His primary scientific interests are in Computer security, Internet privacy, Password, Security policy and Password strength. The Information security standards research Lujo Bauer does as part of his general Computer security study is frequently linked to other disciplines of science, such as Structure, therefore creating a link between diverse domains of science. Internet privacy is often connected to Usability in his work.
His primary areas of study are Computer security, Access control, Internet privacy, Password and Usability. His work on Security policy, Authentication and Key as part of general Computer security study is frequently linked to Enforcement and USable, therefore connecting diverse disciplines of science. His Security policy research includes elements of Automaton, Set, Information security standards, Software and Computer security model.
His research integrates issues of User interface and World Wide Web in his study of Access control. His Internet privacy research overlaps with other disciplines such as Data sharing and Notice. His study in the fields of Password strength, Password policy and Cognitive password under the domain of Password overlaps with other disciplines such as Service provider.
Internet privacy, Computer security, Password, Artificial intelligence and Artificial neural network are his primary areas of study. His work deals with themes such as Software deployment and Malware, which intersect with Internet privacy. His Usability research extends to the thematically linked field of Computer security.
In general Password study, his work on Password policy and Password strength often relates to the realm of Expiration, thereby connecting several areas of interest. He works mostly in the field of Artificial intelligence, limiting it down to topics relating to Machine learning and, in certain cases, Hybrid approach and Task, as a part of the same area of interest. He has included themes like Adversarial system and Robustness in his Artificial neural network study.
Lujo Bauer spends much of his time researching Internet privacy, Computer security, Robustness, Artificial neural network and Adversarial system. His Internet privacy research incorporates themes from Authentication, Software deployment and Usability. Many of his studies on Computer security involve topics that are commonly interrelated, such as Pattern recognition.
The concepts of his Robustness study are interwoven with issues in Classifier, Adversary, Theoretical computer science and Generative grammar. His Cognitive password research integrates issues from Data-driven, Password management and Human–computer interaction. His studies deal with areas such as Fingerprint, Key and Fingerprint as well as Authentication.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
Mahmood Sharif;Sruti Bhagavatula;Lujo Bauer;Michael K. Reiter.
computer and communications security (2016)
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
P. G. Kelley;S. Komanduri;M. L. Mazurek;R. Shay.
ieee symposium on security and privacy (2012)
Edit automata: enforcement mechanisms for run-time security policies
Jay Ligatti;Lujo Bauer;David Walker.
International Journal of Information Security (2005)
Of passwords and people: measuring the effect of password-composition policies
Saranga Komanduri;Richard Shay;Patrick Gage Kelley;Michelle L. Mazurek.
human factors in computing systems (2011)
Encountering stronger password requirements: user attitudes and behaviors
Richard Shay;Saranga Komanduri;Patrick Gage Kelley;Pedro Giovanni Leon.
symposium on usable privacy and security (2010)
How does your password measure up? the effect of strength meters on password creation
Blase Ur;Patrick Gage Kelley;Saranga Komanduri;Joel Lee.
usenix security symposium (2012)
Android taint flow analysis for app sets
William Klieber;Lori Flynn;Amar Bhosale;Limin Jia.
state of the art in java program analysis (2014)
Measuring password guessability for an entire university
Michelle L. Mazurek;Saranga Komanduri;Timothy Vidas;Lujo Bauer.
computer and communications security (2013)
Composing security policies with polymer
Lujo Bauer;Jay Ligatti;David Walker.
programming language design and implementation (2005)
Run-Time Enforcement of Nonsafety Policies
Jay Ligatti;Lujo Bauer;David Walker.
ACM Transactions on Information and System Security (2009)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: