Emanuel von Zezschwitz

According to our database1, Emanuel von Zezschwitz authored at least 42 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
"It builds trust with the customers" - Exploring User Perceptions of the Padlock Icon in Browser UI.
Proceedings of the 43rd IEEE Security and Privacy, 2022

2020
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
"Get a Free Item Pack with Every Activation!".
i-com, 2019

Emerging Trends in Usable Security and Privacy.
i-com, 2019

Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?
CoRR, 2019

"Please enter your PIN" - On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices.
CoRR, 2019

"Get a Free Item Pack with Every Activation!" - Do Incentives Increase the Adoption Rates of Two-Factor Authentication?
CoRR, 2019

"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

"If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
CueAuth: Comparing Touch, Mid-Air Gestures, and Gaze for Cue-based Authentication on Situated Displays.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

The Struggle is Real: Analyzing Ground Truth Data of TLS (Mis-)Configurations.
CoRR, 2018

Not On My Phone: Exploring Users' Conception of Related Permissions.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication.
Proceedings of the 19th ACM International Conference on Multimodal Interaction, 2017

Understanding Shoulder Surfing in the Wild: Stories from Users and Observers.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Risks and potentials of graphical and gesture-based authentication for touchscreen mobile devices: balancing usability and security through user-centered analysis and design.
PhD thesis, 2016

Usable privacy and security.
it Inf. Technol., 2016

On quantifying the effective password space of grid-based unlock gestures.
Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia, 2016

You Can't Watch This!: Privacy-Respectful Photo Browsing on Smartphones.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

My Scrawl Hides It All: Protecting Text Messages Against Shoulder Surfing With Handwritten Fonts.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

SnapApp: Reducing Authentication Overhead with a Time-Constrained Fast Unlock Option.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Locked Your Phone? Buy a New One? From Tales of Fallback Authentication on Smartphones to Actual Concepts.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

Automatic Privacy Classification of Personal Photos.
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015

Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

SwiPIN: Fast and Secure PIN-Entry on Smartphones.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance.
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014

Workshop on inconspicuous interaction.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Making graphic-based authentication secure against smudge attacks.
Proceedings of the 18th International Conference on Intelligent User Interfaces, 2013

Survival of the Shortest: A Retrospective Analysis of Influencing Factors on Password Composition.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Long-Term Experiences with an Iterative Design of a QR-Code-Based Payment System for Beverages.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Travel Routes or Geography Facts? An Evaluation of Voice Authentication User Interfaces.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Using fake cursors to secure on-screen password entry.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Back-of-device authentication on smartphones.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Too much information!: user attitudes towards smartphone sharing.
Proceedings of the Nordic Conference on Human-Computer Interaction, 2012

2009
Vibrapass: secure authentication based on shared lies.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009


  Loading...