default search action
Stuart E. Schechter
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j5]Yuan Tian, Cormac Herley, Stuart E. Schechter:
StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing. IEEE Secur. Priv. 18(3): 38-47 (2020)
2010 – 2019
- 2019
- [c35]Stuart E. Schechter, Yuan Tian, Cormac Herley:
StopGuessing: Using Guessed Passwords to Thwart Online Guessing. EuroS&P 2019: 576-589 - [c34]Cormac Herley, Stuart E. Schechter:
Distinguishing Attacks from Legitimate Authentication Traffic at Scale. NDSS 2019 - 2016
- [c33]Dan Boneh, Henry Corrigan-Gibbs, Stuart E. Schechter:
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks. ASIACRYPT (1) 2016: 220-248 - [i1]Henry Corrigan-Gibbs, Dan Boneh, Stuart E. Schechter:
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns. IACR Cryptol. ePrint Arch. 2016: 27 (2016) - 2015
- [c32]Stuart E. Schechter, Joseph Bonneau:
Learning Assigned Secrets for Unlocking Mobile Devices. SOUPS 2015: 277-295 - 2014
- [c31]Blase Ur, Jaeyeon Jung, Stuart E. Schechter:
Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance. UbiComp 2014: 129-139 - [c30]Cristian Bravo-Lillo, Lorrie Faith Cranor, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper:
Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It. SOUPS 2014: 105-111 - [c29]Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, Stuart E. Schechter:
Telepathwords: Preventing Weak Passwords by Reading Users' Minds. USENIX Security Symposium 2014: 591-606 - [c28]Joseph Bonneau, Stuart E. Schechter:
Towards Reliable Storage of 56-bit Secrets in Human Memory. USENIX Security Symposium 2014: 607-623 - 2013
- [c27]Serge Egelman, Stuart E. Schechter:
The Importance of Being Earnest [In Security Warnings]. Financial Cryptography 2013: 52-59 - [c26]Cristian Bravo-Lillo, Saranga Komanduri, Lorrie Faith Cranor, Robert W. Reeder, Manya Sleeper, Julie S. Downs, Stuart E. Schechter:
Your attention please: designing security-decision UIs to make genuine risks harder to ignore. SOUPS 2013: 6:1-6:12 - 2012
- [c25]Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie S. Downs, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper:
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs. CCS 2012: 365-377 - [c24]Serge Egelman, Joseph Bonneau, Sonia Chiasson, David Dittrich, Stuart E. Schechter:
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin. Financial Cryptography Workshops 2012: 124-132 - [c23]Eiji Hayashi, Oriana Riva, Karin Strauss, A. J. Bernheim Brush, Stuart E. Schechter:
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications. SOUPS 2012: 2 - 2011
- [j4]Robert W. Reeder, Stuart E. Schechter:
When the Password Doesn't Work: Secondary Authentication for Websites. IEEE Secur. Priv. 9(2): 43-49 (2011) - [c22]Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart E. Schechter, David Wetherall:
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. CCS 2011: 639-652 - [c21]David Wetherall, David R. Choffnes, Ben Greenstein, Seungyeop Han, Peter Hornyack, Jaeyeon Jung, Stuart E. Schechter, Xiao Sophia Wang:
Privacy Revelations for Web and Mobile Apps. HotOS 2011 - 2010
- [c20]Stuart E. Schechter, Gabriel H. Loh, Karin Strauss, Doug Burger:
Use ECP, not ECC, for hard failures in resistive memories. ISCA 2010: 141-152 - [c19]Stuart E. Schechter:
Security That Is Meant to Be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices. HealthSec 2010 - [c18]Stuart E. Schechter, Cormac Herley, Michael Mitzenmacher:
Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks. HotSec 2010 - [c17]David Molnar, Stuart E. Schechter:
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. WEIS 2010
2000 – 2009
- 2009
- [c16]Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Schechter:
Can I borrow your phone?: understanding concerns when sharing mobile phones. CHI 2009: 1647-1650 - [c15]Stuart E. Schechter, Serge Egelman, Robert W. Reeder:
It's not what you know, but who you know: a social approach to last-resort authentication. CHI 2009: 1983-1992 - [c14]Maritza L. Johnson, Steven M. Bellovin, Robert W. Reeder, Stuart E. Schechter:
Laissez-faire file sharing: access control designed for individuals at the endpoints. NSPW 2009: 1-10 - [c13]Stuart E. Schechter, A. J. Bernheim Brush, Serge Egelman:
It's no secret: measuring the security and reliability of authentication via 'secret' questions. SOUPS 2009 - [c12]Stuart E. Schechter, Serge Egelman, Robert W. Reeder:
It's not what you know, but who you know: a social approach to last-resort authentication. SOUPS 2009 - [c11]Stuart E. Schechter, Robert W. Reeder:
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. SOUPS 2009 - [c10]Stuart E. Schechter, A. J. Bernheim Brush, Serge Egelman:
It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions. SP 2009: 375-390 - 2007
- [c9]Stuart E. Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer:
The Emperor's New Security Indicators. S&P 2007: 51-65 - 2006
- [j3]Andy Ozment, Stuart E. Schechter:
The Security of OpenBSD: Milk or Wine? login Usenix Mag. 31(6) (2006) - [c8]Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain:
Inoculating SSH Against Address Harvesting. NDSS 2006 - [c7]Andy Ozment, Stuart E. Schechter:
Milk or Wine: Does Software Security Improve with Age? USENIX Security Symposium 2006 - [c6]Andy Ozment, Stuart E. Schechter:
Bootstrapping the Adoption of Internet Security Protocols. WEIS 2006 - 2005
- [j2]Stuart E. Schechter:
Toward Econometric Models of the Security Risk from Remote Attack. IEEE Secur. Priv. 3(1): 40-44 (2005) - 2004
- [c5]Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berger:
Fast Detection of Scanning Worm Infections. RAID 2004: 59-81 - [p1]Stuart E. Schechter, Rachel Greenstadt, Michael D. Smith:
Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment. Economics of Information Security 2004: 59-69 - 2003
- [c4]Stuart E. Schechter, Michael D. Smith:
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. Financial Cryptography 2003: 122-137 - [c3]Stuart E. Schechter, Michael D. Smith:
Access for sale: a new class of worm. WORM 2003: 19-23 - 2002
- [c2]Stuart E. Schechter:
How to Buy Better Testing. InfraSec 2002: 73-87
1990 – 1999
- 1999
- [c1]Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink:
Anonymous Authentication of Membership in Dynamic Groups. Financial Cryptography 1999: 184-195 - 1998
- [j1]Stuart E. Schechter, Murali Krishnan, Michael D. Smith:
Using Path Profiles to Predict HTTP Requests. Comput. Networks 30(1-7): 457-467 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint