Shay

Results: 289



#Item
101Cryptography / Password strength / Password / Crypt / OTPW / Random password generator / Security / Computer security / Access control

Password Policy Simulation and Analysis Richard J. K. Shay Purdue University West Lafayette, IN Abhilasha

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
102Password / Computer crimes / GrIDsure / Personal identification number / Keystroke logging / Challenge-response authentication / Transaction authentication number / Password cracking / Password strength / Security / Computer security / Access control

The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs Patrick Gage Kelley*, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Ch

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-11-20 15:29:50
103Computer security / Cyberwarfare / Passphrase / Lorrie Cranor / Password policy / Password cracking / Cryptography / Security / Password

Creating Usable Policies for Stronger Passwords with MTurk Richard Shay February 2015 CMU-ISR[removed]Institute for Software Research

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-02 16:44:46
104Access control / Password / Salt / Crypt / Security token / OTPW / Privileged password management / Security / Computer security / Cryptography

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley? , Richard Shay, and Blase Ur ? Carn

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-11-20 15:25:38
105Password / Randomness / John the Ripper / Entropy / Dictionary attack / OTPW / Random password generator / Cryptography / Security / Computer security

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Rich Shay, Tim Vidas Lujo Bauer, Nicolas Christin, Lo

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:39:30
106Internet privacy / Online advertising / HTTP cookie / Network Advertising Initiative / Behavioral targeting / Google Chrome / AdSense / Google / Advertising / Internet / Computing / Software

Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising Rebecca Balebako, Pedro G. Leon, Richard Shay, Blase Ur, Yang Wang, and Lorrie Faith Cranor Carnegie Mellon University {balebako,pedrogln,r

Add to Reading List

Source URL: www.w2spconf.com

Language: English - Date: 2012-05-24 01:30:01
107Computer security / Randomness / Password / Diceware / Dictionary attack / Cryptography / Security / Passphrase

Correct horse battery staple: Exploring the usability of system-assigned passphrases Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorri

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:39:40
108Internet privacy / Ethics / World Wide Web / Federal Trade Commission / Network Advertising Initiative / Privacy policy / FTC Fair Information Practice / Online advertising / P3P / Internet / Privacy / Computing

AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements Saranga Komanduri, Richard Shay, Greg Norcie, Blase Ur, Lorrie Faith Cranor March 30, 2011

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
109Markov models / Error detection and correction / Computational complexity theory / Combinatorics on words / Lempel–Ziv–Welch / LZ77 and LZ78 / Time complexity / Viterbi algorithm / Dynamic programming / Theoretical computer science / Mathematics / Applied mathematics

Algorithmica[removed]: 379–399 DOI[removed]s00453[removed]Speeding Up HMM Decoding and Training by Exploiting Sequence Repetitions Yury Lifshits · Shay Mozes · Oren Weimann ·

Add to Reading List

Source URL: yury.name

Language: English - Date: 2009-11-15 04:24:21
110Crimes / Password / Phishing / Two-factor authentication / LulzSec / Twitter / Internet privacy / Malware / Identity theft / Security / Access control / Computer security

“My religious aunt asked why I was trying to sell her viagra”: Experiences with account hijacking Richard Shay Carnegie Mellon University Pittsburgh, PA, USA [removed]

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-03-25 14:40:15
UPDATE