H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 50 Citations 9,668 117 World Ranking 2957 National Ranking 1564

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • Programming language

His primary scientific interests are in Computer security, Internet privacy, Password, Security policy and Password strength. The Information security standards research Lujo Bauer does as part of his general Computer security study is frequently linked to other disciplines of science, such as Structure, therefore creating a link between diverse domains of science. Internet privacy is often connected to Usability in his work.

His is doing research in Cognitive password and Password policy, both of which are found in Password. Lujo Bauer has researched Password strength in several fields, including Probabilistic logic and JavaScript. His Artificial neural network research focuses on Focus and how it relates to Access control.

His most cited work include:

  • Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition (725 citations)
  • Edit automata: enforcement mechanisms for run-time security policies (339 citations)
  • Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms (321 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Access control, Internet privacy, Password and Usability. His work on Security policy, Authentication and Key as part of general Computer security study is frequently linked to Enforcement and USable, therefore connecting diverse disciplines of science. His Security policy research includes elements of Automaton, Set, Information security standards, Software and Computer security model.

His research integrates issues of User interface and World Wide Web in his study of Access control. His Internet privacy research overlaps with other disciplines such as Data sharing and Notice. His study in the fields of Password strength, Password policy and Cognitive password under the domain of Password overlaps with other disciplines such as Service provider.

He most often published in these fields:

  • Computer security (47.33%)
  • Access control (28.67%)
  • Internet privacy (28.00%)

What were the highlights of his more recent work (between 2016-2021)?

  • Internet privacy (28.00%)
  • Computer security (47.33%)
  • Password (22.00%)

In recent papers he was focusing on the following fields of study:

Internet privacy, Computer security, Password, Artificial intelligence and Artificial neural network are his primary areas of study. His work deals with themes such as Software deployment and Malware, which intersect with Internet privacy. His Usability research extends to the thematically linked field of Computer security.

In general Password study, his work on Password policy and Password strength often relates to the realm of Expiration, thereby connecting several areas of interest. He works mostly in the field of Artificial intelligence, limiting it down to topics relating to Machine learning and, in certain cases, Hybrid approach and Task, as a part of the same area of interest. He has included themes like Adversarial system and Robustness in his Artificial neural network study.

Between 2016 and 2021, his most popular works were:

  • Privacy expectations and preferences in an IoT world (73 citations)
  • Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. (71 citations)
  • Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes (63 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Computer security

Lujo Bauer spends much of his time researching Internet privacy, Computer security, Robustness, Artificial neural network and Adversarial system. His Internet privacy research incorporates themes from Authentication, Software deployment and Usability. Many of his studies on Computer security involve topics that are commonly interrelated, such as Pattern recognition.

The concepts of his Robustness study are interwoven with issues in Classifier, Adversary, Theoretical computer science and Generative grammar. His Cognitive password research integrates issues from Data-driven, Password management and Human–computer interaction. His studies deal with areas such as Fingerprint, Key and Fingerprint as well as Authentication.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition

Mahmood Sharif;Sruti Bhagavatula;Lujo Bauer;Michael K. Reiter.
computer and communications security (2016)

613 Citations

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms

P. G. Kelley;S. Komanduri;M. L. Mazurek;R. Shay.
ieee symposium on security and privacy (2012)

451 Citations

Edit automata: enforcement mechanisms for run-time security policies

Jay Ligatti;Lujo Bauer;David Walker.
International Journal of Information Security (2005)

420 Citations

Of passwords and people: measuring the effect of password-composition policies

Saranga Komanduri;Richard Shay;Patrick Gage Kelley;Michelle L. Mazurek.
human factors in computing systems (2011)

413 Citations

Encountering stronger password requirements: user attitudes and behaviors

Richard Shay;Saranga Komanduri;Patrick Gage Kelley;Pedro Giovanni Leon.
symposium on usable privacy and security (2010)

366 Citations

How does your password measure up? the effect of strength meters on password creation

Blase Ur;Patrick Gage Kelley;Saranga Komanduri;Joel Lee.
usenix security symposium (2012)

327 Citations

Android taint flow analysis for app sets

William Klieber;Lori Flynn;Amar Bhosale;Limin Jia.
state of the art in java program analysis (2014)

250 Citations

Measuring password guessability for an entire university

Michelle L. Mazurek;Saranga Komanduri;Timothy Vidas;Lujo Bauer.
computer and communications security (2013)

242 Citations

Composing security policies with polymer

Lujo Bauer;Jay Ligatti;David Walker.
programming language design and implementation (2005)

240 Citations

Run-Time Enforcement of Nonsafety Policies

Jay Ligatti;Lujo Bauer;David Walker.
ACM Transactions on Information and System Security (2009)

221 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Lujo Bauer

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 37

Norman Sadeh

Norman Sadeh

Carnegie Mellon University

Publications: 34

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 30

Somesh Jha

Somesh Jha

University of Wisconsin–Madison

Publications: 27

Konstantin Beznosov

Konstantin Beznosov

University of British Columbia

Publications: 26

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 25

Frank Piessens

Frank Piessens

KU Leuven

Publications: 22

Florian Schaub

Florian Schaub

University of Michigan–Ann Arbor

Publications: 20

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 20

Anupam Datta

Anupam Datta

Carnegie Mellon University

Publications: 20

Jason Hong

Jason Hong

Carnegie Mellon University

Publications: 19

Andrei Sabelfeld

Andrei Sabelfeld

Chalmers University of Technology

Publications: 19

Tadayoshi Kohno

Tadayoshi Kohno

University of Washington

Publications: 16

Marianne Winslett

Marianne Winslett

University of Illinois at Urbana-Champaign

Publications: 15

Ninghui Li

Ninghui Li

Purdue University West Lafayette

Publications: 15

Something went wrong. Please try again later.