D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 52 Citations 9,991 152 World Ranking 3380 National Ranking 1737

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • Programming language

His primary scientific interests are in Computer security, Internet privacy, Password, Security policy and Password strength. The Information security standards research Lujo Bauer does as part of his general Computer security study is frequently linked to other disciplines of science, such as Structure, therefore creating a link between diverse domains of science. Internet privacy is often connected to Usability in his work.

His is doing research in Cognitive password and Password policy, both of which are found in Password. Lujo Bauer has researched Password strength in several fields, including Probabilistic logic and JavaScript. His Artificial neural network research focuses on Focus and how it relates to Access control.

His most cited work include:

  • Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition (725 citations)
  • Edit automata: enforcement mechanisms for run-time security policies (339 citations)
  • Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms (321 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Access control, Internet privacy, Password and Usability. His work on Security policy, Authentication and Key as part of general Computer security study is frequently linked to Enforcement and USable, therefore connecting diverse disciplines of science. His Security policy research includes elements of Automaton, Set, Information security standards, Software and Computer security model.

His research integrates issues of User interface and World Wide Web in his study of Access control. His Internet privacy research overlaps with other disciplines such as Data sharing and Notice. His study in the fields of Password strength, Password policy and Cognitive password under the domain of Password overlaps with other disciplines such as Service provider.

He most often published in these fields:

  • Computer security (47.33%)
  • Access control (28.67%)
  • Internet privacy (28.00%)

What were the highlights of his more recent work (between 2016-2021)?

  • Internet privacy (28.00%)
  • Computer security (47.33%)
  • Password (22.00%)

In recent papers he was focusing on the following fields of study:

Internet privacy, Computer security, Password, Artificial intelligence and Artificial neural network are his primary areas of study. His work deals with themes such as Software deployment and Malware, which intersect with Internet privacy. His Usability research extends to the thematically linked field of Computer security.

In general Password study, his work on Password policy and Password strength often relates to the realm of Expiration, thereby connecting several areas of interest. He works mostly in the field of Artificial intelligence, limiting it down to topics relating to Machine learning and, in certain cases, Hybrid approach and Task, as a part of the same area of interest. He has included themes like Adversarial system and Robustness in his Artificial neural network study.

Between 2016 and 2021, his most popular works were:

  • Privacy expectations and preferences in an IoT world (73 citations)
  • Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. (71 citations)
  • Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes (63 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Computer security

Lujo Bauer spends much of his time researching Internet privacy, Computer security, Robustness, Artificial neural network and Adversarial system. His Internet privacy research incorporates themes from Authentication, Software deployment and Usability. Many of his studies on Computer security involve topics that are commonly interrelated, such as Pattern recognition.

The concepts of his Robustness study are interwoven with issues in Classifier, Adversary, Theoretical computer science and Generative grammar. His Cognitive password research integrates issues from Data-driven, Password management and Human–computer interaction. His studies deal with areas such as Fingerprint, Key and Fingerprint as well as Authentication.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition

Mahmood Sharif;Sruti Bhagavatula;Lujo Bauer;Michael K. Reiter.
computer and communications security (2016)

1135 Citations

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms

P. G. Kelley;S. Komanduri;M. L. Mazurek;R. Shay.
ieee symposium on security and privacy (2012)

528 Citations

Of passwords and people: measuring the effect of password-composition policies

Saranga Komanduri;Richard Shay;Patrick Gage Kelley;Michelle L. Mazurek.
human factors in computing systems (2011)

501 Citations

Edit automata: enforcement mechanisms for run-time security policies

Jay Ligatti;Lujo Bauer;David Walker.
International Journal of Information Security (2005)

431 Citations

Encountering stronger password requirements: user attitudes and behaviors

Richard Shay;Saranga Komanduri;Patrick Gage Kelley;Pedro Giovanni Leon.
symposium on usable privacy and security (2010)

422 Citations

How does your password measure up? the effect of strength meters on password creation

Blase Ur;Patrick Gage Kelley;Saranga Komanduri;Joel Lee.
usenix security symposium (2012)

348 Citations

Android taint flow analysis for app sets

William Klieber;Lori Flynn;Amar Bhosale;Limin Jia.
state of the art in java program analysis (2014)

269 Citations

Measuring password guessability for an entire university

Michelle L. Mazurek;Saranga Komanduri;Timothy Vidas;Lujo Bauer.
computer and communications security (2013)

268 Citations

Composing security policies with polymer

Lujo Bauer;Jay Ligatti;David Walker.
programming language design and implementation (2005)

241 Citations

Run-Time Enforcement of Nonsafety Policies

Jay Ligatti;Lujo Bauer;David Walker.
ACM Transactions on Information and System Security (2009)

233 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Lujo Bauer

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 37

Norman Sadeh

Norman Sadeh

Carnegie Mellon University

Publications: 34

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 30

Somesh Jha

Somesh Jha

University of Wisconsin–Madison

Publications: 27

Konstantin Beznosov

Konstantin Beznosov

University of British Columbia

Publications: 26

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 25

Frank Piessens

Frank Piessens

KU Leuven

Publications: 22

Blase Ur

Blase Ur

University of Chicago

Publications: 21

Anupam Datta

Anupam Datta

Carnegie Mellon University

Publications: 20

Florian Schaub

Florian Schaub

University of Michigan–Ann Arbor

Publications: 20

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 20

Jason Hong

Jason Hong

Carnegie Mellon University

Publications: 19

Andrei Sabelfeld

Andrei Sabelfeld

Chalmers University of Technology

Publications: 19

Tadayoshi Kohno

Tadayoshi Kohno

University of Washington

Publications: 16

Marianne Winslett

Marianne Winslett

University of Illinois at Urbana-Champaign

Publications: 15

Ninghui Li

Ninghui Li

Purdue University West Lafayette

Publications: 15

Trending Scientists

Chris Reed

Chris Reed

University of Dundee

Gianfranco Chicco

Gianfranco Chicco

Polytechnic University of Turin

Elio Sacco

Elio Sacco

University of Naples Federico II

Wenjia Bai

Wenjia Bai

Imperial College London

Petra Schwille

Petra Schwille

Max Planck Society

Gudmund Skjåk-Bræk

Gudmund Skjåk-Bræk

Norwegian University of Science and Technology

Limin Tong

Limin Tong

Zhejiang University

Jon F. Harrison

Jon F. Harrison

Arizona State University

Akinori Ohta

Akinori Ohta

Chubu University

D. G. Joakim Larsson

D. G. Joakim Larsson

University of Gothenburg

Amiya K. Hajra

Amiya K. Hajra

University of Michigan–Ann Arbor

Xixi Zhao

Xixi Zhao

Tongji University

David J. Waters

David J. Waters

University of Oxford

Ruth Anne Rehfeldt

Ruth Anne Rehfeldt

The Chicago School of Professional Psychology

Anne-Louise Ponsonby

Anne-Louise Ponsonby

University of Melbourne

Gill Livingston

Gill Livingston

University College London

Something went wrong. Please try again later.