Patrick Gage Kelley
Patrick Gage Kelley
Google, University of New Mexico, Carnegie Mellon University
Verified email at - Homepage
Cited by
Cited by
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
Understanding and capturing people’s privacy policies in a mobile social networking application
N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and Ubiquitous Computing 13 (6), 401-412, 2009
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
A conundrum of permissions: installing applications on an android smartphone
PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall
International conference on financial cryptography and data security, 68-79, 2012
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-20, 2010
A" nutrition label" for privacy
PG Kelley, J Bresee, LF Cranor, RW Reeder
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
How does your password measure up? the effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
Privacy as part of the app decision-making process
PG Kelley, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
Location-sharing technologies: Privacy risks and controls
JY Tsai, PG Kelley, LF Cranor, N Sadeh
Isjlp 6, 119, 2010
Who's viewed you? The impact of feedback in a mobile location-sharing application
JY Tsai, P Kelley, P Drielsma, LF Cranor, J Hong, N Sadeh
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
M Benisch, PG Kelley, N Sadeh, LF Cranor
Personal and Ubiquitous Computing 15 (7), 679-694, 2011
Empirical models of privacy in location sharing
E Toch, J Cranshaw, PH Drielsma, JY Tsai, PG Kelley, J Springfield, ...
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
Standardizing privacy notices: an online study of the nutrition label approach
PG Kelley, L Cesca, J Bresee, LF Cranor
Proceedings of the SIGCHI Conference on Human factors in Computing Systems …, 2010
A comparative study of online privacy policies and formats
AM Mcdonald, RW Reeder, PG Kelley, LF Cranor
International Symposium on Privacy Enhancing Technologies Symposium, 37-55, 2009
Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share
J Wiese, PG Kelley, LF Cranor, L Dabbish, JI Hong, J Zimmerman
Proceedings of the 13th international conference on Ubiquitous computing …, 2011
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
User-controllable learning of policies
N Sadeh-Koniecpol, PH Drielsma, LF Candor, P Kelley
US Patent 8,423,483, 2013
Capturing social networking privacy preferences
R Ravichandran, M Benisch, PG Kelley, NM Sadeh
International symposium on privacy enhancing technologies symposium, 1-18, 2009
Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption
R Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
Internet Society, 2015
The system can't perform the operation now. Try again later.
Articles 1–20