Lujo Bauer
Lujo Bauer
Bestätigte E-Mail-Adresse bei cmu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 acm sigsac conference on computer and communications …, 2016
8792016
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE Symposium on Security & Privacy, 523-537, 2012
4852012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
4592011
Edit automata: Enforcement mechanisms for run-time security policies
J Ligatti, L Bauer, D Walker
International Journal of Information Security 4 (1-2), 2-16, 2005
4112005
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
3882010
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
USENIX Security Symposium, 65-80, 2012
3252012
Android taint flow analysis for app sets
W Klieber, L Flynn, A Bhosale, L Jia, L Bauer
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of …, 2014
2472014
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2402013
Composing security policies with Polymer
L Bauer, J Ligatti, D Walker
2005 ACM SIGPLAN conference on Programming language design and …, 2005
2332005
Run-time enforcement of nonsafety policies
J Ligatti, L Bauer, D Walker
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009
2162009
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 175-191, 2016
1892016
I added ‘!’at the end to make it secure”: Observing password creation in the lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
SOUPS, 2015
1752015
Expandable grids for visualizing and authoring computer security policies
RW Reeder, L Bauer, LF Cranor, MK Reiter, K Bacon, K How, H Strong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
1742008
More enforceable security policies
L Bauer, J Ligatti, D Walker
Proceedings of the Workshop on Foundations of Computer Security (FCS’02 …, 2002
1732002
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
1722012
Privacy expectations and preferences in an IoT world
PE Naeini, S Bhagavatula, H Habib, M Degeling, L Bauer, LF Cranor, ...
Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 399-412, 2017
1582017
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1582010
Measuring real-world accuracies and biases in modeling password guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
USENIX Security, 463-481, 2015
1572015
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1552012
Do users' perceptions of password security match reality?
B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1482016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20