Richard Shay
Richard Shay
Technical Staff, MIT Lincoln Laboratory
Verified email at richshay.com - Homepage
Title
Cited by
Cited by
Year
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
4952012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
4702011
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
3952010
Smart, useful, scary, creepy: perceptions of online behavioral advertising
B Ur, PG Leon, LF Cranor, R Shay, Y Wang
proceedings of the eighth symposium on usable privacy and security, 1-15, 2012
3822012
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
21st {USENIX} Security Symposium ({USENIX} Security 12), 65-80, 2012
3342012
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2522013
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising
P Leon, B Ur, R Shay, Y Wang, R Balebako, L Cranor
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
2142012
" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 123-140, 2015
1832015
Measuring real-world accuracies and biases in modeling password guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 463-481, 2015
1612015
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1572012
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1552010
What matters to users? factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
1542013
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1432014
Efficient and scalable socware detection in online social networks
MS Rahman, TK Huang, HV Madhyastha, M Faloutsos
21st {USENIX} Security Symposium ({USENIX} Security 12), 663-678, 2012
1192012
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
1032017
Usability and security of text passwords on mobile devices
W Melicher, D Kurilova, SM Segreti, P Kalvani, R Shay, B Ur, L Bauer, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1002016
Measuring the effectiveness of privacy tools for limiting behavioral advertising
R Balebako, P Leon, R Shay, B Ur, Y Wang, L Cranor
Web 2 (0), 2012
992012
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
982016
Telepathwords: Preventing weak passwords by reading users’ minds
S Komanduri, R Shay, LF Cranor, C Herley, S Schechter
23rd {USENIX} Security Symposium ({USENIX} Security 14), 591-606, 2014
802014
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior
R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ...
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
722015
The system can't perform the operation now. Try again later.
Articles 1–20