Peter Mayer
Peter Mayer
Karlsruhe Institute of Technology
Bestätigte E-Mail-Adresse bei secuso.org - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Are graphical authentication mechanisms as strong as passwords?
K Renaud, P Mayer, M Volkamer, J Maguire
2013 Federated Conference on Computer Science and Information Systems, 837-844, 2013
332013
Teaching Phishing-Security: which way is best?
S Stockhardt, B Reinheimer, M Volkamer, P Mayer, A Kunz, P Rack, ...
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016
202016
Reliable Behavioural Factors in the Information Security Context
P Mayer, A Kunz, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
92017
Authentication Schemes-Comparison and Effective Password Spaces
P Mayer, M Volkamer, M Kauer
International Conference on Information Systems Security, 204-225, 2014
82014
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
P Mayer, J Kirchner, M Volkamer
Symposium on Usable Privacy and Security (SOUPS), 2017
72017
Supporting Decision Makers in Choosing Suitable Authentication Schemes
P Mayer, S Neumann, D Storck, M Volkamer
Proceedings of the Tenth International Symposium on Human Aspects of …, 2016
72016
Productivity vs Security: Mitigating Conflicting Goals in Organizations
P Mayer, N Gerber, R McDermott, M Volkamer, J Vogt
Information & Computer Security 25 (2), 137-151, 2017
52017
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology
A Gutmann, K Renaud, J Maguire, P Mayer, M Volkamer, K Matsuura, ...
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 357-371, 0
4*
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
M Volkamer, A Gutmann, K Renaud, P Gerber, P Mayer
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 2018
32018
Secure and efficient key derivation in portfolio authentication schemes using blakley secret sharing
P Mayer, M Volkamer
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
32015
I (don't) see what you typed there! Shoulder-surfing resistant password entry on gamepads
P Mayer, N Gerber, B Reinheimer, P Rack, K Braun, M Volkamer
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
22019
Enabling automatic password change in password managers through crowdsourcing
P Mayer, H Berket, M Volkamer
11th Int. Conf. on Passwords, 2016
22016
Human Factors in Security
P Gerber, M Ghiglieri, B Henhapl, O Kulyk, K Marky, P Mayer, ...
Sicherheitskritische Mensch-Computer-Interaktion, 83-98, 2018
12018
Addressing Misconceptions About Password Security Effectively
P Mayer, M Volkamer
Workshop on Socio-Technical Aspects in Security and Trust, 2017
12017
Poster: Secure Storage of Masked Passwords
P Mayer, M Volkamer
Euro S&P Posters, 2017
12017
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials
P Mayer, C Schwartz, M Volkamer
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
2018
Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte
P Mayer, A Kunz, M Volkamer
Datenschutz und Datensicherheit-DuD 42 (5), 307-310, 2018
2018
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
P Mayer, S Neumann, M Volkamer
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2016
User Behaviour and Knowledge Regarding Password Security
P Mayer
2012
Analysis of the Security and Memorability of the Password Card
P Mayer, A Kunz, M Volkamer
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20