Richard Shay
Richard Shay
Technical Staff, MIT Lincoln Laboratory
Geverifieerd e-mailadres voor richshay.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
4352012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
3992011
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-20, 2010
3532010
Smart, useful, scary, creepy: perceptions of online behavioral advertising
B Ur, PG Leon, LF Cranor, R Shay, Y Wang
proceedings of the eighth symposium on usable privacy and security, 1-15, 2012
3032012
How does your password measure up? the effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
2812012
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2092013
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising
P Leon, B Ur, R Shay, Y Wang, R Balebako, L Cranor
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
1812012
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1432012
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1422010
" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 123-140, 2015
1342015
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
1342013
Measuring real-world accuracies and biases in modeling password guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 463-481, 2015
1332015
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1282014
Efficient and scalable socware detection in online social networks
MS Rahman, TK Huang, HV Madhyastha, M Faloutsos
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
1082012
Measuring the effectiveness of privacy tools for limiting behavioral advertising
R Balebako, P Leon, R Shay, B Ur, Y Wang, L Cranor
Web, 2012
932012
Usability and security of text passwords on mobile devices
W Melicher, D Kurilova, SM Segreti, P Kalvani, R Shay, B Ur, L Bauer, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
792016
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
712016
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
692017
Telepathwords: Preventing weak passwords by reading users’ minds
S Komanduri, R Shay, LF Cranor, C Herley, S Schechter
23rd {USENIX} Security Symposium ({USENIX} Security 14), 591-606, 2014
692014
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior
R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ...
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
592015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20