Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Cranor, Lorrie Faith
add a person with the name Cranor, Lorrie Faith
 

Other publications of authors with the same name

Phinding Phish: An Evaluation of Anti-Phishing Toolbars., , , and . NDSS, The Internet Society, (2007)Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It., , , , and . SOUPS, page 105-111. USENIX Association, (2014)"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab., , , , , , , and . SOUPS, page 123-140. USENIX Association, (2015)How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices., , , , , , and . SOUPS, page 321-340. USENIX Association, (2016)How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 65-80. USENIX Association, (2012)User interfaces for privacy agents., , and . ACM Trans. Comput.-Hum. Interact., 13 (2): 135-178 (2006)Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords., , , and . CoRR, (2014)Bridging the Gap in Computer Security Warnings: A Mental Model Approach., , , and . IEEE Security & Privacy, 9 (2): 18-26 (2011)The Platform for Privacy Preferences., and . Commun. ACM, 42 (2): 48-55 (1999)Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy?. Computer Networks, 30 (1-7): 751-753 (1998)