Follow
Richard Shay
Title
Cited by
Year
Group identification system
R Cunningham, R Shay
US Patent 11,368,318, 2022
2022
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies
A Dettmer, H Okhravi, K Perry, N Schear, R Shay, ME Zurko, P Donovan
IEEE Security & Privacy 19 (4), 28-36, 2021
2021
Don't even ask: Database access control through query control
R Shay, U Blumenthal, V Gadepally, A Hamlin, JD Mitchell, ...
ACM SIGMOD Record 47 (3), 17-22, 2019
152019
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
1562017
Diversify to survive: Making passwords stronger with adaptive policies
SM Segreti, W Melicher, S Komanduri, D Melicher, R Shay, B Ur, L Bauer, ...
Thirteenth symposium on usable privacy and security (SOUPS 2017), 1-12, 2017
482017
Can Smartphones and Privacy Coexist?: Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices
AE Boustead, A Yerukhimovich, W Welser IV, RK Cunningham, R Shay, ...
RAND Corporation, 2016
2016
Usability and security of text passwords on mobile devices
W Melicher, D Kurilova, SM Segreti, P Kalvani, R Shay, B Ur, L Bauer, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1422016
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
1632016
Can Smartphones and Privacy Coexist?: Assessing Technologies and Regulations Protecting Personal Data on Android and IOS Devices
A Yerukhimovich, R Balebako, AE Boustead, RK Cunningham, W Welser, ...
RAND, 2016
32016
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies, 2016
562016
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior
R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1052015
Creating Usable Policies for Stronger Passwords with MTurk
R Shay
Carnegie Mellon University, 2015
32015
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence
M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ...
24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015
982015
Security and privacy assurance research (spar) pilot final report
B Fuller, D Mitchell, R Cunningham, U Blumenthal, P Cable, A Hamlin, ...
Technical report, MIT Lincoln Laboratory Lexington United States, 2015
22015
Measuring {Real-World} Accuracies and Biases in Modeling Password Guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
24th USENIX Security Symposium (USENIX Security 15), 463-481, 2015
2172015
Creating Usable Policies for Stronger Passwords with MTurk
R Shay
Carnegie Mellon University, 2014
32014
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1772014
" My religious aunt asked why i was trying to sell her viagra" experiences with account hijacking
R Shay, I Ion, RW Reeder, S Consolvo
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
862014
Is your inseam a biometric? a case study on the role of usability studies in developing public policy
R Balebako, R Shay, LF Cranor
Proc. USEC 14, 2014
242014
Telepathwords: Preventing Weak Passwords by Reading {Users’} Minds
S Komanduri, R Shay, LF Cranor, C Herley, S Schechter
23rd USENIX Security Symposium (USENIX Security 14), 591-606, 2014
1022014
The system can't perform the operation now. Try again later.
Articles 1–20