia
The system can't perform the operation now. Try again later.
Articles 1–20