Follow
Saranga Komanduri
Title
Cited by
Cited by
Year
" I regretted the minute I pressed share" a qualitative study of regrets on Facebook
Y Wang, G Norcie, S Komanduri, A Acquisti, PG Leon, LF Cranor
Proceedings of the seventh symposium on usable privacy and security, 1-16, 2011
7662011
Nudges for privacy and security: Understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
7382017
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
21st USENIX security symposium (USENIX Security 12), 65-80, 2012
664*2012
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
6192012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
5802011
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
4942010
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th USENIX Security Symposium (USENIX Security 16), 175-191, 2016
3632016
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3302013
Bridging the gap in computer security warnings: A mental model approach
C Bravo-Lillo, LF Cranor, J Downs, S Komanduri
IEEE Security & Privacy 9 (2), 18-26, 2010
3102010
Measuring {Real-World} Accuracies and Biases in Modeling Password Guessability
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
24th USENIX Security Symposium (USENIX Security 15), 463-481, 2015
2272015
Your attention please: Designing security-decision UIs to make genuine risks harder to ignore
C Bravo-Lillo, S Komanduri, LF Cranor, RW Reeder, M Sleeper, J Downs, ...
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013
2262013
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1902012
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1842014
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
1712016
A spoonful of sugar? The impact of guidance and feedback on password-creation behavior
R Shay, L Bauer, N Christin, LF Cranor, A Forget, S Komanduri, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1082015
Telepathwords: Preventing Weak Passwords by Reading {Users’} Minds
S Komanduri, R Shay, LF Cranor, C Herley, S Schechter
23rd USENIX Security Symposium (USENIX Security 14), 591-606, 2014
1042014
Harder to ignore? revisiting {Pop-Up} fatigue and approaches to prevent it
C Bravo-Lillo, L Cranor, S Komanduri, S Schechter, M Sleeper
10th Symposium On Usable Privacy and Security (SOUPS 2014), 105-111, 2014
1022014
Order and entropy in picture passwords
S Komanduri, DR Hutchings
Proceedings of graphics interface 2008, 115-122, 2008
882008
Improving computer security dialogs
C Bravo-Lillo, LF Cranor, J Downs, S Komanduri, M Sleeper
Human-Computer Interaction–INTERACT 2011: 13th IFIP TC 13 International …, 2011
852011
The post anachronism: The temporal dimension of Facebook privacy
L Bauer, LF Cranor, S Komanduri, ML Mazurek, MK Reiter, M Sleeper, ...
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
842013
The system can't perform the operation now. Try again later.
Articles 1–20