Peter Mayer
Peter Mayer
Karlsruhe Institute of Technology
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
Are graphical authentication mechanisms as strong as passwords?
K Renaud, P Mayer, M Volkamer, J Maguire
2013 Federated Conference on Computer Science and Information Systems, 837-844, 2013
Teaching Phishing-Security: which way is best?
S Stockhardt, B Reinheimer, M Volkamer, P Mayer, A Kunz, P Rack, ...
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016
Reliable Behavioural Factors in the Information Security Context
P Mayer, A Kunz, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
P Mayer, J Kirchner, M Volkamer
Symposium on Usable Privacy and Security (SOUPS), 2017
Productivity vs Security: Mitigating Conflicting Goals in Organizations
P Mayer, N Gerber, R McDermott, M Volkamer, J Vogt
Information & Computer Security 25 (2), 137-151, 2017
An investigation of phishing awareness and education over time: When and how to best remind users
B Reinheimer, L Aldag, P Mayer, M Mossano, R Duezguen, B Lofthouse, ...
Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 259-284, 2020
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
M Volkamer, A Gutmann, K Renaud, P Gerber, P Mayer
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 2018
Supporting Decision Makers in Choosing Suitable Authentication Schemes
P Mayer, S Neumann, D Storck, M Volkamer
Proceedings of the Tenth International Symposium on Human Aspects of …, 2016
Authentication Schemes-Comparison and Effective Password Spaces
P Mayer, M Volkamer, M Kauer
International Conference on Information Systems Security, 204-225, 2014
Addressing Misconceptions About Password Security Effectively
P Mayer, M Volkamer
Workshop on Socio-Technical Aspects in Security and Trust, 2017
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology
A Gutmann, K Renaud, J Maguire, P Mayer, M Volkamer, K Matsuura, ...
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 357-371, 0
Keep on rating–on the systematic rating and comparison of authentication schemes
V Zimmermann, N Gerber, P Mayer, M Kleboth, A von Preuschen, ...
Information & Computer Security, 2019
Security and Privacy Awareness in Smart Environments–A Cross-Country Investigation
O Kulyk, B Reinheimer, L Aldag, P Mayer, N Gerber, M Volkamer
International Conference on Financial Cryptography and Data Security, 84-101, 2020
I (don't) see what you typed there! Shoulder-surfing resistant password entry on gamepads
P Mayer, N Gerber, B Reinheimer, P Rack, K Braun, M Volkamer
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
Secure and efficient key derivation in portfolio authentication schemes using blakley secret sharing
P Mayer, M Volkamer
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector
M Mossano, K Vaniea, L Aldag, R Düzgün, P Mayer, M Volkamer
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
Towards secure and usable authentication for augmented and virtual reality head-mounted displays
R Duezguen, P Mayer, S Das, M Volkamer
arXiv preprint arXiv:2007.11663, 2020
Enabling automatic password change in password managers through crowdsourcing
P Mayer, H Berket, M Volkamer
11th Int. Conf. on Passwords, 2016
Human Factors in Security
P Gerber, M Ghiglieri, B Henhapl, O Kulyk, K Marky, P Mayer, ...
Sicherheitskritische Mensch-Computer-Interaktion, 83-98, 2018
Poster: Secure Storage of Masked Passwords
P Mayer, M Volkamer
Euro S&P Posters, 2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20