Author of the publication

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.

, , , , , , and . USENIX Security Symposium, page 175-191. USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can long passwords be secure and usable?, , , , , , , , , and . CHI, page 2927-2936. ACM, (2014)Cable length estimation for a compliant surgical manipulator., , , and . ICRA, page 701-708. IEEE, (2012)Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks., , , , , , and . USENIX Security Symposium, page 175-191. USENIX Association, (2016)Design of a new cable-driven manipulator with a large open lumen: Preliminary applications in the minimally-invasive removal of osteolysis., , , , , and . ICRA, page 2913-2920. IEEE, (2011)Measuring Real-World Accuracies and Biases in Modeling Password Guessability., , , , , , , , , and . USENIX Security Symposium, page 463-481. USENIX Association, (2015)A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior., , , , , , , , , and . CHI, page 2903-2912. ACM, (2015)"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab., , , , , , , and . SOUPS, page 123-140. USENIX Association, (2015)Diversify to Survive: Making Passwords Stronger with Adaptive Policies., , , , , , , , , and . SOUPS, page 1-12. USENIX Association, (2017)Do Users' Perceptions of Password Security Match Reality?, , , , , and . CHI, page 3748-3760. ACM, (2016)Usability and Security of Text Passwords on Mobile Devices., , , , , , , , , and . CHI, page 527-539. ACM, (2016)