Author of the publication

"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup.

, , , , and . SOUPS, page 171-190. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"Get a Free Item Pack with Every Activation!"., , , and . i-com, 18 (3): 217-236 (2019)"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup., , , , and . SOUPS, page 171-190. USENIX Association, (2023)They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web., , , , and . IEEE Secur. Priv., 20 (2): 49-60 (2022)"Get a Free Item Pack with Every Activation!" - Do Incentives Increase the Adoption Rates of Two-Factor Authentication?, , , and . CoRR, (2019)Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples., , , , and . USENIX Security Symposium, page 4041-4058. USENIX Association, (2022)Detection of Generic Human-Object Interactions in Video Streams., , , , and . ICSR, volume 11876 of Lecture Notes in Computer Science, page 108-118. Springer, (2019)Poster: Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , and . In Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, (August 2018)Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites., , , , , and . Proc. Priv. Enhancing Technol., 2023 (1): 5-28 (January 2023)"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments., , , , , , and . CCS, page 3138-3152. ACM, (2023)They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites., , , , and . SP, page 1367-1381. IEEE, (2021)