Lorrie Cranor

Results: 246



#Item
131Ethics / Lorrie Cranor / Conference on Human Factors in Computing Systems / Privacy / SIGCHI / Ambient intelligence / Internet privacy / MobileHCI / Computer science / Human–computer interaction / Association for Computing Machinery / Year of birth missing

. SergeEgelman Research Scientist contact

Add to Reading List

Source URL: guanotronic.com

Language: English - Date: 2015-01-21 22:37:59
132Cyberwarfare / Crypt / Cryptography / OTPW / Password strength / Security / Computer security / Password

Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Richard Shay, and Lorrie Faith Cranor, Carnegie Mellon University; Cormac Herley and Stuart Schechter, Microsoft Research https://www.

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-09-26 15:50:05
133Identification / Surveillance / Fingerprints / Authentication / Password / IPhone / Public key fingerprint / Facial recognition system / Iris recognition / Security / Biometrics / Cryptography

Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption Chandrasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe†, Lorrie Faith Cranor, Marios Savvides Carnegie Mellon

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2015-01-16 16:24:14
134Cyberwarfare / Password strength / Password / Password policy / Privileged password management / Security / Cryptography / Computer security

A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek? , William Meli

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2015-04-07 16:18:05
135Coding / Research / Codebook / Atlas.ti / Code / Lorrie Cranor / Internet privacy / Cryptography / Statistics / Science

08- UPS @ Home and Analyzing Qualitative Data Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:54:18
136Password / Scientific method / Statistical hypothesis testing / Hypothesis / Usability / Internet privacy / Research / Smartphone / Science / Statistics / Design of experiments

10- Quantitative data collection Lorrie Cranor, Blase Ur,
 and Rich Shay

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:54:19
137Usability / User interfaces / Paper prototyping / Lorrie Cranor / Computing / Technology / Communication / Human communication / Human–computer interaction / Technical communication

05- Methods and Experiments Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:54:09
138Spamming / Lorrie Cranor / Crime / Ethics / Criminology / Social engineering / Computer crimes / Phishing

11 – Security Warnings Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:54:25
139Crime prevention / National security / Cryptographic software / Computing / Computer security / Electronic commerce / Attacker / TrueCrypt / Lorrie Cranor / Software / Security / Computer network security

02- Introduction to Security / Usable Encryption Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:53:52
140Cyberwarfare / Password strength / Password / Password policy / Privileged password management / Security / Cryptography / Computer security

A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek? , William Meli

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-01-26 11:32:23
UPDATE