" I regretted the minute I pressed share" a qualitative study of regrets on Facebook Y Wang, G Norcie, S Komanduri, A Acquisti, PG Leon, LF Cranor Proceedings of the seventh symposium on usable privacy and security, 1-16, 2011 | 535 | 2011 |
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ... 2012 IEEE symposium on security and privacy, 523-537, 2012 | 459 | 2012 |
Of passwords and people: measuring the effect of password-composition policies S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ... Proceedings of the sigchi conference on human factors in computing systems …, 2011 | 426 | 2011 |
Encountering stronger password requirements: user attitudes and behaviors R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ... Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-20, 2010 | 378 | 2010 |
How does your password measure up? the effect of strength meters on password creation B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ... Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012 | 298 | 2012 |
Measuring password guessability for an entire university ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 223 | 2013 |
Bridging the gap in computer security warnings: A mental model approach C Bravo-Lillo, LF Cranor, J Downs, S Komanduri IEEE Security & Privacy 9 (2), 18-26, 2010 | 197 | 2010 |
Nudges for privacy and security: Understanding and assisting users’ choices online A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ... ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017 | 196 | 2017 |
Fast, lean, and accurate: Modeling password guessability using neural networks W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ... 25th {USENIX} Security Symposium ({USENIX} Security 16), 175-191, 2016 | 165 | 2016 |
Your attention please: designing security-decision UIs to make genuine risks harder to ignore C Bravo-Lillo, S Komanduri, LF Cranor, RW Reeder, M Sleeper, J Downs, ... Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013 | 149 | 2013 |
Correct horse battery staple: Exploring the usability of system-assigned passphrases R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ... Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012 | 149 | 2012 |
Measuring real-world accuracies and biases in modeling password guessability B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ... 24th {USENIX} Security Symposium ({USENIX} Security 15), 463-481, 2015 | 143 | 2015 |
Can long passwords be secure and usable? R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 134 | 2014 |
Designing password policies for strength and usability R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ... ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016 | 78 | 2016 |
Order and entropy in picture passwords S Komanduri, DR Hutchings Proceedings of graphics interface 2008, 115-122, 2008 | 78 | 2008 |
Telepathwords: Preventing weak passwords by reading users’ minds S Komanduri, R Shay, LF Cranor, C Herley, S Schechter 23rd {USENIX} Security Symposium ({USENIX} Security 14), 591-606, 2014 | 76 | 2014 |
Harder to ignore? Revisiting pop-up fatigue and approaches to prevent it C Bravo-Lillo, L Cranor, S Komanduri, S Schechter, M Sleeper 10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 105-111, 2014 | 69 | 2014 |
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ... Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015 | 67 | 2015 |
Improving computer security dialogs C Bravo-Lillo, LF Cranor, J Downs, S Komanduri, M Sleeper IFIP Conference on Human-Computer Interaction, 18-35, 2011 | 62 | 2011 |
The post anachronism: The temporal dimension of Facebook privacy L Bauer, LF Cranor, S Komanduri, ML Mazurek, MK Reiter, M Sleeper, ... Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013 | 58 | 2013 |