Follow
Blase Ur
Blase Ur
Associate Professor, University of Chicago
Verified email at uchicago.edu - Homepage
Title
Cited by
Cited by
Year
Smart, useful, scary, creepy: perceptions of online behavioral advertising
B Ur, PG Leon, LF Cranor, R Shay, Y Wang
Proceedings of the Eighth Symposium on Usable Privacy and Security, 4, 2012
5042012
Practical Trigger-Action Programming in the Smart Home
B Ur, E McManus, MPY Ho, ML Littman
Proceedings of the 2014 ACM annual conference on Human factors in computing …, 2014
4452014
How does your password measure up? The effect of strength meters on password creation.
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Proceedings of the 2012 USENIX Security Symposium, 65-80, 2012
4022012
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th USENIX Security Symposium (USENIX Security 16), 175-191, 2016
3162016
Measuring Password Guessability for an Entire University
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2013
3092013
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 123-140, 2015
2872015
{SmartAuth}:{User-Centered} authorization for the internet of things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
26th USENIX Security Symposium (USENIX Security 17), 361-378, 2017
2692017
Why Johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising
P Leon, B Ur, R Shay, Y Wang, R Balebako, L Cranor
Proceedings of the 2012 ACM annual conference on Human Factors in Computing …, 2012
2532012
Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes
B Ur, MPY Ho, S Brawner, J Lee, S Mennicken, N Picard, D Schulze, ...
CHI 2016, 2016
2492016
Rethinking Access Control and Authentication for the Home Internet of Things ({{{{{IoT}}}}})
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018
2432018
Do Users’ Perceptions of Password Security Match Reality?
B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor
Proceedings of the 34th Annual ACM Conference on Human Factors in Computing …, 2016
2202016
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
Proceedings of the 2015 USENIX Security Symposium, 463-481, 2015
2092015
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
1882012
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
1832013
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1802012
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1732014
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
NDSS Workshop on Usable Security (USEC), 2015
1662015
The current state of access control for smart devices in homes
B Ur, J Jung, S Schechter
Workshop on Home Usable Privacy and Security (HUPS) 29, 209-218, 2013
1662013
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
1522016
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the 2013 ACM annual conference on Human factors in computing …, 2013
1522013
The system can't perform the operation now. Try again later.
Articles 1–20