TU Darmstadt / ULB / TUbiblio

Blättern nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Publikationsjahr | Sprache
Anzahl der Einträge: 31.

Renaud, Karen ; Zimmermann, Verena :
Guidelines For Ethical Nudging in Password Authentication.
In: South African Institute Of Electrical Engineers (SAIEE), 109 (2) S. 102-118.
[Artikel] , (2018)

Marky, Karola ; Kulyk, Oksana ; Renaud, Karen ; Volkamer, Melanie :
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3173750]
In: Conference on Human Factors in Computing Systems (CHI '18) ACM
[ Konferenzveröffentlichung] , (2018)

Renaud, Karen ; Zimmermann, Verena :
Ethical guidelines for nudging in information security & privacy.
In: International Journal of Human-Computer Studies (IJHCS), 120 S. 22-35.
[Artikel] , (2018)

Renaud, Karen ; Zimmermann, Verena :
Nudging folks towards stronger password choices: Providing certainty is the key.
In: Behavioural Public Policy (BPP) S. 1-31.
[Artikel] , (2018)

Renaud, Karen ; Maguire, Joseph ; Zimmermann, Verena ; Draper, Steve :
Lessons Learned from Evaluating Eight Password Nudges in the Wild.
In: Learning from Authoritative Security Experiment Results (LASER), 18.-19.10.2017, Arlington, VA, USA. Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results Usenix Associaton
[ Konferenzveröffentlichung] , (2017)

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen :
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust / 5th International Conference, HAS 2017, Held as Part of HCI International 2017 , 10292 Springer, Cham
[ Konferenzveröffentlichung] , (2017)

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin ; Kunz, Alexandra :
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71 S. 100-113.
[Artikel] , (2017)

Renaud, Karen ; Zimmermann, Verena :
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully.
In: Information Security for South Africa (ISSA), 16.-17.08.2017, Johannesburg, South Africa. Proceedings of the 2017 Information Security for South Africa (ISSA) Conference IEEE
[ Konferenzveröffentlichung] , (2017)

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie :
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1) S. 8-26.
[Artikel] , (2016)

Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie :
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4) S. 400-415.
[Artikel] , (2016)

Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul :
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4) S. 372-385.
[Artikel] , (2016)

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen :
Memorable And Secure: How Do You Choose Your PIN?
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[ Konferenzveröffentlichung] , (2016)

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin :
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) Springer
[ Konferenzveröffentlichung] , (2016)

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn :
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
2016 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE
[ Konferenzveröffentlichung] , (2016)

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie :
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
NDSS Workshop on Usable Security (USEC) Internet Society.
[ Konferenzveröffentlichung] , (2016)

Renaud, Karen ; Flowerday, Stephen ; Othmane, Lotfi Ben ; Volkamer, Melanie :
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
African Cyber Citizenship Conference 2015
[ Konferenzveröffentlichung] , (2015)

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
Foresti, Sara (ed.) :

A Socio-Technical Investigation into Smartphone Security.
Security and Trust Management: 11th International Workshop - STM 2015 Springer
[ Konferenzveröffentlichung] , (2015)

Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (eds.) :

Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing . Springer
[ Konferenzveröffentlichung] , (2015)

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem :
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).

[Report] , (2015)

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie :
Nudging Bank Account Holders Towards More Secure PIN Management.
Journal of Internet Technology and Secured Transaction (JITST) Infonomics Society
[ Konferenzveröffentlichung] , (2015)

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen :
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1) S. 16-21.
[Artikel] , (2015)

Renaud, Karen ; Volkamer, Melanie :
Exploring Mental Models Underlying PIN Management Strategies.
World Congress on Internet Security (WorldCIS 2015) IEEE
[ Konferenzveröffentlichung] , (2015)

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) :

Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
6th International Conference on Electronic Voting (EVOTE) IEEE
[ Konferenzveröffentlichung] , (2014)

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (eds.) :

Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science , 8650 . Springer
[ Konferenzveröffentlichung] , (2014)

Renkema-Padmos, Arne ; Baum, Jerome ; Renaud, Karen ; Volkamer, Melanie :
Shake hands to bedevil: Securing email with wearable technology.
Proceedings of the eighth international symposium on human aspects of information security and assurance Lulu Press
[ Konferenzveröffentlichung] , (2014)

Volkamer, Melanie ; Renaud, Karen ; Renkema-Padmos, Arne :
Why doesn't Jane protect her privacy?
In: Lecture Notes in Computer Science . Springer
[ Konferenzveröffentlichung] , (2014)

Renaud, Karen ; Volkamer, Melanie ; Maguire, Joseph :
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: 8533 . Springer
[ Konferenzveröffentlichung] , (2014)

Renkema-Padmos, Arne ; Volkamer, Melanie ; Renaud, Karen :
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: CHI 2014 ACM Digital Library
[ Konferenzveröffentlichung] , (2014)

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie :
Voter, What Message Will Motivate You to Verify Your Vote?
Workshop on Usable Security (USEC) Internet Society
[ Konferenzveröffentlichung] , (2014)

Volkamer, Melanie ; Renaud, Karen
Fischlin, Marc ; Katzenbeisser, Stefan (eds.) :

Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography. Lecture Notes in Computer Science, 8260. Springer Berlin Heidelberg Berlin-Heidelberg , S. 255-280. ISBN 978-3-642-42000-9
[Buchkapitel] , (2013)

Renaud, Karen ; Mayer, Peter ; Volkamer, Melanie ; Maguire, Joseph :
Are Graphical Authentication Mechanisms As Strong As Passwords?
Federated Conference on Computer Science and Information Systems 2013
[ Konferenzveröffentlichung] , (2013)

Diese Liste wurde am Sat Mar 23 03:19:01 2019 CET generiert.