关注
Lujo Bauer
Lujo Bauer
在 cmu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
18172016
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE Symposium on Security & Privacy, 523-537, 2012
6052012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
5752011
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
4822010
Edit automata: Enforcement mechanisms for run-time security policies
J Ligatti, L Bauer, D Walker
International Journal of Information Security 4, 2-16, 2005
4462005
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
USENIX Security Symposium, 65-80, 2012
4142012
Privacy expectations and preferences in an IoT world
PE Naeini, S Bhagavatula, H Habib, M Degeling, L Bauer, LF Cranor, ...
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 399-412, 2017
3592017
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th USENIX Security Symposium (USENIX Security '16), 175-191, 2016
3402016
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3192013
I added ‘!’at the end to make it secure”: Observing password creation in the lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
SOUPS, 2015
3102015
Android taint flow analysis for app sets
W Klieber, L Flynn, A Bhosale, L Jia, L Bauer
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of …, 2014
2942014
Run-time enforcement of nonsafety policies
J Ligatti, L Bauer, D Walker
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009
2572009
Composing security policies with Polymer
L Bauer, J Ligatti, D Walker
2005 ACM SIGPLAN conference on Programming language design and …, 2005
2422005
Do users' perceptions of password security match reality?
B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
2312016
Measuring real-world accuracies and biases in modeling password guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
USENIX Security, 463-481, 2015
2182015
Expandable grids for visualizing and authoring computer security policies
RW Reeder, L Bauer, LF Cranor, MK Reiter, K Bacon, K How, H Strong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
2032008
A general framework for adversarial examples with objectives
M Sharif, S Bhagavatula, L Bauer, MK Reiter
ACM Transactions on Privacy and Security (TOPS) 22 (3), 1-30, 2019
1992019
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the Ninth Symposium on Usable Privacy and Security, 7, 2013
1922013
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
1882012
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1862010
系统目前无法执行此操作,请稍后再试。
文章 1–20