Year |
Citation |
Score |
2013 |
Mazurek ML, Komanduri S, Vidas T, Bauer L, Christin N, Cranor LF, Kelley PG, Shay R, Ur B. Measuring password guessability for an entire university Proceedings of the Acm Conference On Computer and Communications Security. 173-186. DOI: 10.1145/2508859.2516726 |
0.485 |
|
2013 |
Kelley PG, Cranor LF, Sadeh N. Privacy as part of the app decision-making process Conference On Human Factors in Computing Systems - Proceedings. 3393-3402. DOI: 10.1145/2470654.2466466 |
0.489 |
|
2013 |
Sleeper M, Cranshaw J, Kelley PG, Ur B, Acquisti A, Cranor LF, Sadeh N. "I read my Twitter the next morning and was astonished" a conversational perspective on Twitter regrets Conference On Human Factors in Computing Systems - Proceedings. 3277-3286. DOI: 10.1145/2470654.2466448 |
0.577 |
|
2013 |
Kelley PG, Komanduri S, Mazurek ML, Shay R, Vidas T, Bauer L, Christin N, Cranor LF. The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7862: 34-51. DOI: 10.1007/978-3-642-41320-9_3 |
0.492 |
|
2012 |
Shay R, Kelley PG, Komanduri S, Mazurek ML, Ur B, Vidas T, Bauer L, Christin N, Cranor LF. Correct horse battery staple: Exploring the usability of system-assigned passphrases Soups 2012 - Proceedings of the 8th Symposium On Usable Privacy and Security. DOI: 10.1145/2335356.2335366 |
0.483 |
|
2012 |
Kelley PG, Komanduri S, Mazurek ML, Shay R, Vidas T, Bauer L, Christin N, Cranor LF, López J. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms Proceedings - Ieee Symposium On Security and Privacy. 523-537. DOI: 10.1109/SP.2012.38 |
0.46 |
|
2012 |
Kelley PG, Consolvo S, Cranor LF, Jung J, Sadeh N, Wetherall D. A conundrum of permissions: Installing applications on an android smartphone Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7398: 68-79. DOI: 10.1007/978-3-642-34638-5_6 |
0.604 |
|
2011 |
Wiese J, Kelley PG, Cranor LF, Dabbish L, Hong JI, Zimmerman J. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share Ubicomp'11 - Proceedings of the 2011 Acm Conference On Ubiquitous Computing. 197-206. DOI: 10.1145/2030112.2030140 |
0.53 |
|
2011 |
Komanduri S, Shay R, Kelley PG, Mazurek ML, Bauer L, Christin N, Cranor LF, Egelman S. Of passwords and people: Measuring the effect of password-composition policies Conference On Human Factors in Computing Systems - Proceedings. 2595-2604. DOI: 10.1145/1978942.1979321 |
0.695 |
|
2011 |
Kelley PG, Benisch M, Cranor LF, Sadeh N. When are users comfortable sharing locations with advertisers? Conference On Human Factors in Computing Systems - Proceedings. 2449-2452. DOI: 10.1145/1978942.1979299 |
0.612 |
|
2011 |
Benisch M, Kelley PG, Sadeh N, Cranor LF. Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs Personal and Ubiquitous Computing. 15: 679-694. DOI: 10.1007/s00779-010-0346-0 |
0.628 |
|
2011 |
Kelley PG, Brewer R, Mayer Y, Cranor LF, Sadeh N. An investigation into facebook friend grouping Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6948: 216-233. DOI: 10.1007/978-3-642-23765-2_15 |
0.587 |
|
2011 |
Balebako R, Leon PG, Almuhimedi H, Kelley PG, Mugan J, Acquisti A, Cranor LF, Sadeh N. Nudging users towards privacy on mobile devices Ceur Workshop Proceedings. 722: 23-26. |
0.561 |
|
2010 |
Toch E, Cranshaw J, Hankes-Drielsma P, Springfield J, Kelley PG, Cranor L, Hong J, Sadeh N. Locaccino: A privacy-centric location sharing application Ubicomp'10 - Proceedings of the 2010 Acm Conference On Ubiquitous Computing. 381-382. DOI: 10.1145/1864431.1864446 |
0.401 |
|
2010 |
Shay R, Komanduri S, Kelley PG, Leon PG, Mazurek ML, Bauer L, Christin N, Cranor LF. Encountering stronger password requirements: User attitudes and behaviors Acm International Conference Proceeding Series. DOI: 10.1145/1837110.1837113 |
0.662 |
|
2010 |
Kelley PG, Cesca L, Bresee J, Cranor LF. Standardizing privacy notices: An online study of the nutrition label approach Conference On Human Factors in Computing Systems - Proceedings. 3: 1573-1582. DOI: 10.1145/1753326.1753561 |
0.659 |
|
2009 |
Kelley PG, Bresee J, Cranor LF, Reeder RW. A "nutrition label" for privacy Soups 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security. DOI: 10.1145/1572532.1572538 |
0.629 |
|
2009 |
Kelley PG. Designing a privacy label: Assisting consumer understanding of online privacy practices Conference On Human Factors in Computing Systems - Proceedings. 3347-3352. DOI: 10.1145/1520340.1520484 |
0.392 |
|
2009 |
McDonald AM, Reeder RW, Kelley PG, Cranor LF. A comparative study of online privacy policies and formats Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 37-55. DOI: 10.1007/978-3-642-03168-7_3 |
0.7 |
|
2009 |
Ravichandran R, Benisch M, Kelley PG, Sadeh NM. Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 1-18. DOI: 10.1007/978-3-642-03168-7_1 |
0.346 |
|
2008 |
Reeder RW, Kelley PG, McDonald AM, Cranor LF. A user study of the expandable grid applied to P3P privacy policy visualization Proceedings of the Acm Conference On Computer and Communications Security. 45-54. DOI: 10.1145/1456403.1456413 |
0.712 |
|
2008 |
Kelley PG, Drielsma PH, Sadeh N, Cranor LF. User-controllable learning of security and privacy policies Proceedings of the Acm Conference On Computer and Communications Security. 11-18. DOI: 10.1145/1456377.1456380 |
0.625 |
|
Show low-probability matches. |