Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ... 2012 IEEE symposium on security and privacy, 523-537, 2012 | 566 | 2012 |
Of passwords and people: measuring the effect of password-composition policies S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ... Proceedings of the sigchi conference on human factors in computing systems …, 2011 | 528 | 2011 |
Smart, useful, scary, creepy: perceptions of online behavioral advertising B Ur, PG Leon, LF Cranor, R Shay, Y Wang proceedings of the eighth symposium on usable privacy and security, 1-15, 2012 | 476 | 2012 |
Encountering stronger password requirements: user attitudes and behaviors R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ... Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010 | 448 | 2010 |
How does your password measure up? The effect of strength meters on password creation. B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ... USENIX Security Symposium, 65-80, 2012 | 382 | 2012 |
Measuring password guessability for an entire university ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 304 | 2013 |
I added ‘!’at the end to make it secure”: Observing password creation in the lab B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor Proc. SOUPS, 2015 | 257 | 2015 |
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising P Leon, B Ur, R Shay, Y Wang, R Balebako, L Cranor Proceedings of the SIGCHI conference on human factors in computing systems …, 2012 | 246 | 2012 |
Measuring real-world accuracies and biases in modeling password guessability B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ... 24th {USENIX} Security Symposium ({USENIX} Security 15), 463-481, 2015 | 198 | 2015 |
Access control for home data sharing: Attitudes, needs and practices ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010 | 180 | 2010 |
What matters to users? Factors that affect users' willingness to share information with online advertisers PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ... Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013 | 179 | 2013 |
Correct horse battery staple: Exploring the usability of system-assigned passphrases R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ... Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012 | 173 | 2012 |
Can long passwords be secure and usable? R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 171 | 2014 |
Designing password policies for strength and usability R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ... ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016 | 137 | 2016 |
Sok: Cryptographically protected database search B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ... 2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017 | 133 | 2017 |
Usability and security of text passwords on mobile devices W Melicher, D Kurilova, SM Segreti, P Kalvani, R Shay, B Ur, L Bauer, ... Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 126 | 2016 |
Measuring the effectiveness of privacy tools for limiting behavioral advertising R Balebako, P Leon, R Shay, B Ur, Y Wang, L Cranor Web 2 (0), 2012 | 119 | 2012 |
Telepathwords: Preventing weak passwords by reading users’ minds S Komanduri, R Shay, LF Cranor, C Herley, S Schechter 23rd {USENIX} Security Symposium ({USENIX} Security 14), 591-606, 2014 | 97 | 2014 |
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ... Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015 | 94 | 2015 |
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ... 24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015 | 84 | 2015 |