Michelle L. Mazurek
Michelle L. Mazurek
Assistant Professor, University of Maryland
Geverifieerd e-mailadres voor umd.edu - Homepage
TitelGeciteerd doorJaar
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
3562012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
3302011
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2, 2010
2982010
How does your password measure up? the effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
2412012
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1652013
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1292010
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the Eighth Symposium on Usable Privacy and Security, 7, 2012
1202012
Tag, you can see it!: using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
1072012
Measuring real-world accuracies and biases in modeling password guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 463-481, 2015
1062015
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, PS Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
922014
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
902016
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
722017
Usability and security of text passwords on mobile devices
W Melicher, D Kurilova, SM Segreti, P Kalvani, R Shay, B Ur, L Bauer, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
552016
Designing Password Policies for Strength and Usability
R Shay, S Komanduri, AL Durity, PS Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 13, 2016
452016
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior
R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ...
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
422015
The post anachronism: the temporal dimension of facebook privacy
L Bauer, LF Cranor, S Komanduri, ML Mazurek, MK Reiter, M Sleeper, ...
Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013
422013
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior
EM Redmiles, S Kross, ML Mazurek
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
402016
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
Y Acar, S Fahl, ML Mazurek
2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016
332016
Exploring reactive access control
ML Mazurek, PF Klemperer, R Shay, H Takabi, L Bauer, LF Cranor
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
312011
Toward strong, usable access control for shared distributed data
ML Mazurek, Y Liang, W Melicher, M Sleeper, L Bauer, GR Ganger, ...
Proceedings of the 12th {USENIX} Conference on File and Storage Technologies …, 2014
302014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20