Search Results - "Cranor, L. F."

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Engineering Privacy by Spiekermann, S., Cranor, L.F.

    Published in IEEE transactions on software engineering (01-01-2009)
    “…In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic…”
    Get full text
    Journal Article
  2. 2

    Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms by Kelley, P. G., Komanduri, S., Mazurek, M. L., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., Lopez, J.

    “…Text-based passwords remain the dominant authentication method in computer systems, despite significant advancement in attackers' capabilities to perform…”
    Get full text
    Conference Proceeding
  3. 3

    An analysis of security vulnerabilities in the movie production and distribution process by Byers, Simon, Cranor, Lorrie Faith, Cronin, Eric, Korman, Dave, McDaniel, Patrick

    Published in Telecommunications policy (01-08-2004)
    “…Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Out of sight, out of mind: Effects of displaying access-control information near the item it controls by Vaniea, K., Bauer, L., Cranor, L. F., Reiter, M. K.

    “…We take a detailed look at how users, while focusing on non-permission tasks, notice and fix access-control permission errors depending on where the…”
    Get full text
    Conference Proceeding
  6. 6

    P3P: making privacy policies more useful by Cranor, L.F.

    Published in IEEE security & privacy (01-11-2003)
    “…The World Wide Web Consortium's Platform for Privacy Preferences (P3P) lets Web sites convey their privacy policies in a computer-readable format. Although not…”
    Get full text
    Magazine Article
  7. 7

    Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools by Geiger, M., Cranor, L.F.

    Published in IEEE security & privacy (01-09-2006)
    “…An evaluation of six privacy tools highlights significant shortfalls in their methods and implementations. It also raises a question: how much privacy…”
    Get full text
    Magazine Article
  8. 8

    Giving notice: why privacy policies and security breach notifications aren't enough by Cranor, L.F.

    Published in IEEE communications magazine (01-08-2005)
    “…Anecdotal evidence suggests that although consumers say they want companies to post privacy policies and make security breach disclosures, these notices are…”
    Get full text
    Magazine Article