Alexander De Luca

According to our database1, Alexander De Luca authored at least 74 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
CHI 2019.
IEEE Pervasive Comput., 2019

Towards Understanding the Link Between Age and Smartphone Authentication.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2016
The Anatomy Of Smartphone Unlocking: Why and How Android Users Around the World Lock their Phones.
GetMobile Mob. Comput. Commun., 2016

Usable privacy and security.
it Inf. Technol., 2016

Privacy Wedges: Area-Based Audience Selection for Social Network Posts.
Proceedings of the Workshop on Privacy Indicators, 2016

Expert and Non-Expert Attitudes towards (Secure) Instant Messaging.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

On quantifying the effective password space of grid-based unlock gestures.
Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia, 2016

You Can't Watch This!: Privacy-Respectful Photo Browsing on Smartphones.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Evaluating the Influence of Targets and Hand Postures on Touch-based Behavioural Biometrics.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

SnapApp: Reducing Authentication Overhead with a Time-Constrained Fast Unlock Option.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Is Secure and Usable Smartphone Authentication Asking Too Much?
Computer, 2015

Where Have You Been? Using Location-Based Security Questions for Fallback Authentication.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Locked Your Phone? Buy a New One? From Tales of Fallback Authentication on Smartphones to Actual Concepts.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

ColorSnakes: Using Colored Decoys to Secure Authentication in Sensitive Contexts.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

There is more to Typing than Speed: Expressive Mobile Touch Keyboards via Dynamic Font Personalisation.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

Automatic Privacy Classification of Personal Photos.
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015

Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

SwiPIN: Fast and Secure PIN-Entry on Smartphones.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Glass Unlock: Enhancing Security of Smartphone Unlocking through Leveraging a Private Near-eye Display.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance.
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014

Workshop on inconspicuous interaction.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Using icon arrangement for fallback authentication on smartphones.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Oh app, where art thou?: on app launching habits of smartphone users.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Making graphic-based authentication secure against smudge attacks.
Proceedings of the 18th International Conference on Intelligent User Interfaces, 2013

Survival of the Shortest: A Retrospective Analysis of Influencing Factors on Password Composition.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Long-Term Experiences with an Iterative Design of a QR-Code-Based Payment System for Beverages.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Investigating Pointing Tasks across Angularly Coupled Display Areas.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Travel Routes or Geography Facts? An Evaluation of Voice Authentication User Interfaces.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Using fake cursors to secure on-screen password entry.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Back-of-device authentication on smartphones.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Designing interactive secure system: chi 2013 special interest group.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Too much information!: user attitudes towards smartphone sharing.
Proceedings of the Nordic Conference on Human-Computer Interaction, 2012

Don't queue up!: user attitudes towards mobile interactions with public terminals.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012

Touch me once and i know it's you!: implicit authentication based on touch screen patterns.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Designing Usable and Secure Authentication Mechanisms for Public Spaces.
PhD thesis, 2011

Using data type based security alert dialogs to raise online security awareness.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

Data type based security alert dialogs.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Towards understanding ATM security: a field study of real world ATM use.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones.
Proceedings of the Pervasive Computing, 8th International Conference, 2010

Mobile or desktop websites?: website usage on multitouch devices.
Proceedings of the 6th Nordic Conference on Human-Computer Interaction 2010, 2010

ColorPIN: securing PIN entry through indirect input.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

On the design of a "moody" keyboard.
Proceedings of the Conference on Designing Interactive Systems, 2010

2009
Look into my eyes!: can you guess my password?
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

My phone is my keypad: privacy-enhanced PIN-entry on public terminals.
Proceedings of the 21st Australasian Computer-Human Interaction Conference, 2009

A context-sensitive security model for privacy protection on mobile phones.
Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, 2009

SeCuUI: autocomplete your terminal input.
Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, 2009

pieTouch: a direct touch gesture interface for interacting with in-vehicle information systems.
Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, 2009

Please touch the exhibits!: using NFC-based interaction for exploring a museum.
Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, 2009

Vibrapass: secure authentication based on shared lies.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Automatic form filling on mobile devices.
Pervasive Mob. Comput., 2008

PassShapes: utilizing stroke based authentication to increase password memorability.
Proceedings of the 5th Nordic Conference on Human-Computer Interaction 2008, 2008

A privacy-respectful input method for public terminals.
Proceedings of the 5th Nordic Conference on Human-Computer Interaction 2008, 2008

Laermometer: a mobile noise mapping application.
Proceedings of the 5th Nordic Conference on Human-Computer Interaction 2008, 2008

Spybuster - a community-based privacy tagging platform.
Proceedings of the 10th Conference on Human-Computer Interaction with Mobile Devices and Services, 2008

Menu Structuring for Mobile Devices.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

Eyepass - eye-stroke authentication for public terminals.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

CityFlocks: designing social navigation for urban mobile information systems.
Proceedings of the Conference on Designing Interactive Systems, 2008

2007
PassShape: stroke based shape passwords.
Proceedings of the 2007 Australasian Computer-Human Interaction Conference, 2007

Evaluation of eye-gaze interaction methods for security enhanced PIN-entry.
Proceedings of the 2007 Australasian Computer-Human Interaction Conference, 2007

The privacy badge: a privacy-awareness user interface for small devices.
Proceedings of the 4th International Conference on Mobile Technology, 2007

Eye-gaze interaction for mobile phones.
Proceedings of the 4th International Conference on Mobile Technology, 2007

2006
Visualization of uncertainty in context aware mobile applications.
Proceedings of the 8th Conference on Human-Computer Interaction with Mobile Devices and Services, 2006

2005
Analysis of Built-in Mobile Phone Sensors for Supporting Interactions with the Real World.
Proceedings of the Pervasive Mobile Interaction Devices (PERMID 2005) - Mobile Devices as Pervasive User Interfaces and Interaction Devices, 2005


  Loading...