Author of the publication

Design Considerations for Secure and Usable Authentication on Situated Displays.

, , , , and . MUM, page 483-490. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards., , and . ACM Trans. Priv. Secur., 26 (2): 12:1-12:24 (May 2023)PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices., , , , and . Proc. Priv. Enhancing Technol., 2022 (3): 650-669 (2022)Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing., , , and . ACM Trans. Comput. Hum. Interact., 28 (1): 6:1-6:44 (2021)Investigating Privacy Perceptions and Subjective Acceptance of Eye Tracking on Handheld Mobile Devices., , , and . Proc. ACM Hum. Comput. Interact., 7 (ETRA): 1-16 (May 2023)An End-to-End Review of Gaze Estimation and its Interactive Applications on Handheld Mobile Devices., , , and . CoRR, (2023)Safety, Power Imbalances, Ethics and Proxy Sex: Surveying In-The-Wild Interactions Between VR Users and Bystanders., , , and . ISMAR, page 211-220. IEEE, (2021)Big Buddy: Exploring Child Reactions and Parental Perceptions towards a Simulated Embodied Moderating System for Social Virtual Reality., , , and . IDC, page 1-13. ACM, (2023)RubikAuth: Fast and Secure Authentication in Virtual Reality., , , and . CHI Extended Abstracts, page 1-9. ACM, (2020)Don't Use Fingerprint, it's Raining!: How People Use and Perceive Context-Aware Selection of Mobile Authentication., , , , and . AVI, page 54:1-54:5. ACM, (2020)Are Thermal Attacks Ubiquitous?: When Non-Expert Attackers Use Off the shelf Thermal Cameras., , , , and . AVI, page 47:1-47:5. ACM, (2020)