Group identification system R Cunningham, R Shay US Patent 11,368,318, 2022 | | 2022 |
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies A Dettmer, H Okhravi, K Perry, N Schear, R Shay, ME Zurko, P Donovan IEEE Security & Privacy 19 (4), 28-36, 2021 | | 2021 |
Don't even ask: Database access control through query control R Shay, U Blumenthal, V Gadepally, A Hamlin, JD Mitchell, ... ACM SIGMOD Record 47 (3), 17-22, 2019 | 15 | 2019 |
Sok: Cryptographically protected database search B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ... 2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017 | 156 | 2017 |
Diversify to survive: Making passwords stronger with adaptive policies SM Segreti, W Melicher, S Komanduri, D Melicher, R Shay, B Ur, L Bauer, ... Thirteenth symposium on usable privacy and security (SOUPS 2017), 1-12, 2017 | 48 | 2017 |
Can Smartphones and Privacy Coexist?: Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices AE Boustead, A Yerukhimovich, W Welser IV, RK Cunningham, R Shay, ... RAND Corporation, 2016 | | 2016 |
Usability and security of text passwords on mobile devices W Melicher, D Kurilova, SM Segreti, P Kalvani, R Shay, B Ur, L Bauer, ... Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 142 | 2016 |
Designing password policies for strength and usability R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ... ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016 | 163 | 2016 |
Can Smartphones and Privacy Coexist?: Assessing Technologies and Regulations Protecting Personal Data on Android and IOS Devices A Yerukhimovich, R Balebako, AE Boustead, RK Cunningham, W Welser, ... RAND, 2016 | 3 | 2016 |
Sok: Privacy on mobile devices–it’s complicated C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ... Proceedings on Privacy Enhancing Technologies, 2016 | 56 | 2016 |
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ... Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015 | 105 | 2015 |
Creating Usable Policies for Stronger Passwords with MTurk R Shay Carnegie Mellon University, 2015 | 3 | 2015 |
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ... 24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015 | 98 | 2015 |
Security and privacy assurance research (spar) pilot final report B Fuller, D Mitchell, R Cunningham, U Blumenthal, P Cable, A Hamlin, ... Technical report, MIT Lincoln Laboratory Lexington United States, 2015 | 2 | 2015 |
Measuring {Real-World} Accuracies and Biases in Modeling Password Guessability B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ... 24th USENIX Security Symposium (USENIX Security 15), 463-481, 2015 | 217 | 2015 |
Creating Usable Policies for Stronger Passwords with MTurk R Shay Carnegie Mellon University, 2014 | 3 | 2014 |
Can long passwords be secure and usable? R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 177 | 2014 |
" My religious aunt asked why i was trying to sell her viagra" experiences with account hijacking R Shay, I Ion, RW Reeder, S Consolvo Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 86 | 2014 |
Is your inseam a biometric? a case study on the role of usability studies in developing public policy R Balebako, R Shay, LF Cranor Proc. USEC 14, 2014 | 24 | 2014 |
Telepathwords: Preventing Weak Passwords by Reading {Users’} Minds S Komanduri, R Shay, LF Cranor, C Herley, S Schechter 23rd USENIX Security Symposium (USENIX Security 14), 591-606, 2014 | 102 | 2014 |