Follow
Blase Ur
Blase Ur
Assistant Professor, University of Chicago
Verified email at uchicago.edu - Homepage
Title
Cited by
Cited by
Year
Smart, useful, scary, creepy: perceptions of online behavioral advertising
B Ur, PG Leon, LF Cranor, R Shay, Y Wang
Proceedings of the Eighth Symposium on Usable Privacy and Security, 4, 2012
4252012
Practical Trigger-Action Programming in the Smart Home
B Ur, E McManus, MPY Ho, ML Littman
Proceedings of the 2014 ACM annual conference on Human factors in computing …, 2014
3842014
How does your password measure up? The effect of strength meters on password creation.
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Proceedings of the 2012 USENIX Security Symposium, 65-80, 2012
3592012
Measuring Password Guessability for an Entire University
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2013
2822013
Fast, lean, and accurate: Modeling password guessability using neural networks
W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ...
25th USENIX Security Symposium (USENIX Security 16), 175-191, 2016
2572016
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab
B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 123-140, 2015
2322015
Why Johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising
P Leon, B Ur, R Shay, Y Wang, R Balebako, L Cranor
Proceedings of the 2012 ACM annual conference on Human Factors in Computing …, 2012
2302012
{SmartAuth}:{User-Centered} Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
26th USENIX Security Symposium (USENIX Security 17), 361-378, 2017
2082017
Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes
B Ur, MPY Ho, S Brawner, J Lee, S Mennicken, N Picard, D Schulze, ...
CHI 2016, 2016
2012016
Do Users’ Perceptions of Password Security Match Reality?
B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor
Proceedings of the 34th Annual ACM Conference on Human Factors in Computing …, 2016
1832016
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
1812012
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ...
Proceedings of the 2015 USENIX Security Symposium, 463-481, 2015
1752015
Rethinking Access Control and Authentication for the Home Internet of Things ({{{{{IoT}}}}})
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018
1722018
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
1682013
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1652012
Can long passwords be secure and usable?
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1592014
The current state of access control for smart devices in homes
B Ur, J Jung, S Schechter
Workshop on Home Usable Privacy and Security (HUPS) 29, 209-218, 2013
1472013
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the 2013 ACM annual conference on Human factors in computing …, 2013
1392013
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
NDSS Workshop on Usable Security (USEC), 2015
1362015
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh, ML Mazurek, SM Segreti, B Ur, ...
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-34, 2016
1272016
The system can't perform the operation now. Try again later.
Articles 1–20