Follow
Patrick Gage Kelley
Patrick Gage Kelley
Google, University of New Mexico, Carnegie Mellon University
Verified email at google.com
Title
Cited by
Cited by
Year
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
21st USENIX security symposium (USENIX Security 12), 65-80, 2012
664*2012
A" nutrition label" for privacy
PG Kelley, J Bresee, LF Cranor, RW Reeder
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
6542009
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
6182012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
5802011
Understanding and capturing people’s privacy policies in a mobile social networking application
N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and ubiquitous computing 13, 401-412, 2009
5032009
A conundrum of permissions: installing applications on an android smartphone
PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall
Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR …, 2012
5022012
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010
4942010
Privacy as part of the app decision-making process
PG Kelley, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
4632013
Standardizing privacy notices: an online study of the nutrition label approach
PG Kelley, L Cesca, J Bresee, LF Cranor
Proceedings of the SIGCHI Conference on Human factors in Computing Systems …, 2010
3562010
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3302013
A comparative study of online privacy policies and formats
AM McDonald, RW Reeder, PG Kelley, LF Cranor
International Symposium on Privacy Enhancing Technologies Symposium, 37-55, 2009
2852009
Location-sharing technologies: Privacy risks and controls
JY Tsai, PG Kelley, LF Cranor, N Sadeh
Isjlp 6, 119, 2010
2632010
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
M Benisch, PG Kelley, N Sadeh, LF Cranor
Personal and Ubiquitous Computing 15, 679-694, 2011
2562011
Who's viewed you? The impact of feedback in a mobile location-sharing application
JY Tsai, P Kelley, P Drielsma, LF Cranor, J Hong, N Sadeh
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
2492009
Empirical models of privacy in location sharing
E Toch, J Cranshaw, PH Drielsma, JY Tsai, PG Kelley, J Springfield, ...
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
2322010
Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share
J Wiese, PG Kelley, LF Cranor, L Dabbish, JI Hong, J Zimmerman
Proceedings of the 13th international conference on Ubiquitous computing …, 2011
2142011
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1902012
User-controllable learning of policies
N Sadeh-Koniecpol, PH Drielsma, LF Candor, P Kelley
US Patent 8,423,483, 2013
1772013
Sok: Hate, harassment, and the changing landscape of online abuse
K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ...
2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021
1712021
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019
1652019
The system can't perform the operation now. Try again later.
Articles 1–20