Peter Mayer
Peter Mayer
University of Southern Denmark, Karlsruhe Institute of Technology
Verified email at - Homepage
Cited by
Cited by
An investigation of phishing awareness and education over time: When and how to best remind users
B Reinheimer, L Aldag, P Mayer, M Mossano, R Duezguen, B Lofthouse, ...
Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 259-284, 2020
Teaching Phishing-Security: which way is best?
S Stockhardt, B Reinheimer, M Volkamer, P Mayer, A Kunz, P Rack, ...
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016
" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them
P Mayer, Y Zou, F Schaub, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 393-410, 2021
Are graphical authentication mechanisms as strong as passwords?
K Renaud, P Mayer, M Volkamer, J Maguire
2013 Federated Conference on Computer Science and Information Systems, 837-844, 2013
Reliable Behavioural Factors in the Information Security Context
P Mayer, A Kunz, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
Why Users (Don't) Use Password Managers at a Large Educational Institution
P Mayer, CW Munyendo, ML Mazurek, AJ Aviv
31st USENIX Security Symposium (USENIX Security 22), 1849-1866, 2022
Developing and evaluating a five minute phishing awareness video
M Volkamer, K Renaud, B Reinheimer, P Rack, M Ghiglieri, P Mayer, ...
Trust, Privacy and Security in Digital Business: 15th International …, 2018
A literature review on virtual reality authentication
JM Jones, R Duezguen, P Mayer, M Volkamer, S Das
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
P Mayer, J Kirchner, M Volkamer
Symposium on Usable Privacy and Security (SOUPS), 2017
Security and Privacy Awareness in Smart Environments–A Cross-Country Investigation
O Kulyk, B Reinheimer, L Aldag, P Mayer, N Gerber, M Volkamer
International Conference on Financial Cryptography and Data Security, 84-101, 2020
Towards secure and usable authentication for augmented and virtual reality head-mounted displays
R Duezguen, P Mayer, S Das, M Volkamer
arXiv preprint arXiv:2007.11663, 2020
Productivity vs Security: Mitigating Conflicting Goals in Organizations
P Mayer, N Gerber, R McDermott, M Volkamer, J Vogt
Information & Computer Security 25 (2), 137-151, 2017
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
M Volkamer, A Gutmann, K Renaud, P Gerber, P Mayer
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 2018
Addressing Misconceptions About Password Security Effectively
P Mayer, M Volkamer
Workshop on Socio-Technical Aspects in Security and Trust, 2017
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology
A Gutmann, K Renaud, J Maguire, P Mayer, M Volkamer, K Matsuura, ...
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 357-371, 2016
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector
M Mossano, K Vaniea, L Aldag, R Düzgün, P Mayer, M Volkamer
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
Authentication Schemes-Comparison and Effective Password Spaces
P Mayer, M Volkamer, M Kauer
International Conference on Information Systems Security, 204-225, 2014
Assistance in daily password generation tasks
K Marky, P Mayer, N Gerber, V Zimmermann
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
Supporting Decision Makers in Choosing Suitable Authentication Schemes
P Mayer, S Neumann, D Storck, M Volkamer
Proceedings of the Tenth International Symposium on Human Aspects of …, 2016
I (don't) see what you typed there! Shoulder-surfing resistant password entry on gamepads
P Mayer, N Gerber, B Reinheimer, P Rack, K Braun, M Volkamer
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20