TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 31.

Renaud, Karen and Zimmermann, Verena :
Guidelines For Ethical Nudging in Password Authentication.
In: South African Institute Of Electrical Engineers (SAIEE), 109 (2) pp. 102-118.
[Article] , (2018)

Marky, Karola and Kulyk, Oksana and Renaud, Karen and Volkamer, Melanie :
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3173750]
In: Conference on Human Factors in Computing Systems (CHI '18) ACM
[Conference or Workshop Item] , (2018)

Renaud, Karen and Zimmermann, Verena :
Ethical guidelines for nudging in information security & privacy.
In: International Journal of Human-Computer Studies (IJHCS), 120 pp. 22-35.
[Article] , (2018)

Renaud, Karen and Zimmermann, Verena :
Nudging folks towards stronger password choices: Providing certainty is the key.
In: Behavioural Public Policy (BPP) pp. 1-31.
[Article] , (2018)

Renaud, Karen and Maguire, Joseph and Zimmermann, Verena and Draper, Steve :
Lessons Learned from Evaluating Eight Password Nudges in the Wild.
In: Learning from Authoritative Security Experiment Results (LASER), 18.-19.10.2017, Arlington, VA, USA. Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results Usenix Associaton
[Conference or Workshop Item] , (2017)

Ghiglieri, Marco and Volkamer, Melanie and Renaud, Karen :
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust / 5th International Conference, HAS 2017, Held as Part of HCI International 2017 , 10292 Springer, Cham
[Conference or Workshop Item] , (2017)

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin and Kunz, Alexandra :
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71 pp. 100-113.
[Article] , (2017)

Renaud, Karen and Zimmermann, Verena :
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully.
In: Information Security for South Africa (ISSA), 16.-17.08.2017, Johannesburg, South Africa. Proceedings of the 2017 Information Security for South Africa (ISSA) Conference IEEE
[Conference or Workshop Item] , (2017)

Gerber, Paul and Renaud, Karen and Volkamer, Melanie :
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1) pp. 8-26.
[Article] , (2016)

Renaud, Karen and Flowerday, Stephen and English, Rosanne and Volkamer, Melanie :
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4) pp. 400-415.
[Article] , (2016)

Volkamer, Melanie and Renaud, Karen and Gerber, Paul :
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4) pp. 372-385.
[Article] , (2016)

Gutmann, Andreas and Volkamer, Melanie and Renaud, Karen :
Memorable And Secure: How Do You Choose Your PIN?
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Conference or Workshop Item] , (2016)

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin :
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) Springer
[Conference or Workshop Item] , (2016)

Gutmann, Andreas and Renaud, Karen and Maguire, Joseph and Mayer, Peter and Volkamer, Melanie and Matsuura, Kanta and Müller-Quade, Jörn :
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
2016 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE
[Conference or Workshop Item] , (2016)

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie :
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
NDSS Workshop on Usable Security (USEC) Internet Society.
[Conference or Workshop Item] , (2016)

Renaud, Karen and Flowerday, Stephen and Othmane, Lotfi Ben and Volkamer, Melanie :
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
African Cyber Citizenship Conference 2015
[Conference or Workshop Item] , (2015)

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem
Foresti, Sara (ed.) :

A Socio-Technical Investigation into Smartphone Security.
Security and Trust Management: 11th International Workshop - STM 2015 Springer
[Conference or Workshop Item] , (2015)

Volkamer, Melanie and Renaud, Karen and Braun, Kristoffer and Canova, Gamze and Reinheimer, Benjamin
Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis (eds.) :

Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing . Springer
[Conference or Workshop Item] , (2015)

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem :
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).

[Report] , (2015)

Gutmann, Andreas and Renaud, Karen and Volkamer, Melanie :
Nudging Bank Account Holders Towards More Secure PIN Management.
Journal of Internet Technology and Secured Transaction (JITST) Infonomics Society
[Conference or Workshop Item] , (2015)

Gerber, Paul and Volkamer, Melanie and Renaud, Karen :
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1) pp. 16-21.
[Article] , (2015)

Renaud, Karen and Volkamer, Melanie :
Exploring Mental Models Underlying PIN Management Strategies.
World Congress on Internet Security (WorldCIS 2015) IEEE
[Conference or Workshop Item] , (2015)

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel
Krimmer, Robert and Volkamer, Melanie (eds.) :

Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
6th International Conference on Electronic Voting (EVOTE) IEEE
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Olembo, Maina and Renaud, Karen and Volkamer, Melanie
Kö, Andrea and Francesconi, Enrico (eds.) :

Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science , 8650 . Springer
[Conference or Workshop Item] , (2014)

Renkema-Padmos, Arne and Baum, Jerome and Renaud, Karen and Volkamer, Melanie :
Shake hands to bedevil: Securing email with wearable technology.
Proceedings of the eighth international symposium on human aspects of information security and assurance Lulu Press
[Conference or Workshop Item] , (2014)

Volkamer, Melanie and Renaud, Karen and Renkema-Padmos, Arne :
Why doesn't Jane protect her privacy?
In: Lecture Notes in Computer Science . Springer
[Conference or Workshop Item] , (2014)

Renaud, Karen and Volkamer, Melanie and Maguire, Joseph :
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: 8533 . Springer
[Conference or Workshop Item] , (2014)

Renkema-Padmos, Arne and Volkamer, Melanie and Renaud, Karen :
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: CHI 2014 ACM Digital Library
[Conference or Workshop Item] , (2014)

Olembo, Maina and Renaud, Karen and Bartsch, Steffen and Volkamer, Melanie :
Voter, What Message Will Motivate You to Verify Your Vote?
Workshop on Usable Security (USEC) Internet Society
[Conference or Workshop Item] , (2014)

Volkamer, Melanie and Renaud, Karen
Fischlin, Marc and Katzenbeisser, Stefan (eds.) :

Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography. Lecture Notes in Computer Science, 8260. Springer Berlin Heidelberg Berlin-Heidelberg , pp. 255-280. ISBN 978-3-642-42000-9
[Book Section] , (2013)

Renaud, Karen and Mayer, Peter and Volkamer, Melanie and Maguire, Joseph :
Are Graphical Authentication Mechanisms As Strong As Passwords?
Federated Conference on Computer Science and Information Systems 2013
[Conference or Workshop Item] , (2013)

This list was generated on Sat May 25 02:16:56 2019 CEST.