Stem leaki$ (all stems)
2 papers:
- ICALP-v1-2014-PrabhakaranSW #using
- Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
- CHI-2014-ShklovskiMSB #mobile #privacy
- Leakiness and creepiness in app space: perceptions of privacy and mobile app use (IS, SDM, HHS, HB), pp. 2347–2356.