Follow
Michelle L. Mazurek
Michelle L. Mazurek
Associate Professor, University of Maryland
Verified email at umd.edu - Homepage
Title
Cited by
Cited by
Year
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
5992012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
5622011
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-20, 2010
4732010
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
21st USENIX security symposium (USENIX Security 12), 65-80, 2012
4102012
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
3652016
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3112013
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
2942017
How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples
EM Redmiles, S Kross, ML Mazurek
2019 IEEE Symposium on Security and Privacy (SP), 1326-1343, 2019
2502019
Measuring real-world accuracies and biases in modeling password guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 463-481, 2015
2142015
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, PS Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
205*2014
Tag, you can see it!: using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
1862012
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1842010
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the Eighth Symposium on Usable Privacy and Security, 7, 2012
1822012
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior
EM Redmiles, S Kross, ML Mazurek
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1802016
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
D Votipka, R Stevens, EM Redmiles, J Hu, ML Mazurek
2018 IEEE Symposium on Security and Privacy (SP), 134-151, 2018
1642018
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
1562016
I think they're trying to tell me something: Advice sources and selection for digital security
EM Redmiles, AR Malone, ML Mazurek
2016 IEEE Symposium on Security and Privacy (SP), 272-288, 2016
1462016
Security Developer Studies with GitHub Users: Exploring a Convenience Sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Symposium on Usable Privacy and Security (SOUPS), 2017
1422017
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
Y Acar, S Fahl, ML Mazurek
2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016
1412016
Usability and security of text passwords on mobile devices
W Melicher, D Kurilova, SM Segreti, P Kalvani, R Shay, B Ur, L Bauer, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1372016
The system can't perform the operation now. Try again later.
Articles 1–20