Author of the publication

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.

, , , , , , , , and . IEEE Symposium on Security and Privacy, page 523-537. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast image segmentation on mobile phone using multi-level graph cut., , and . Graphics Interface, page 81-88. ACM, (2015)Ä cold, technical decision-maker": Can AI provide explainability, negotiability, and humanity?, , , , , , , , , and 1 other author(s). CoRR, (2020)How Knowledge Workers Think Generative AI Will (Not) Transform Their Industries., , , , , and . CoRR, (2023)Designing Privacy Notices: Supporting User Understanding and Control.. Carnegie Mellon University, USA, (2013)"It's common and a part of being a content creator": Understanding How Creators Experience and Cope with Hate and Harassment Online., , , , and . CHI, page 121:1-121:15. ACM, (2022)"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment., , , , , and . CHI, page 190:1-190:17. ACM, (2023)SoK: Hate, Harassment, and the Changing Landscape of Online Abuse., , , , , , , , , and 4 other author(s). SP, page 247-267. IEEE, (2021)"Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators., , , , , , and . USENIX Security Symposium, page 5629-5645. USENIX Association, (2023)Exciting, Useful, Worrying, Futuristic: Public Perception of Artificial Intelligence in 8 Countries., , , , , , , and . AIES, page 627-637. ACM, (2021)The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs., , , , , , , and . Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, page 34-51. Springer, (2013)