Follow
Blase Ur
Blase Ur
Associate Professor, University of Chicago
Verified email at uchicago.edu - Homepage
Title
Cited by
Cited by
Year
Smart, useful, scary, creepy: perceptions of online behavioral advertising
B Ur, PG Leon, LF Cranor, R Shay, Y Wang
Proceedings of the Eighth Symposium on Usable Privacy and Security, 4, 2012
5502012
Practical Trigger-Action Programming in the Smart Home
B Ur, E McManus, MPY Ho, ML Littman
Proceedings of the 2014 ACM annual conference on Human factors in computing …, 2014
4962014
How does your password measure up? The effect of strength meters on password creation.
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Proceedings of the 2012 USENIX Security Symposium, 65-80, 2012
4242012
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th USENIX Security Symposium (USENIX Security 16), 175-191, 2016
3592016
Measuring Password Guessability for an Entire University
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2013
3292013
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 123-140, 2015
3222015
{SmartAuth}:{User-Centered} authorization for the internet of things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
26th USENIX Security Symposium (USENIX Security 17), 361-378, 2017
3082017
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018
2872018
Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes
B Ur, MPY Ho, S Brawner, J Lee, S Mennicken, N Picard, D Schulze, ...
CHI 2016, 2016
2772016
Why Johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising
P Leon, B Ur, R Shay, Y Wang, R Balebako, L Cranor
Proceedings of the 2012 ACM annual conference on Human Factors in Computing …, 2012
2702012
Do Users’ Perceptions of Password Security Match Reality?
B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor
Proceedings of the 34th Annual ACM Conference on Human Factors in Computing …, 2016
2402016
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
Proceedings of the 2015 USENIX Security Symposium, 463-481, 2015
2262015
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
2032013
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
1892012
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1872012
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1852014
The current state of access control for smart devices in homes
B Ur, J Jung, S Schechter
Workshop on home usable privacy and security (HUPS) 29, 209-218, 2013
1712013
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
NDSS Workshop on Usable Security (USEC), 2015
1702015
Design and evaluation of a data-driven password meter
B Ur, F Alfieri, M Aung, L Bauer, N Christin, J Colnago, LF Cranor, ...
Proceedings of the 2017 ACM annual conference on Human Factors in Computing …, 2017
1692017
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
1672016
The system can't perform the operation now. Try again later.
Articles 1–20