The Shay

Results: 134



#Item
41Computer security / Randomness / Password / Diceware / Dictionary attack / Cryptography / Security / Passphrase

Correct horse battery staple: Exploring the usability of system-assigned passphrases Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorri

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:39:40
42Privacy / Usability / Law / Internet privacy / P3P / Facebook / Information privacy / Social networking service / Computing / Ethics / Technology

Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy Rebecca Balebako, Richard Shay, Lorrie Faith Cranor Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: www.rebeccahunt.com

Language: English - Date: 2014-04-23 11:16:10
43Cryptography / Password / Dictionary attack / Single sign-on / Password manager / Privileged password management / Security / Computer security / Access control

Published in International Journal of Information Security; Volume 8, Number 4; August 2009 The original publication is available at www.springerlink.com; DOI[removed]s10207[removed]Richard Shay · Elisa Bertino A Co

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
44Mark 12 / Life of Jesus in the New Testament / Gospel of Luke / You shall not steal / Jesus / Eternal life / Eye of a needle / Luke 1 / Christian communism / Religion / Christianity / Belief

Richard Shay Senior Thesis Jesus and Hierarchy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
45Password / John the Ripper / Password manager / Password fatigue / Security / Computer security / Cryptography

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-09-24 21:06:51
46Internet privacy / Online advertising / HTTP cookie / Network Advertising Initiative / Behavioral targeting / Google Chrome / AdSense / Google / Advertising / Internet / Computing / Software

Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising Rebecca Balebako, Pedro G. Leon, Richard Shay, Blase Ur, Yang Wang, and Lorrie Faith Cranor Carnegie Mellon University {balebako,pedrogln,r

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-04-23 14:01:49
47Cyberwarfare / Password strength / Password / Password policy / Privileged password management / Security / Cryptography / Computer security

A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek? , William Meli

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2015-04-07 16:18:05
48Public economics / Development / Foreign direct investment / International business / Macroeconomics / Income tax in the United States / Tax / International taxation / Income tax / Economics / Taxation / Business

LESSONS THE UNITED STATES CAN LEARN FROM OTHER COUNTRIES’ TERRITORIAL SYSTEMS FOR TAXING INCOME OF MULTINATIONAL CORPORATIONS Rosanne Altshuler, Stephen Shay, and Eric Toder January 21, 2015

Add to Reading List

Source URL: www.taxpolicycenter.org

Language: English - Date: 2015-04-06 16:02:51
49Adolescence / Pregnancy / Medicine / Fertility / Teenage pregnancy / Youth / Minors and abortion / Support for the legalization of abortion / Sex education / Human development / Obstetrics / Human sexuality

Supporting pregnant and parenting young people Pamela Doherty, Children by Choice; Shay Collins, Young Parents Program; Kate Fenton, Young Mothers for Young Women Workshop objective The supporting pregnant and parenting

Add to Reading List

Source URL: www.childrenbychoice.org.au

Language: English - Date: 2013-02-18 21:08:58
50Cyberwarfare / Password strength / Password / Password policy / Privileged password management / Security / Cryptography / Computer security

A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek? , William Meli

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-01-26 11:32:23
UPDATE