Follow
Patrick Gage Kelley
Patrick Gage Kelley
Google, University of New Mexico, Carnegie Mellon University
Verified email at google.com
Title
Cited by
Cited by
Year
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
21st USENIX security symposium (USENIX Security 12), 65-80, 2012
630*2012
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
5982012
A" nutrition label" for privacy
PG Kelley, J Bresee, LF Cranor, RW Reeder
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
5822009
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
5592011
Understanding and capturing people’s privacy policies in a mobile social networking application
N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and ubiquitous computing 13, 401-412, 2009
4872009
A conundrum of permissions: installing applications on an android smartphone
PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall
Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR …, 2012
4742012
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
4732010
Privacy as part of the app decision-making process
PG Kelley, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
4352013
Standardizing privacy notices: an online study of the nutrition label approach
PG Kelley, L Cesca, J Bresee, LF Cranor
Proceedings of the SIGCHI Conference on Human factors in Computing Systems …, 2010
3262010
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3112013
A comparative study of online privacy policies and formats
AM McDonald, RW Reeder, PG Kelley, LF Cranor
International Symposium on Privacy Enhancing Technologies Symposium, 37-55, 2009
2692009
Location-sharing technologies: Privacy risks and controls
JY Tsai, PG Kelley, LF Cranor, N Sadeh
Isjlp 6, 119, 2010
2562010
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
M Benisch, PG Kelley, N Sadeh, LF Cranor
Personal and Ubiquitous Computing 15, 679-694, 2011
2472011
Who's viewed you? The impact of feedback in a mobile location-sharing application
JY Tsai, P Kelley, P Drielsma, LF Cranor, J Hong, N Sadeh
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
2432009
Empirical models of privacy in location sharing
E Toch, J Cranshaw, PH Drielsma, JY Tsai, PG Kelley, J Springfield, ...
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
2282010
Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share
J Wiese, PG Kelley, LF Cranor, L Dabbish, JI Hong, J Zimmerman
Proceedings of the 13th international conference on Ubiquitous computing …, 2011
2092011
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1822012
User-controllable learning of policies
N Sadeh-Koniecpol, PH Drielsma, LF Candor, P Kelley
US Patent 8,423,483, 2013
1692013
" I read my Twitter the next morning and was astonished" a conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
1542013
Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden?
R Ravichandran, M Benisch, PG Kelley, NM Sadeh
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
1492009
The system can't perform the operation now. Try again later.
Articles 1–20