Saranga Komanduri

According to our database1, Saranga Komanduri
  • authored at least 30 papers between 2008 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online.
ACM Comput. Surv., 2017

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Designing Password Policies for Strength and Usability.
ACM Trans. Inf. Syst. Secur., 2016

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Proceedings of the 24th USENIX Security Symposium, 2015

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.
CoRR, 2014

Telepathwords: Preventing Weak Passwords by Reading Users' Minds.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Building the security behavior observatory: an infrastructure for long-term monitoring of client machines.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Can long passwords be secure and usable?
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Optimizing Password Composition Policies
CoRR, 2013

The post anachronism: the temporal dimension of facebook privacy.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Your attention please: designing security-decision UIs to make genuine risks harder to ignore.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Optimizing password composition policies.
Proceedings of the ACM Conference on Electronic Commerce, 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Around the Water Cooler: Shared Discussion Topics and Contact Closeness in Social Search.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Bridging the Gap in Computer Security Warnings: A Mental Model Approach.
IEEE Security & Privacy, 2011

"I regretted the minute I pressed share": a qualitative study of regrets on Facebook.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Improving Computer Security Dialogs.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

Of passwords and people: measuring the effect of password-composition policies.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Encountering stronger password requirements: user attitudes and behaviors.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

2008
Order and entropy in picture passwords.
Proceedings of the Graphics Interface 2008 Conference, 2008


  Loading...