Christian Tiefenau

Orcid: 0000-0002-0904-1437

According to our database1, Christian Tiefenau authored at least 14 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable Security.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Evolution of Password Expiry in Companies: Measuring the Adoption of Recommendations by the German Federal Office for Information Security.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Less About Privacy: Revisiting a Survey about the German COVID-19 Contact Tracing App.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2021
Behavioral Studies with IT-Administrators - Updating in Complex Environments and Securing Web Servers.
PhD thesis, 2021

Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Replicating a Study of Ransomware in Germany.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

2020
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

2019
Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?
CoRR, 2019

"Please enter your PIN" - On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices.
CoRR, 2019

A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
The Struggle is Real: Analyzing Ground Truth Data of TLS (Mis-)Configurations.
CoRR, 2018

Deception Task Design in Developer Password Studies: Exploring a Student Sample.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017


  Loading...