What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Blase Ur
Google Scholar
35
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Characterizing the Usability and Usefulness of U.S. Ad Transparency Systems.
Kevin Bryson
Arthur Borem
Phoebe Moh
Omer Akgul
Laura Edelson
Tobias Lauinger
Michelle L. Mazurek
Damon McCoy
Blase Ur
2024
journals/popets
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads.
Nathan Reitinger
Bruce Wen
Michelle L. Mazurek
Blase Ur
2024
conf/uss
Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication.
Leona Lassak
Elleen Pan
Blase Ur
Maximilian Golla
2024
conf/uss
Data Subjects' Reactions to Exercising Their Right of Access.
Arthur Borem
Elleen Pan
Olufunmilola Obielodan
Aurelie Roubinowitz
Luca Dovichi
Michelle L. Mazurek
Blase Ur
2024
conf/eurosp
Can Allowlists Capture the Variability of Home IoT Device Network Behavior?
Weijia He
Kevin Bryson
Ricardo Calderon
Vijay Prakash
Nick Feamster
Danny Yuxing Huang
Blase Ur
2023
conf/ccs
Comprehension from Chaos: Towards Informed Consent for Private Computation.
Bailey Kacsmar
Vasisht Duddu
Kyle Tilbury
Blase Ur
Florian Kerschbaum
2023
conf/uss
A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords.
Alexandra Nisenoff
Maximilian Golla
Miranda Wei
Juliette Hainline
Hayley Szymanek
Annika Braun
Annika Hildebrandt
Blair Christensen
David Langenberg
Blase Ur
2023
conf/uss
Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website's User Experience.
Alexandra Nisenoff
Arthur Borem
Madison Pickering
Grant Nakanishi
Maya Thumpasery
Blase Ur
2022
conf/uss
"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits.
Collins W. Munyendo
Philipp Markert
Alexandra Nisenoff
Miles Grant
Elena Korkes
Blase Ur
Adam J. Aviv
2021
conf/uss
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage.
Mohammad Taha Khan
Christopher Tran
Shubham Singh
Dimitri Vasilkov
Chris Kanich
Blase Ur
Elena Zheleva
2021
conf/uss
"It's Stored, Hopefully, on an Encrypted Server": Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn.
Leona Lassak
Annika Hildebrandt
Maximilian Golla
Blase Ur
2021
conf/soups
User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators.
Kentrell Owens
Olabode Anise
Amanda Krauss
Blase Ur
2021
conf/soups
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.
Christian Stransky
Dominik Wermke
Johanna Schrader
Nicolas Huaman
Yasemin Acar
Anna Lena Fehlhaber
Miranda Wei
Blase Ur
Sascha Fahl
2021
conf/soups
Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design.
Sophie Veys
Daniel Serrano
Madison Stamos
Margot Herman
Nathan Reitinger
Michelle L. Mazurek
Blase Ur
2021
conf/eurosp
SoK: Context Sensing for Access Control in the Adversarial Home IoT.
Weijia He
Valerie Zhao
Olivia Morkved
Sabeeka Siddiqui
Earlence Fernandes
Josiah D. Hester
Blase Ur
2020
conf/uss
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data.
Miranda Wei
Madison Stamos
Sophie Veys
Nathan Reitinger
Justin Goodman
Margot Herman
Dorota Filipczuk
Ben Weinshel
Michelle L. Mazurek
Blase Ur
2019
conf/ccs
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Ben Weinshel
Miranda Wei
Mainack Mondal
Euirim Choi
Shawn Shan
Claire Dolin
Michelle L. Mazurek
Blase Ur
2019
conf/ccs
Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media.
Mainack Mondal
Günce Su Yilmaz
Noah Hirsch
Mohammad Taha Khan
Michael Tang
Christopher Tran
Chris Kanich
Blase Ur
Elena Zheleva
2019
conf/sp
When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices.
Weijia He
Jesse J. Martinez
Roshni Padhi
Lefan Zhang
Blase Ur
2019
conf/sp
Reasoning Analytically about Password-Cracking Software.
Enze Liu
Amanda Nakanishi
Maximilian Golla
David Cash
Blase Ur
2018
conf/ccs
"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications.
Maximilian Golla
Miranda Wei
Juliette Hainline
Lydia Filipe
Markus Dürmuth
Elissa M. Redmiles
Blase Ur
2018
conf/uss
Rethinking Access Control and Authentication for the Home Internet of Things (IoT).
Weijia He
Maximilian Golla
Roshni Padhi
Jordan Ofek
Markus Dürmuth
Earlence Fernandes
Blase Ur
2018
conf/uss
Exploring User Mental Models of End-to-End Encrypted Communication Tools.
Ruba Abu-Salma
Elissa M. Redmiles
Blase Ur
Miranda Wei
2017
conf/uss
SmartAuth: User-Centered Authorization for the Internet of Things.
Yuan Tian
Nan Zhang
Yue-Hsun Lin
XiaoFeng Wang
Blase Ur
Xianzheng Guo
Patrick Tague
2017
conf/soups
Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Sean M. Segreti
William Melicher
Saranga Komanduri
Darya Melicher
Richard Shay
Blase Ur
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Michelle L. Mazurek
2016
conf/uss
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
William Melicher
Blase Ur
Sean M. Segreti
Saranga Komanduri
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2015
conf/ccs
Supporting Privacy-Conscious App Update Decisions with User Reviews.
