Michelle L. Mazurek
Michelle L. Mazurek
Associate Professor, University of Maryland
Verified email at umd.edu - Homepage
Title
Cited by
Cited by
Year
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
4882012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
4642011
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-20, 2010
3932010
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
21st {USENIX} Security Symposium ({USENIX} Security 12), 65-80, 2012
3302012
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2472013
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
1992016
Tag, you can see it!: using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
1742012
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
1712017
Measuring real-world accuracies and biases in modeling password guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 463-481, 2015
1592015
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1582010
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the Eighth Symposium on Usable Privacy and Security, 7, 2012
1572012
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, PS Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1502014
Usability and security of text passwords on mobile devices
W Melicher, D Kurilova, SM Segreti, P Kalvani, R Shay, B Ur, L Bauer, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
982016
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior
EM Redmiles, S Kross, ML Mazurek
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
922016
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
912016
How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples
EM Redmiles, S Kross, ML Mazurek
2019 IEEE Symposium on Security and Privacy (SP), 1326-1343, 2019
842019
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
Y Acar, S Fahl, ML Mazurek
2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016
812016
I think they're trying to tell me something: Advice sources and selection for digital security
EM Redmiles, AR Malone, ML Mazurek
2016 IEEE Symposium on Security and Privacy (SP), 272-288, 2016
772016
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
D Votipka, R Stevens, EM Redmiles, J Hu, ML Mazurek
2018 IEEE Symposium on Security and Privacy (SP), 134-151, 2018
752018
Security Developer Studies with GitHub Users: Exploring a Convenience Sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Symposium on Usable Privacy and Security (SOUPS), 2017
732017
The system can't perform the operation now. Try again later.
Articles 1–20