Number of items: 17.
Ortloff, Anna-Marie and Fassl, Matthias and Ponticello, Alexander and Martius, Florin and Mertens, Anna and Krombholz, Katharina and Smith, Matthew
(2023)
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice.
Häring, Maximilian and Gerlitz, Eva and Tiefenau, Christian and Smith, Matthew and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin
(2021)
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany.
Busse, Karoline and Tahaei, Mohammad and Krombholz, Katharina and von Zezschwitz, Emanuel and Smith, Matthew and Tian, Jing and Xu, Wenyuan
(2020)
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
Tiefenau, Christian and von Zezschwitz, Emanuel and Häring, Maximilian and Krombholz, Katharina and Smith, Matthew
(2019)
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
Krombholz, Katharina and Busse, Karoline and Pfeffer, Katharina and Smith, Matthew and von Zezschwitz, Emanuel
(2019)
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
Krombholz, Katharina and Dabrowski, Adrian and Smith, Matthew and Weippl, Edgar
(2017)
Exploring Design Directions for Wearable Privacy.
Schürmann, Dominik and Busse, Karoline and Smith, Matthew and Fahl, Sascha and Dechand, Sergej and Acar, Yasemin
(2016)
An Empirical Study of Textual Key-Fingerprint Representations.
Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016)
SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha
(2015)
To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections.
Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin
(2015)
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits.
Unger, Nik and Dechand, Sergej and Bonneau, Joseph and Fahl, Sascha and Perl, Henning and Goldberg, Ian and Smith, Matthew
(2015)
SoK: Secure Messaging.
Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew
(2014)
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
Harbach, Marian and Fahl, Sascha and Smith, Matthew
(2014)
Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness.
Fahl, Sascha and Acar, Yasemin and Perl, Henning and Smith, Matthew
(2014)
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations.
Perl, Henning and Fahl, Sascha and Smith, Matthew
(2014)
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores.
Fahl, Sascha and Harbach, Marian and Oltrogge, Marten and Muders, Thomas and Smith, Matthew
(2013)
Hey, You, Get Off of My Clipboard.
In:
UNSPECIFIED
Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 144-161.
ISBN 978-3-642-39884-1
(Unpublished)
Fahl, Sascha and Harbach, Marian and Muders, Thomas and Baumgärtner, Lars and Freisleben, Bernd and Smith, Matthew
(2012)
Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security.
This list was generated on Tue Oct 15 17:29:47 2024 CEST.