Follow
Peter Mayer
Peter Mayer
University of Southern Denmark, Karlsruhe Institute of Technology
Verified email at imada.sdu.dk - Homepage
Title
Cited by
Cited by
Year
An investigation of phishing awareness and education over time: When and how to best remind users
B Reinheimer, L Aldag, P Mayer, M Mossano, R Duezguen, B Lofthouse, ...
Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 259-284, 2020
1122020
Teaching Phishing-Security: which way is best?
S Stockhardt, B Reinheimer, M Volkamer, P Mayer, A Kunz, P Rack, ...
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016
782016
" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them
P Mayer, Y Zou, F Schaub, AJ Aviv
30th USENIX Security Symposium (USENIX Security 21), 393-410, 2021
662021
Why Users (Don't) Use Password Managers at a Large Educational Institution
P Mayer, CW Munyendo, ML Mazurek, AJ Aviv
31st USENIX Security Symposium (USENIX Security 22), 1849-1866, 2022
442022
Are graphical authentication mechanisms as strong as passwords?
K Renaud, P Mayer, M Volkamer, J Maguire
2013 Federated Conference on Computer Science and Information Systems, 837-844, 2013
402013
Reliable Behavioural Factors in the Information Security Context
P Mayer, A Kunz, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
362017
Developing and evaluating a five minute phishing awareness video
M Volkamer, K Renaud, B Reinheimer, P Rack, M Ghiglieri, P Mayer, ...
Trust, Privacy and Security in Digital Business: 15th International …, 2018
342018
A literature review on virtual reality authentication
JM Jones, R Duezguen, P Mayer, M Volkamer, S Das
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021
312021
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
P Mayer, J Kirchner, M Volkamer
Symposium on Usable Privacy and Security (SOUPS), 2017
272017
Productivity vs Security: Mitigating Conflicting Goals in Organizations
P Mayer, N Gerber, R McDermott, M Volkamer, J Vogt
Information & Computer Security 25 (2), 137-151, 2017
252017
Towards secure and usable authentication for augmented and virtual reality head-mounted displays
R Duezguen, P Mayer, S Das, M Volkamer
arXiv preprint arXiv:2007.11663, 2020
242020
Security and Privacy Awareness in Smart Environments–A Cross-Country Investigation
O Kulyk, B Reinheimer, L Aldag, P Mayer, N Gerber, M Volkamer
International Conference on Financial Cryptography and Data Security, 84-101, 2020
222020
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector
M Mossano, K Vaniea, L Aldag, R Düzgün, P Mayer, M Volkamer
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
212020
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
M Volkamer, A Gutmann, K Renaud, P Gerber, P Mayer
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 2018
202018
Addressing Misconceptions About Password Security Effectively
P Mayer, M Volkamer
Workshop on Socio-Technical Aspects in Security and Trust, 2017
202017
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology
A Gutmann, K Renaud, J Maguire, P Mayer, M Volkamer, K Matsuura, ...
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 357-371, 2016
202016
Authentication Schemes-Comparison and Effective Password Spaces
P Mayer, M Volkamer, M Kauer
International Conference on Information Systems Security, 204-225, 2014
152014
Assistance in daily password generation tasks
K Marky, P Mayer, N Gerber, V Zimmermann
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
142018
Awareness, Intention,(In) Action: Individuals’ Reactions to Data Breaches
P Mayer, Y Zou, BM Lowens, HA Dyer, K Le, F Schaub, AJ Aviv
ACM Transactions on Computer-Human Interaction, 2023
132023
Shoulder-Surfing Resistant Authentication for Augmented Reality
R Düzgün, P Mayer, M Volkamer
Nordic Human-Computer Interaction Conference, 1-13, 2022
132022
The system can't perform the operation now. Try again later.
Articles 1–20