Yuan Tian
Bin Liu
Weisi Dai
Blase Ur
Patrick Tague
Lorrie Faith Cranor
2015
conf/uss
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Blase Ur
Sean M. Segreti
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Saranga Komanduri
Darya Kurilova
Michelle L. Mazurek
William Melicher
Richard Shay
2015
conf/soups
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Blase Ur
Fumiko Noma
Jonathan Bees
Sean M. Segreti
Richard Shay
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2014
conf/soups
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World.
Lorrie Faith Cranor
Adam L. Durity
Abigail Marsh
Blase Ur
2013
conf/ccs
Measuring password guessability for an entire university.
Michelle L. Mazurek
Saranga Komanduri
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Patrick Gage Kelley
Richard Shay
Blase Ur
2013
conf/soups
What matters to users?: factors that affect users' willingness to share information with online advertisers.
Pedro Giovanni Leon
Blase Ur
Yang Wang
Manya Sleeper
Rebecca Balebako
Richard Shay
Lujo Bauer
Mihai Christodorescu
Lorrie Faith Cranor
2012
conf/uss
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Blase Ur
Patrick Gage Kelley
Saranga Komanduri
Joel Lee
Michael Maass
Michelle L. Mazurek
Timothy Passaro
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2012
conf/soups
Correct horse battery staple: exploring the usability of system-assigned passphrases.
Richard Shay
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Blase Ur
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2012
conf/soups
Smart, useful, scary, creepy: perceptions of online behavioral advertising.
Blase Ur
Pedro Giovanni Leon
Lorrie Faith Cranor
Richard Shay
Yang Wang
Coauthors
Abigail Marsh
(1)
Adam J. Aviv
(1)
Adam L. Durity
(1)
Alexandra Nisenoff
(3)
Amanda Krauss
(1)
Amanda Nakanishi
(1)
Anna Lena Fehlhaber
(1)
Annika Braun
(1)
Annika Hildebrandt
(2)
Arthur Borem
(3)
Aurelie Roubinowitz
(1)
Bailey Kacsmar
(1)
Ben Weinshel
(2)
Bin Liu
(1)
Blair Christensen
(1)
Blase Ur
(35)
Bruce Wen
(1)
Chris Kanich
(2)
Christian Stransky
(1)
Christopher Tran
(2)
Claire Dolin
(1)
Collins W. Munyendo
(1)
Damon McCoy
(1)
Daniel Serrano
(1)
Danny Yuxing Huang
(1)
Darya Kurilova
(1)
Darya Melicher
(1)
David Cash
(1)
David Langenberg
(1)
Dimitri Vasilkov
(1)
Dominik Wermke
(1)
Dorota Filipczuk
(1)
Earlence Fernandes
(2)
Elena Korkes
(1)
Elena Zheleva
(2)
Elissa M. Redmiles
(2)
Elleen Pan
(2)
Enze Liu
(1)
Euirim Choi
(1)
Florian Kerschbaum
(1)
Fumiko Noma
(1)
Grant Nakanishi
(1)
Günce Su Yilmaz
(1)
Hayley Szymanek
(1)
Jesse J. Martinez
(1)
Joel Lee
(1)
Johanna Schrader
(1)
Jonathan Bees
(1)
Jordan Ofek
(1)
Josiah D. Hester
(1)
Juliette Hainline
(2)
Justin Goodman
(1)
Kentrell Owens
(1)
Kevin Bryson
(2)
Kyle Tilbury
(1)
Laura Edelson
(1)
Lefan Zhang
(1)
Leona Lassak
(2)
Lorrie Faith Cranor
(11)
Luca Dovichi
(1)
Lujo Bauer
(8)
Lydia Filipe
(1)
Madison Pickering
(1)
Madison Stamos
(2)
Mainack Mondal
(2)
Manya Sleeper
(1)
Margot Herman
(2)
Markus Dürmuth
(2)
Maximilian Golla
(6)
Maya Thumpasery
(1)
Michael Maass
(1)
Michael Tang
(1)
Michelle L. Mazurek
(11)
Mihai Christodorescu
(1)
Miles Grant
(1)
Miranda Wei
(6)
Mohammad Taha Khan
(2)
Nan Zhang
(1)
Nathan Reitinger
(3)
Nick Feamster
(1)
Nicolas Christin
(7)
Nicolas Huaman
(1)
Noah Hirsch
(1)
Olabode Anise
(1)
Olivia Morkved
(1)
Olufunmilola Obielodan
(1)
Omer Akgul
(1)
Patrick Gage Kelley
(3)
Patrick Tague
(2)
Pedro Giovanni Leon
(2)
Philipp Markert
(1)
Phoebe Moh
(1)
Rebecca Balebako
(1)
Ricardo Calderon
(1)
Richard Shay
(8)
Roshni Padhi
(2)
Ruba Abu-Salma
(1)
Sabeeka Siddiqui
(1)
Saranga Komanduri
(6)
Sascha Fahl
(1)
Sean M. Segreti
(4)
Shawn Shan
(1)
Shubham Singh
(1)
Sophie Veys
(2)
Timothy Passaro
(1)
Timothy Vidas
(3)
Tobias Lauinger
(1)
Valerie Zhao
(1)
Vasisht Duddu
(1)
Vijay Prakash
(1)
Weijia He
(4)
Weisi Dai
(1)
William Melicher
(3)
Xianzheng Guo
(1)
XiaoFeng Wang
(1)
Yang Wang
(2)
Yasemin Acar
(1)
Yuan Tian
(2)
Yue-Hsun Lin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to