Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards., , and . ACM Trans. Priv. Secur., 26 (2): 12:1-12:24 (May 2023)Investigating Privacy Perceptions and Subjective Acceptance of Eye Tracking on Handheld Mobile Devices., , , and . Proc. ACM Hum. Comput. Interact., 7 (ETRA): 1-16 (May 2023)PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices., , , , and . Proc. Priv. Enhancing Technol., 2022 (3): 650-669 (2022)Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing., , , and . ACM Trans. Comput. Hum. Interact., 28 (1): 6:1-6:44 (2021)An End-to-End Review of Gaze Estimation and its Interactive Applications on Handheld Mobile Devices., , , and . CoRR, (2023)Safety, Power Imbalances, Ethics and Proxy Sex: Surveying In-The-Wild Interactions Between VR Users and Bystanders., , , and . ISMAR, page 211-220. IEEE, (2021)Assessing Social Text Placement in Mixed Reality TV., , , , and . IMX, page 205-211. ACM, (2020)RubikAuth: Fast and Secure Authentication in Virtual Reality., , , and . CHI Extended Abstracts, page 1-9. ACM, (2020)Are Thermal Attacks Ubiquitous?: When Non-Expert Attackers Use Off the shelf Thermal Cameras., , , , and . AVI, page 47:1-47:5. ACM, (2020)Don't Use Fingerprint, it's Raining!: How People Use and Perceive Context-Aware Selection of Mobile Authentication., , , , and . AVI, page 54:1-54:5. ACM, (2020)