" Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media S Bhagavatula, L Bauer, A Kapadia Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-27, 2022 | 4 | 2022 |
“Did you know this camera tracks your mood?”: Understanding Privacy Expectations and Preferences in the Age of Video Analytics S Zhang, Y Feng, L Bauer, LF Cranor, A Das, N Sadeh Proceedings on Privacy Enhancing Technologies, 2021 | 31 | 2021 |
“I would have to evaluate their objections”: Privacy tensions between smart home device owners and incidental users C Cobb, S Bhagavatula, KA Garrett, A Hoffman, V Rao, L Bauer Proceedings on Privacy Enhancing Technologies, 2021 | 48 | 2021 |
“It's not actually that horrible” Exploring Adoption of Two-Factor Authentication at a University J Colnago, S Devlin, M Oates, C Swoopes, L Bauer, L Cranor, N Christin Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018 | 166 | 2018 |
(Do Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking W Melicher, M Sharif, J Tan, L Bauer, M Christodorescu, PG Leon Proceedings on Privacy Enhancing Technologies 2, 1-20, 2016 | 87 | 2016 |
(How) Do people change their passwords after a breach? S Bhagavatula, L Bauer, A Kapadia arXiv preprint arXiv:2010.09853, 2020 | 10 | 2020 |
-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers M Sharif, L Bauer, MK Reiter arXiv preprint arXiv:1912.09059, 2019 | 7 | 2019 |
10-Quantitative data collection L Bauer, N Christin, A Marsh | | 2016 |
A calculus for composing security policies L Bauer, J Ligatti, D Walker Technical Report TR-655-02, Princeton University, 2002 | 18 | 2002 |
A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality L Bauer, C Bravo-Lillo, E Fragkaki, W Melicher Proceedings of the 2013 ACM workshop on Digital identity management, 25-36, 2013 | 48 | 2013 |
A field study of computer-security perceptions using anti-virus customer-support chats M Sharif, KA Roundy, M Dell'Amico, C Gates, D Kats, L Bauer, N Christin Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 6 | 2019 |
A general and flexible access-control system for the web L Bauer, MA Schneider, EW Felten USENIX Security Symposium, 93-108, 2002 | 135 | 2002 |
A general framework for adversarial examples with objectives M Sharif, S Bhagavatula, L Bauer, MK Reiter ACM Transactions on Privacy and Security (TOPS) 22 (3), 1-30, 2019 | 199 | 2019 |
A language and system for composing security policies L Bauer, J Ligatti, D Walker Technical Report TR-699-04, Princeton University, 2004 | 22 | 2004 |
A linear logic of authorization and knowledge D Garg, L Bauer, K Bowers, F Pfenning, M Reiter Computer Security–ESORICS 2006, 297-312, 2006 | 90 | 2006 |
A Linear Logic of Authorization and Knowledge F Pfenning, L Bauer, K Bowers, D Garg, MK Reiter Carnegie Mellon University, 0 | | |
A Method To Detect Android Privilege Escalation W Hasegawa, L Bauer, K Shin IEICE Technical Report; IEICE Tech. Rep. 113 (502), 143-148, 2014 | | 2014 |
A proof-carrying authorization system L Bauer, MA Schneider, EW Felten Electrical and Computer Engineering at Carnegie Mellon University, 2001 | 21 | 2001 |
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ... Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015 | 105 | 2015 |
A user study of policy creation in a flexible access-control system L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008 | 75 | 2008 |