Author of the publication

"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality.

, , , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Loss Classes: The Central Limit Theorem in Differential Privacy., , and . IACR Cryptol. ePrint Arch., (2018)Job Planning and Simulation in a Digital Factory Environment., , , and . CAINE, page 48-53. ISCA, (2009)Divide and Funnel: a Scaling Technique for Mix-Networks., , , and . IACR Cryptol. ePrint Arch., (2021)AnoA: A Framework for Analyzing Anonymous Communication Protocols., , , , and . J. Priv. Confidentiality, (2016)Comprehensive Anonymity Trilemma: User Coordination is not enough., , , and . Proc. Priv. Enhancing Technol., 2020 (3): 356-383 (2020)"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality., , , , , , , , and . CoRR, (2023)"Tell me, how do you know it's me?" Expectations of security and personalization measures for smart speaker applications., and . CoRR, (2022)PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple., , and . CCS, page 2192-2194. ACM, (2018)Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks., , and . Proc. Priv. Enhancing Technol., 2016 (2): 40-60 (2016)Privacy Loss Classes: The Central Limit Theorem in Differential Privacy., , and . Proc. Priv. Enhancing Technol., 2019 (2): 245-269 (2019)