Markus Dürmuth

Orcid: 0000-0001-5048-3723

Affiliations:
  • Leibniz University Hannover, Germany
  • Ruhr University Bochum, Germany (former)
  • Saarland University, Saarbrücken, Germany (former)


According to our database1, Markus Dürmuth authored at least 69 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time.
Proc. ACM Hum. Comput. Interact., 2023

A Representative Study on Human Detection of Artificially Generated Media Across Countries.
CoRR, 2023

A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates.
Proc. Priv. Enhancing Technol., 2022

Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies.
CoRR, 2022

"I Knew It Was Me": Understanding Users' Interaction with Login Notifications.
CoRR, 2022

"As soon as it's a risk, I want to require MFA": How Administrators Configure Risk-based Authentication.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

"Fast, Easy, Convenient." Studying Adoption and Perception of Digital Covid Certificates.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Exploring User Authentication with Windows Hello in a Small Business Environment.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

"It's Just a Lot of Prerequisites": A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

2021
On the Security of Smartphone Unlock PINs.
ACM Trans. Priv. Secur., 2021

SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data.
Proc. Priv. Enhancing Technol., 2021

Verify It's You: How Users Perceive Risk-Based Authentication.
IEEE Secur. Priv., 2021

Towards Quantum Large-Scale Password Guessing on Real-World Distributions.
IACR Cryptol. ePrint Arch., 2021

Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity (Extended Version).
CoRR, 2021

Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity.
Proceedings of the 30th USENIX Security Symposium, 2021

What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics.
Proceedings of the Financial Cryptography and Data Security, 2021

Vision: Developing a Broad Usable Security & Privacy Questionnaire.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Exploring user perceptions of deletion in mobile instant messaging applications.
J. Cybersecur., 2020

This PIN Can Be Easily Guessed.
CoRR, 2020

This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

"You still use the password after all" - Exploring FIDO2 Security Keys in a Small Company.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Evaluation of Risk-Based Re-Authentication Methods.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Recht auf Vergessen.
Datenschutz und Datensicherheit, 2019

Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Towards Contractual Agreements for Revocation of Online Data.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2018
A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns.
CoRR, 2018

Rethinking Access Control and Authentication for the Home Internet of Things (IoT).
Proceedings of the 27th USENIX Security Symposium, 2018

"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

On the Accuracy of Password Strength Meters.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
"I want my money back!" Limiting Online Password-Guessing Financially.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Towards Implicit Visual Memory-Based Authentication.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Who Are You? A Statistical Approach to Measuring User Authenticity.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

On the Security of Cracking-Resistant Password Vaults.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Side-Channel Attacks on Fingerprint Matching Algorithms.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

2015
Analyzing 4 Million Real-World Personal Knowledge Questions (Short Paper).
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

OMEN: Faster Password Guessing Using an Ordered Markov Enumerator.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
Learning from Neuroscience to Improve Internet Security.
ERCIM News, 2014

Statistics on Password Re-use and Adaptive Strength for Financial Accounts.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

On Password Guessing with GPUs and FPGAs.
Proceedings of the Technology and Practice of Passwords, 2014

Secure Fallback Authentication and the Trusted Friend Attack.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

2013
Achieving Anonymity Against Major Face Recognition Algorithms.
IACR Cryptol. ePrint Arch., 2013

When Privacy meets Security: Leveraging personal information for password cracking
CoRR, 2013

Useful password hashing: how to waste computing cycles with style.
Proceedings of the New Security Paradigms Workshop, 2013

Quantifying the security of graphical passwords: the case of android unlock patterns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Timed revocation of user data: long expiration times from existing infrastructure.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Adaptive Password-Strength Meters from Markov Models.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Deniable Encryption with Negligible Detection Probability: An Interactive Construction.
IACR Cryptol. ePrint Arch., 2011

X-pire! - A digital expiration date for images in social networks
CoRR, 2011

2010
Acoustic Side-Channel Attacks on Printers.
Proceedings of the 19th USENIX Security Symposium, 2010

Speaker Recognition in Encrypted Voice Streams.
Proceedings of the Computer Security, 2010

2009
Novel classes of side channels and covert channels.
PhD thesis, 2009

A Provably Secure And Efficient Countermeasure Against Timing Attacks.
IACR Cryptol. ePrint Arch., 2009

Tempest in a Teapot: Compromising Reflections Revisited.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Conditional reactive simulatability.
Int. J. Inf. Sec., 2008

Compromising Reflections-or-How to Read LCD Monitors around the Corner.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

OAEP Is Secure under Key-Dependent Messages.
Proceedings of the Advances in Cryptology, 2008

2007
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
IACR Cryptol. ePrint Arch., 2007

Information Flow in the Peer-Reviewing Process.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2005
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
Unification in Privacy Policy Evaluation - Translating EPAL into Prolog.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

An Algebra for Composing Enterprise Privacy Policies.
Proceedings of the Computer Security, 2004


  Loading...