Nudges for privacy and security: Understanding and assisting users' choices online
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …
privacy and security decisions. A growing body of research has investigated individuals' …
A survey on systems security metrics
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …
systematically explored based on the understanding of attack-defense interactions, which …
An unexpectedly large count of trees in the West African Sahara and Sahel
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …
How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples
Security and privacy researchers often rely on data collected from Amazon Mechanical Turk
(MTurk) to evaluate security tools, to understand users' privacy preferences and to measure …
(MTurk) to evaluate security tools, to understand users' privacy preferences and to measure …
Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
[PDF][PDF] The tangled web of password reuse.
Today's Internet services rely heavily on text-based passwords for user authentication. The
pervasiveness of these services coupled with the difficulty of remembering large numbers of …
pervasiveness of these services coupled with the difficulty of remembering large numbers of …
Fast, lean, and accurate: Modeling password guessability using neural networks
Human-chosen text passwords, today's dominant form of authentication, are vulnerable to
guessing attacks. Unfortunately, existing approaches for evaluating password strength by …
guessing attacks. Unfortunately, existing approaches for evaluating password strength by …
{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …
improvement. Too many things are asked of them, which may be unrealistic, time …
" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …
documented features that lead to easily guessed passwords, but have not probed why users …
Passwords and the evolution of imperfect authentication
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …