Articoli con mandati relativi all'accesso pubblico - Blase UrUlteriori informazioni
Disponibili pubblicamente: 47
{SmartAuth}:{User-Centered} authorization for the internet of things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
26th USENIX Security Symposium (USENIX Security 17), 361-378, 2017
Mandati: US National Science Foundation, US Department of Defense
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018
Mandati: US National Science Foundation, John D. and Catherine T. MacArthur …
Do Users’ Perceptions of Password Security Match Reality?
B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor
Proceedings of the 34th Annual ACM Conference on Human Factors in Computing …, 2016
Mandati: US National Science Foundation
Design and evaluation of a data-driven password meter
B Ur, F Alfieri, M Aung, L Bauer, N Christin, J Colnago, LF Cranor, ...
Proceedings of the 2017 ACM annual conference on Human Factors in Computing …, 2017
Mandati: US National Science Foundation
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
Mandati: US National Science Foundation
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the 2013 ACM annual conference on Human factors in computing …, 2013
Mandati: Research Foundation (Flanders)
Usability and security of text passwords on mobile devices
W Melicher, D Kurilova, SM Segreti, P Kalvani, R Shay, B Ur, L Bauer, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
Mandati: US National Science Foundation
An Empirical Study on the Perceived Fairness of Realistic, Imperfect Machine Learning Models
G Harrison, J Hanson, C Jacinto, J Ramirez, B Ur
Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020
Mandati: US National Science Foundation
How users interpret bugs in trigger-action programming
W Brackenbury, A Deora, J Ritchey, J Vallee, W He, G Wang, ML Littman, ...
Proceedings of the 2019 CHI conference on human factors in computing systems …, 2019
Mandati: US National Science Foundation
AutoTap: Synthesizing and repairing trigger-action programs using LTL properties
L Zhang, W He, J Martinez, N Brackenbury, S Lu, B Ur
2019 IEEE/ACM 41st international conference on software engineering (ICSE …, 2019
Mandati: US National Science Foundation
A Large-Scale Evaluation of US Financial Institutions’ Standardized Privacy Notices
LF Cranor, PG Leon, B Ur
ACM Transactions on the Web (TWEB), 2016
Mandati: US National Science Foundation
Watching them watching me: Browser extensions’ impact on user privacy awareness and concern
F Schaub, A Marella, P Kalvani, B Ur, C Pan, E Forney, LF Cranor
NDSS workshop on usable security 10, 2016
Mandati: US National Science Foundation
Oh, the places you've been! User reactions to longitudinal transparency about third-party web tracking and inferencing
B Weinshel, M Wei, M Mondal, E Choi, S Shan, C Dolin, ML Mazurek, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Mandati: US Department of Defense
What Twitter knows: Characterizing ad targeting practices, user perceptions, and ad explanations through users' own Twitter data
M Wei, M Stamos, S Veys, N Reitinger, J Goodman, M Herman, ...
29th USENIX Security Symposium (USENIX Security 20), 145-162, 2020
Mandati: US Department of Defense
Unpacking perceptions of data-driven inferences underlying online targeting and personalization
C Dolin, B Weinshel, S Shan, CM Hahn, E Choi, ML Mazurek, B Ur
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
Mandati: US Department of Defense
Password Creation in the Presence of Blacklists
H Habib, J Colnago, W Melicher, B Ur, S Segreti, L Bauer, N Christin, ...
NDSS Workshop on Usable Security (USEC), 2017
Mandati: US National Science Foundation
Forgotten but not gone: Identifying the need for longitudinal data management in cloud storage
MT Khan, M Hyun, C Kanich, B Ur
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
Mandati: US National Science Foundation
" It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About {FIDO2} Biometric {WebAuthn}
L Lassak, A Hildebrandt, M Golla, B Ur
30th USENIX Security Symposium (USENIX Security 21), 91-108, 2021
Mandati: German Research Foundation
When smart devices are stupid: Negative experiences using home smart devices
W He, J Martinez, R Padhi, L Zhang, B Ur
2019 IEEE Security and Privacy Workshops (SPW), 150-155, 2019
Mandati: US National Science Foundation
Trace2tap: Synthesizing trigger-action programs from traces of behavior
L Zhang, W He, O Morkved, V Zhao, ML Littman, S Lu, B Ur
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
Mandati: US National Science Foundation
Le informazioni sulla pubblicazione e sul finanziamento vengono stabilite automaticamente da un software