Follow
Blase Ur
Blase Ur
Assistant Professor, University of Chicago
Verified email at uchicago.edu - Homepage
Title
Cited by
Cited by
Year
Smart, useful, scary, creepy: perceptions of online behavioral advertising
B Ur, PG Leon, LF Cranor, R Shay, Y Wang
Proceedings of the Eighth Symposium on Usable Privacy and Security, 4, 2012
4772012
Practical Trigger-Action Programming in the Smart Home
B Ur, E McManus, MPY Ho, ML Littman
Proceedings of the 2014 ACM annual conference on Human factors in computing …, 2014
4212014
How does your password measure up? The effect of strength meters on password creation.
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Proceedings of the 2012 USENIX Security Symposium, 65-80, 2012
3822012
Measuring Password Guessability for an Entire University
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2013
3042013
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
USENIX Security Symposium, 175-191, 2016
3012016
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 123-140, 2015
2572015
Why Johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising
P Leon, B Ur, R Shay, Y Wang, R Balebako, L Cranor
Proceedings of the 2012 ACM annual conference on Human Factors in Computing …, 2012
2462012
SmartAuth: User-Centered Authorization for the Internet of Things.
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
USENIX Security Symposium 5 (1), 8.2, 2017
2422017
Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes
B Ur, MPY Ho, S Brawner, J Lee, S Mennicken, N Picard, D Schulze, ...
CHI 2016, 2016
2272016
Rethinking Access Control and Authentication for the Home Internet of Things (IoT).
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
USENIX Security Symposium, 255-272, 2018
2212018
Do Users’ Perceptions of Password Security Match Reality?
B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor
Proceedings of the 34th Annual ACM Conference on Human Factors in Computing …, 2016
2042016
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
Proceedings of the 2015 USENIX Security Symposium, 463-481, 2015
1982015
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
1872012
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
1792013
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1732012
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1712014
The current state of access control for smart devices in homes
B Ur, J Jung, S Schechter
Workshop on Home Usable Privacy and Security (HUPS) 29, 209-218, 2013
1622013
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
NDSS Workshop on Usable Security (USEC), 2015
1582015
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the 2013 ACM annual conference on Human factors in computing …, 2013
1442013
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
1402016
The system can't perform the operation now. Try again later.
Articles 1–20