Follow
Lujo Bauer
Title
Cited by
Cited by
Year
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
17482016
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE Symposium on Security & Privacy, 523-537, 2012
5982012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
5692011
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
4732010
Edit automata: Enforcement mechanisms for run-time security policies
J Ligatti, L Bauer, D Walker
International Journal of Information Security 4, 2-16, 2005
4432005
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
USENIX Security Symposium, 65-80, 2012
4072012
Privacy expectations and preferences in an IoT world
PE Naeini, S Bhagavatula, H Habib, M Degeling, L Bauer, LF Cranor, ...
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 399-412, 2017
3362017
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th USENIX Security Symposium (USENIX Security '16), 175-191, 2016
3282016
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3112013
I added ‘!’at the end to make it secure”: Observing password creation in the lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
SOUPS, 2015
3012015
Android taint flow analysis for app sets
W Klieber, L Flynn, A Bhosale, L Jia, L Bauer
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of …, 2014
2932014
Run-time enforcement of nonsafety policies
J Ligatti, L Bauer, D Walker
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009
2532009
Composing security policies with Polymer
L Bauer, J Ligatti, D Walker
2005 ACM SIGPLAN conference on Programming language design and …, 2005
2412005
Do users' perceptions of password security match reality?
B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
2242016
Measuring real-world accuracies and biases in modeling password guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
USENIX Security, 463-481, 2015
2142015
Expandable grids for visualizing and authoring computer security policies
RW Reeder, L Bauer, LF Cranor, MK Reiter, K Bacon, K How, H Strong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
2022008
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the Ninth Symposium on Usable Privacy and Security, 7, 2013
1862013
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
1852012
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1842010
A general framework for adversarial examples with objectives
M Sharif, S Bhagavatula, L Bauer, MK Reiter
ACM Transactions on Privacy and Security (TOPS) 22 (3), 1-30, 2019
1822019
The system can't perform the operation now. Try again later.
Articles 1–20