Mazurek

Results: 241



#Item
1Cryptography / Cryptographic software / Technical communication / E-commerce / Microsoft CryptoAPI / Public-key cryptography / Key / Usability / RSA / Application programming interface / Symmetric-key algorithm / OpenSSL

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:35
2

The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs Patrick Gage Kelley*, Saranga Komanduri, Michelle L. Mazurek, Rich Shay, Tim Vidas, Lujo Bauer, Nicolas Chris

Add to Reading List

Source URL: www.kisc.meiji.ac.jp

Language: English
    3

    Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne

    Add to Reading List

    Source URL: lorrie.cranor.org

    Language: English - Date: 2014-06-20 12:27:37
      4

      2016 IEEE Symposium on Security and Privacy You Get Where You’re Looking For The Impact of Information Sources on Code Security Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim† , Michelle L. Mazurek† , Chris

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2016-04-21 14:48:28
        5

        Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2017-04-03 15:56:35
          6

          Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

          Add to Reading List

          Source URL: obj.umiacs.umd.edu

          - Date: 2017-05-15 16:43:59
            7

            You are not your developer, either A research agenda for usable privacy and security beyond end users Yasemin Acar, Sascha Fahl, and Michelle Mazurek CISPA, Saarland University

            Add to Reading List

            Source URL: cybersec-prod.s3.amazonaws.com

            - Date: 2016-12-05 15:22:43
              8Information science / Information / Computing / Digital libraries / Records management / Archival science / Academic publishing / Technical communication / Library / Open Archives Initiative

              Digital Object Lifecycle in dLibra Digital Library Framework Cezary Mazurek and Marcin Werla Poznan Supercomputing and Networking Center Poznan, Poland {mazurek,mwerla}@man.poznan.pl

              Add to Reading List

              Source URL: delos-wp5.ukoln.ac.uk

              Language: English - Date: 2005-04-26 06:55:06
              9Cryptography / Computer access control / Password / Security / Salt / Crypt / Challengeresponse authentication / Security token / Password synchronization / Password fatigue

              Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley? , Richard Shay, and Blase Ur ? Carn

              Add to Reading List

              Source URL: www.andrew.cmu.edu

              Language: English - Date: 2016-08-12 08:57:24
              10

              Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms Saranga Komanduri Patrick Gage Kelley, Michelle L. Mazurek,

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2012-06-01 23:27:39
                UPDATE