How does your password measure up? the effect of strength meters on password creation

Lorrie Faith Cranor , Timothy Passaro , Patrick Gage Kelley , Timothy Vidas
usenix security symposium 5 -5

181
2012
Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising (CMU-CyLab-12-007)

Lorrie Faith Cranor , Blase Ur , Pedro Giovanni Leon , Richard Shay

3
2012
Measuring real-world accuracies and biases in modeling password guessability

Darya Kurilova , Lorrie Faith Cranor , Sean M. Segreti , Saranga Komanduri
usenix security symposium 463 -481

93
2015
Telepathwords: preventing weak passwords by reading users' minds

Lorrie Faith Cranor , Cormac Herley , Stuart Schechter , Saranga Komanduri
usenix security symposium 591 -606

54
2014
Diversify to survive: making passwords stronger with adaptive policies

Lorrie Faith Cranor , Sean M. Segreti , Saranga Komanduri , Blase Ur
symposium on usable privacy and security 1 -12

18
2017
Security and Privacy Assurance Research (SPAR) Pilot Final Report

Sophia Yakoubov , Ariel Hamlin , Arkady Yerukhimovich , Benjamin Fuller

2015
Securing Early Software Development

Eric Wustrow , David Dagon , David Dagon , Michalis Faloutsos
usenix security symposium 663 -678

2012
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies

Hamed Okhravi , Paula Donovan , Richard Shay , Mary Ellen Zurko
ieee symposium on security and privacy 2 -11

2021
What matters to users?: factors that affect users' willingness to share information with online advertisers

Pedro Giovanni Leon , Blase Ur , Yang Wang , Manya Sleeper
symposium on usable privacy and security 7

176
2013
Usability and Security of Text Passwords on Mobile Devices

William Melicher , Darya Kurilova , Sean M. Segreti , Pranshu Kalvani
human factors in computing systems 527 -539

49
2016
Password policy simulation and analysis

Richard Shay , Abhilasha Bhargav-Spantzel , Elisa Bertino
Proceedings of the 2007 ACM workshop on Digital identity management - DIM '07 1 -10

25
2007
Encountering stronger password requirements: user attitudes and behaviors

Richard Shay , Saranga Komanduri , Patrick Gage Kelley , Pedro Giovanni Leon
symposium on usable privacy and security 2

252
2010
Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices

Arkady Yerukhimovich , Rebecca Balebako , Anne Boustead , Robert Cunningham
RAND Corporation

1
2016
Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy

Rebecca Balebako , Richard Shay , Lorrie Faith Cranor
Proceedings 2014 Workshop on Usable Security

8
2014
Can long passwords be secure and usable

Richard Shay , Saranga Komanduri , Adam L. Durity , Phillip (Seyoung) Huh
human factors in computing systems 2927 -2936

101
2014
A comprehensive simulation tool for the analysis of password policies

Richard Shay , Elisa Bertino
International Journal of Information Security 8 ( 4) 275 -289

19
2009
Access Control for Home Data Sharing: Attitudes, Needs and Practices

Michelle L Mazurek , JP Arsenault , Joanna Bresee , Nitin Gupta
human factors in computing systems 645 -654

111
2010
Exploring reactive access control

Michelle L Mazurek , Peter F Klemperer , Richard Shay , Hassan Takabi
human factors in computing systems 2085 -2094

24
2010
SoK: Cryptographically Protected Database Search

Benjamin Fuller , Mayank Varia , Arkady Yerukhimovich , Emily Shen
2017 IEEE Symposium on Security and Privacy (SP) 172 -191

131
2017