关注
Lujo Bauer
Lujo Bauer
在 cmu.edu 的电子邮件经过验证 - 首页
标题
引用次数
年份
" Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media
S Bhagavatula, L Bauer, A Kapadia
Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-27, 2022
42022
“Did you know this camera tracks your mood?”: Understanding Privacy Expectations and Preferences in the Age of Video Analytics
S Zhang, Y Feng, L Bauer, LF Cranor, A Das, N Sadeh
Proceedings on Privacy Enhancing Technologies, 2021
312021
“I would have to evaluate their objections”: Privacy tensions between smart home device owners and incidental users
C Cobb, S Bhagavatula, KA Garrett, A Hoffman, V Rao, L Bauer
Proceedings on Privacy Enhancing Technologies, 2021
482021
“It's not actually that horrible” Exploring Adoption of Two-Factor Authentication at a University
J Colnago, S Devlin, M Oates, C Swoopes, L Bauer, L Cranor, N Christin
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
1662018
(Do Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking
W Melicher, M Sharif, J Tan, L Bauer, M Christodorescu, PG Leon
Proceedings on Privacy Enhancing Technologies 2, 1-20, 2016
872016
(How) Do people change their passwords after a breach?
S Bhagavatula, L Bauer, A Kapadia
arXiv preprint arXiv:2010.09853, 2020
102020
-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers
M Sharif, L Bauer, MK Reiter
arXiv preprint arXiv:1912.09059, 2019
72019
10-Quantitative data collection
L Bauer, N Christin, A Marsh
2016
A calculus for composing security policies
L Bauer, J Ligatti, D Walker
Technical Report TR-655-02, Princeton University, 2002
182002
A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality
L Bauer, C Bravo-Lillo, E Fragkaki, W Melicher
Proceedings of the 2013 ACM workshop on Digital identity management, 25-36, 2013
482013
A field study of computer-security perceptions using anti-virus customer-support chats
M Sharif, KA Roundy, M Dell'Amico, C Gates, D Kats, L Bauer, N Christin
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
62019
A general and flexible access-control system for the web
L Bauer, MA Schneider, EW Felten
USENIX Security Symposium, 93-108, 2002
1352002
A general framework for adversarial examples with objectives
M Sharif, S Bhagavatula, L Bauer, MK Reiter
ACM Transactions on Privacy and Security (TOPS) 22 (3), 1-30, 2019
1992019
A language and system for composing security policies
L Bauer, J Ligatti, D Walker
Technical Report TR-699-04, Princeton University, 2004
222004
A linear logic of authorization and knowledge
D Garg, L Bauer, K Bowers, F Pfenning, M Reiter
Computer Security–ESORICS 2006, 297-312, 2006
902006
A Linear Logic of Authorization and Knowledge
F Pfenning, L Bauer, K Bowers, D Garg, MK Reiter
Carnegie Mellon University, 0
A Method To Detect Android Privilege Escalation
W Hasegawa, L Bauer, K Shin
IEICE Technical Report; IEICE Tech. Rep. 113 (502), 143-148, 2014
2014
A proof-carrying authorization system
L Bauer, MA Schneider, EW Felten
Electrical and Computer Engineering at Carnegie Mellon University, 2001
212001
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior
R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1052015
A user study of policy creation in a flexible access-control system
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
752008
系统目前无法执行此操作,请稍后再试。
文章 1–20