Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Komanduri, Saranga Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  Designing password policies for strength and usability
Shay R., Komanduri S., Durity A., Huh P., Mazurek M., Segreti S., Ur B., Bauer L., Christin N., Cranor L. ACM Transactions on Information and System Security 18(4): Article No. 13, 2016.  Type: Article

Have you ever wondered why some websites use really annoying password policies? Or have you been responsible for designing a password policy for your organization, and been caught between the users’ demands for easy-to-rememb...
...
Jun 27 2017  
  Your attention please: designing security-decision UIs to make genuine risks harder to ignore
Bravo-Lillo C., Komanduri S., Cranor L., Reeder R., Sleeper M., Downs J., Schechter S.  SOUPS 2013 (Proceedings of the Ninth Symposium on Usable Privacy and Security, Newcastle, UK, Jul 24-26, 2013) 1-12, 2013.  Type: Proceedings

Pop-up alerts carrying warning messages are issued by an operating system whenever a user wants to grant additional privileges to third-party software. Based on their own prior experience of having granted additional privileges to soft...
...
Apr 2 2014  
   Correct horse battery staple: exploring the usability of system-assigned passphrases
Shay R., Kelley P., Komanduri S., Mazurek M., Ur B., Vidas T., Bauer L., Christin N., Cranor L.  SOUPS 2012 (Proceedings of the 8th Symposium on Usable Privacy and Security, Washington, DC, Jul 11-13, 2012) 1-20, 2012.  Type: Proceedings

This paper describes research associated with systems security. It will be of interest to system administrators and people monitoring network security for an organization. It will also be of interest to people doing research in systems...
...
Nov 21 2012  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy