Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Owning and Sharing: Privacy Perceptions of Smart Speaker Users., , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW1): 45:1-45:29 (2021)Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing., , , and . ACM Trans. Comput. Hum. Interact., 28 (1): 6:1-6:44 (2021)Embedding Privacy Into Design Through Software Developers: Challenges and Solutions., , and . IEEE Secur. Priv., 21 (1): 49-57 (January 2023)Understanding Privacy Switching Behaviour on Twitter., , and . CHI, page 31:1-31:14. ACM, (2022)RubikAuth: Fast and Secure Authentication in Virtual Reality., , , and . CHI Extended Abstracts, page 1-9. ACM, (2020)I Don't Need an Expert! Making URL Phishing Features Human Comprehensible., , and . CHI, page 695:1-695:17. ACM, (2021)Änyone Else Seeing this Error?": Community, System Administrators, and Patch Information., , , and . EuroS&P, page 105-119. IEEE, (2020)Lessons learned from the deployment of a smartphone-based access-control system., , , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 64-75. ACM, (2007)Twitter has a Binary Privacy Setting, are Users Aware of How It Works?, , , and . CoRR, (2022)Debunking Security-Usability Tradeoff Myths, , , , and . IEEE Security & Privacy, 14 (5): 33--39 (2016)