Author of the publication

An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User Control.

, , and . SOUPS @ USENIX Security Symposium, page 195-211. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The boundedly rational employee: Security economics for behaviour intervention support in organizations., , and . J. Comput. Secur., 30 (3): 435-464 (2022)Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible., , , , and . USENIX Security Symposium, page 1487-1504. USENIX Association, (2023)Case study: predicting the impact of a physical access control intervention., and . STAST, page 37-46. ACM, (2016)Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes., , and . MIST@CCS, page 69-80. ACM, (2016)Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours., and . STAST, volume 12812 of Lecture Notes in Computer Science, page 23-42. Springer, (2020)Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware., , , , and . EuroS&P, page 392-409. IEEE, (2022)Two Sides of the Shield: Understanding Protective DNS adoption factors., , , , and . USENIX Security Symposium, page 3135-3152. USENIX Association, (2023)Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception., , and . J. Cybersecur., (January 2023)Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules., , , , and . CCS, page 2770-2784. ACM, (2023)Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling., , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)