How does your password measure up? The effect of strength meters on password creation B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ... 21st USENIX security symposium (USENIX Security 12), 65-80, 2012 | 645* | 2012 |
A" nutrition label" for privacy PG Kelley, J Bresee, LF Cranor, RW Reeder Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009 | 610 | 2009 |
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ... 2012 IEEE symposium on security and privacy, 523-537, 2012 | 604 | 2012 |
Of passwords and people: measuring the effect of password-composition policies S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ... Proceedings of the sigchi conference on human factors in computing systems …, 2011 | 567 | 2011 |
Understanding and capturing people’s privacy policies in a mobile social networking application N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao Personal and ubiquitous computing 13, 401-412, 2009 | 496 | 2009 |
A conundrum of permissions: installing applications on an android smartphone PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR …, 2012 | 486 | 2012 |
Encountering stronger password requirements: user attitudes and behaviors R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ... Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010 | 483 | 2010 |
Privacy as part of the app decision-making process PG Kelley, LF Cranor, N Sadeh Proceedings of the SIGCHI conference on human factors in computing systems …, 2013 | 442 | 2013 |
Standardizing privacy notices: an online study of the nutrition label approach PG Kelley, L Cesca, J Bresee, LF Cranor Proceedings of the SIGCHI Conference on Human factors in Computing Systems …, 2010 | 337 | 2010 |
Measuring password guessability for an entire university ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 322 | 2013 |
A comparative study of online privacy policies and formats AM McDonald, RW Reeder, PG Kelley, LF Cranor International Symposium on Privacy Enhancing Technologies Symposium, 37-55, 2009 | 275 | 2009 |
Location-sharing technologies: Privacy risks and controls JY Tsai, PG Kelley, LF Cranor, N Sadeh Isjlp 6, 119, 2010 | 259 | 2010 |
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs M Benisch, PG Kelley, N Sadeh, LF Cranor Personal and Ubiquitous Computing 15, 679-694, 2011 | 251 | 2011 |
Who's viewed you? The impact of feedback in a mobile location-sharing application JY Tsai, P Kelley, P Drielsma, LF Cranor, J Hong, N Sadeh Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009 | 247 | 2009 |
Empirical models of privacy in location sharing E Toch, J Cranshaw, PH Drielsma, JY Tsai, PG Kelley, J Springfield, ... Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010 | 231 | 2010 |
Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share J Wiese, PG Kelley, LF Cranor, L Dabbish, JI Hong, J Zimmerman Proceedings of the 13th international conference on Ubiquitous computing …, 2011 | 209 | 2011 |
Correct horse battery staple: Exploring the usability of system-assigned passphrases R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ... Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012 | 184 | 2012 |
User-controllable learning of policies N Sadeh-Koniecpol, PH Drielsma, LF Candor, P Kelley US Patent 8,423,483, 2013 | 172 | 2013 |
" I read my Twitter the next morning and was astonished" a conversational perspective on Twitter regrets M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh Proceedings of the SIGCHI conference on human factors in computing systems …, 2013 | 155 | 2013 |
Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden? R Ravichandran, M Benisch, PG Kelley, NM Sadeh Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009 | 151 | 2009 |