International Conference on Human Factors in Computing Systems (CHI)
See Me If You Can: A Multi-Layer Protocol for Bystander Privacy with Consent-Based Restoration
ACM Conference on Computer and Communications Security (CCS)
How Blind and Low-Vision Users Manage Their Passwords
New Security Paradigms Workshop (NSPW
"You Creep! It Really Worked!": An Empirical Study of Telephone Scams with Cloned Familiar Voices and Trusted Caller IDs
IEEE Symposium on Security and Privacy (S&P)
Analyzing the iOS Local Network Permission from a Technical and User Perspective
IEEE Symposium on Security and Privacy (S&P)
(Blind) Users Really Do Heed Aural Telephone Scam Warnings
International Conference on Mobile and Ubiquitous Multimedia (MUM)
Let me quickly share it - Time Pressure when Sharing on Social Media
International Conference on Human Factors in Computing Systems (CHI)
In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera Glasses
Proceedings of the ACM on Human-Computer InteractionInvestigating Security Folklore: A Case Study on the Tor over VPN Phenomenon
Usenix Security Symposium (USENIX-Security)
International Conference on Human Factors in Computing Systems (CHI)
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice