Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards., , and . ACM Trans. Priv. Secur., 26 (2): 12:1-12:24 (May 2023)An End-to-End Review of Gaze Estimation and its Interactive Applications on Handheld Mobile Devices., , , and . CoRR, (2023)Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing., , , and . ACM Trans. Comput. Hum. Interact., 28 (1): 6:1-6:44 (2021)PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices., , , , and . Proc. Priv. Enhancing Technol., 2022 (3): 650-669 (2022)Investigating Privacy Perceptions and Subjective Acceptance of Eye Tracking on Handheld Mobile Devices., , , and . Proc. ACM Hum. Comput. Interact., 7 (ETRA): 1-16 (May 2023)Safety, Power Imbalances, Ethics and Proxy Sex: Surveying In-The-Wild Interactions Between VR Users and Bystanders., , , and . ISMAR, page 211-220. IEEE, (2021)Exploring Attitudes Towards Increasing User Awareness of Reality From Within Virtual Reality., , , and . IMX, page 151-160. ACM, (2022)"Do I Run Away?": Proximity, Stress and Discomfort in Human-Drone Interaction in Real and Virtual Environments., , and . INTERACT (2), volume 14143 of Lecture Notes in Computer Science, page 525-551. Springer, (2023)Don't Use Fingerprint, it's Raining!: How People Use and Perceive Context-Aware Selection of Mobile Authentication., , , , and . AVI, page 54:1-54:5. ACM, (2020)Are Thermal Attacks Ubiquitous?: When Non-Expert Attackers Use Off the shelf Thermal Cameras., , , , and . AVI, page 47:1-47:5. ACM, (2020)