Segui
Blase Ur
Blase Ur
Associate Professor, University of Chicago
Email verificata su uchicago.edu - Home page
Titolo
Citata da
Citata da
Anno
Smart, useful, scary, creepy: perceptions of online behavioral advertising
B Ur, PG Leon, LF Cranor, R Shay, Y Wang
Proceedings of the Eighth Symposium on Usable Privacy and Security, 4, 2012
5452012
Practical Trigger-Action Programming in the Smart Home
B Ur, E McManus, MPY Ho, ML Littman
Proceedings of the 2014 ACM annual conference on Human factors in computing …, 2014
4912014
How does your password measure up? The effect of strength meters on password creation.
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Proceedings of the 2012 USENIX Security Symposium, 65-80, 2012
4242012
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th USENIX Security Symposium (USENIX Security 16), 175-191, 2016
3572016
Measuring Password Guessability for an Entire University
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2013
3272013
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 123-140, 2015
3202015
{SmartAuth}:{User-Centered} authorization for the internet of things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
26th USENIX Security Symposium (USENIX Security 17), 361-378, 2017
3052017
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018
2862018
Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes
B Ur, MPY Ho, S Brawner, J Lee, S Mennicken, N Picard, D Schulze, ...
CHI 2016, 2016
2732016
Why Johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising
P Leon, B Ur, R Shay, Y Wang, R Balebako, L Cranor
Proceedings of the 2012 ACM annual conference on Human Factors in Computing …, 2012
2682012
Do Users’ Perceptions of Password Security Match Reality?
B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor
Proceedings of the 34th Annual ACM Conference on Human Factors in Computing …, 2016
2382016
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
Proceedings of the 2015 USENIX Security Symposium, 463-481, 2015
2252015
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
2022013
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
1892012
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1872012
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1842014
The current state of access control for smart devices in homes
B Ur, J Jung, S Schechter
Workshop on home usable privacy and security (HUPS) 29, 209-218, 2013
1712013
Design and evaluation of a data-driven password meter
B Ur, F Alfieri, M Aung, L Bauer, N Christin, J Colnago, LF Cranor, ...
Proceedings of the 2017 ACM annual conference on Human Factors in Computing …, 2017
1692017
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
NDSS Workshop on Usable Security (USEC), 2015
1692015
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
1662016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20