Author of the publication

RubikAuth: Fast and Secure Authentication in Virtual Reality.

, , , and . CHI Extended Abstracts, page 1-9. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Debunking Security-Usability Tradeoff Myths, , , , and . IEEE Security & Privacy, 14 (5): 33--39 (2016)Lessons learned from the deployment of a smartphone-based access-control system., , , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 64-75. ACM, (2007)Twitter has a Binary Privacy Setting, are Users Aware of How It Works?, , , and . CoRR, (2022)Tales of Software Updates: The process of updating software., and . CHI, page 3215-3226. ACM, (2016)Can I Borrow Your ATM? Using Virtual Reality for (Simulated) In Situ Authentication Research., , and . VR, page 301-310. IEEE, (2022)Virtual Reality Observations: Using Virtual Reality to Augment Lab-Based Shoulder Surfing Research., , , and . VR, page 291-300. IEEE, (2022)Was my message read?: Privacy and Signaling on Facebook Messenger., , , , and . CHI, page 3838-3842. ACM, (2017)Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing., , , and . ACM Trans. Comput. Hum. Interact., 28 (1): 6:1-6:44 (2021)Owning and Sharing: Privacy Perceptions of Smart Speaker Users., , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW1): 45:1-45:29 (2021)Embedding Privacy Into Design Through Software Developers: Challenges and Solutions., , and . IEEE Secur. Priv., 21 (1): 49-57 (January 2023)