Why do developers get password storage wrong? A qualitative usability study A Naiakshina, A Danilova, C Tiefenau, M Herzog, S Dechand, M Smith Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 174 | 2017 |
Deception task design in developer password studies: Exploring a student sample A Naiakshina, A Danilova, C Tiefenau, M Smith Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 297-313, 2018 | 74 | 2018 |
Security, availability, and multiple information sources: Exploring update behavior of system administrators C Tiefenau, M Häring, K Krombholz, E Von Zezschwitz Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 239-258, 2020 | 46 | 2020 |
A usability evaluation of Let's Encrypt and Certbot: usable security done right C Tiefenau, E von Zezschwitz, M Häring, K Krombholz, M Smith Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 43 | 2019 |
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the {Corona-Warn-App} in Germany M Häring, E Gerlitz, C Tiefenau, M Smith, D Wermke, S Fahl, Y Acar Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 77-98, 2021 | 16 | 2021 |
Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques? C Tiefenau, M Häring, E Gerlitz, E von Zezschwitz arXiv preprint arXiv:1911.07701, 2019 | 10 | 2019 |
What does this update do to my systems?–an analysis of the importance of update-related information to system administrators F Martius, C Tiefenau Workshop on Security Information Workers, WSIW 20, 1-12, 2020 | 6 | 2020 |
Please enter your PIN C Tiefenau, M Häring, M Khamis, E von Zezschwitz On the risk of bypass attacks on biometric authentication on mobile devices, 2019 | 6 | 2019 |
Adventures in recovery land: Testing the account recovery of popular websites when the second factor is lost E Gerlitz, M Häring, CT Mädler, M Smith, C Tiefenau Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 227-243, 2023 | 4 | 2023 |
" Please enter your PIN"--On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices C Tiefenau, M Häring, M Khamis, E von Zezschwitz arXiv preprint arXiv:1911.07692, 2019 | 4 | 2019 |
Evolution of password expiry in companies: measuring the adoption of recommendations by the german federal office for information security E Gerlitz, M Häring, M Smith, C Tiefenau Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 191-210, 2023 | 2 | 2023 |
Towards Understanding User Interaction in Future Smart Homes S Prange, C Tiefenau, E von Zezschwitz, F Alt Proceedings of CHI’19 Workshop on New Directions for the IoT: Automate …, 2019 | 2 | 2019 |
Less About Privacy: Revisiting a Survey about the German COVID-19 Contact Tracing App M Häring, E Gerlitz, M Smith, C Tiefenau Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023 | 1 | 2023 |
{SoK}: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact,{Chi-Squared},{McNemar's}, Wilcoxon {Rank-Sum}, Wilcoxon {Signed-Rank} and t-tests in {Developer … AM Ortloff, C Tiefenau, M Smith Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 341-359, 2023 | 1 | 2023 |
Replicating a study of ransomware in Germany AM Ortloff, M Vossen, C Tiefenau Proceedings of the 2021 European Symposium on Usable Security, 151-164, 2021 | 1 | 2021 |
Behavioral Studies with IT-Administrators-Updating in Complex Environments and Securing Web Servers C Tiefenau Universitäts-und Landesbibliothek Bonn, 2021 | | 2021 |
The Struggle is Real: Analyzing Ground Truth Data of TLS (Mis-) Configurations C Tiefenau, E von Zezschwitz arXiv preprint arXiv:1809.08817, 2018 | | 2018 |
Folk and Expert Mental Models of Security and Privacy W Altaf, C Tiefenau | | |