Richard Shay

According to our database1, Richard Shay authored at least 30 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies.
IEEE Secur. Priv., 2021

2018
Don't Even Ask: Database Access Control through Query Control.
SIGMOD Rec., 2018

2017
SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Designing Password Policies for Strength and Usability.
ACM Trans. Inf. Syst. Secur., 2016

SoK: Privacy on Mobile Devices - It's Complicated.
Proc. Priv. Enhancing Technol., 2016

Usability and Security of Text Passwords on Mobile Devices.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Creating Usable Policies for Stronger Passwords with MTurk.
PhD thesis, 2015

Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Proceedings of the 24th USENIX Security Symposium, 2015

"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Telepathwords: Preventing Weak Passwords by Reading Users' Minds.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Can long passwords be secure and usable?
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Helping Users Create Better Passwords.
login Usenix Mag., 2012

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Smart, useful, scary, creepy: perceptions of online behavioral advertising.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Exploring reactive access control.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Of passwords and people: measuring the effect of password-composition policies.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Encountering stronger password requirements: user attitudes and behaviors.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Exploring reactive access control.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Access control for home data sharing: evaluating social acceptability.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
A comprehensive simulation tool for the analysis of password policies.
Int. J. Inf. Sec., 2009

2007
Password policy simulation and analysis.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007


  Loading...