Author of the publication

Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications

, , , , , , and . In 41st IEEE Symposium on Security and Privacy, IEEE S&P 2020, May 18-20, 2020, (May 2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication., , , , , , and . CoRR, (2023)Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications., , , , , and . USENIX Security Symposium, page 4347-4364. USENIX Association, (2021)Poster: A Large Scale Investigation of Obfuscation Use in Google Play, , , , , and . In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, (February 2019)Poster: Project Leine - A Virtualized Study Infrastructure, , , , and . In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, (February 2019)On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security., , , , , , , , and . SOUPS @ USENIX Security Symposium, page 437-454. USENIX Association, (2021)Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories., , , , , and . CoRR, (2022)Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories., , , , , and . USENIX Security Symposium, page 2527-2544. USENIX Association, (2023)A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises., , , , , , and . USENIX Security Symposium, page 1235-1252. USENIX Association, (2021)"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments., , , , , , and . CCS, page 3138-3152. ACM, (2023)They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites., , , , and . SP, page 1367-1381. IEEE, (2021)