On the Usability of Authenticity Checks for Hardware Security Tokens | 0 | 0.34 | 2021 |
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. | 0 | 0.34 | 2020 |
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. | 0 | 0.34 | 2020 |
May the Force Be with You: The Future of Force-Sensitive Authentication. | 1 | 0.35 | 2017 |
Securing the Internet, One HTTP 200 OK at a Time. | 0 | 0.34 | 2017 |
"I Have No Idea What I'M Doing" - On The Usability Of Deploying Https | 3 | 0.36 | 2017 |
Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin. | 0 | 0.34 | 2016 |
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy. | 1 | 0.48 | 2016 |
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness. | 0 | 0.34 | 2016 |
Who Are You Now? Fading to Multiple Personas. | 0 | 0.34 | 2016 |
Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices. | 6 | 0.46 | 2016 |
Hand Dynamics for Behavioral User Authentication | 0 | 0.34 | 2016 |
Smart Privacy Visor: Bridging the Privacy Gap. | 0 | 0.34 | 2015 |
QR Code Security -- How Secure and Usable Apps Can Protect Users Against Malicious QR Codes | 4 | 0.55 | 2015 |
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach | 7 | 0.57 | 2015 |
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. | 4 | 0.41 | 2015 |
Advanced social engineering attacks | 40 | 1.69 | 2015 |
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. | 3 | 0.48 | 2014 |
IPv6 security: attacks and countermeasures in a nutshell | 6 | 0.76 | 2014 |
QR Inception: Barcode-in-Barcode Attacks | 10 | 0.69 | 2014 |
IPv6 Security: Attacks and Countermeasures in a Nutshell. | 0 | 0.34 | 2014 |
QR Code Security: A Survey of Attacks and Challenges for Usable Security | 12 | 0.83 | 2014 |
Automated Analysis of Underground Marketplaces. | 0 | 0.34 | 2014 |
Social engineering attacks on the knowledge worker | 11 | 0.91 | 2013 |
Fake identities in social media: A case study on the sustainability of the Facebook business model. | 18 | 0.79 | 2012 |