Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing., , , and . ACM Trans. Comput. Hum. Interact., 28 (1): 6:1-6:44 (2021)Understanding Privacy Switching Behaviour on Twitter., , and . CHI, page 31:1-31:14. ACM, (2022)Änyone Else Seeing this Error?": Community, System Administrators, and Patch Information., , , and . EuroS&P, page 105-119. IEEE, (2020)I Don't Need an Expert! Making URL Phishing Features Human Comprehensible., , and . CHI, page 695:1-695:17. ACM, (2021)RubikAuth: Fast and Secure Authentication in Virtual Reality., , , and . CHI Extended Abstracts, page 1-9. ACM, (2020)Lessons learned from the deployment of a smartphone-based access-control system., , , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 64-75. ACM, (2007)Debunking Security-Usability Tradeoff Myths, , , , and . IEEE Security & Privacy, 14 (5): 33--39 (2016)Can I Borrow Your ATM? Using Virtual Reality for (Simulated) In Situ Authentication Research., , and . VR, page 301-310. IEEE, (2022)Virtual Reality Observations: Using Virtual Reality to Augment Lab-Based Shoulder Surfing Research., , , and . VR, page 291-300. IEEE, (2022)Tales of Software Updates: The process of updating software., and . CHI, page 3215-3226. ACM, (2016)