Author of the publication

Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication.

, , , and . Open Identity Summit, volume P-312 of LNI, page 59-70. Gesellschaft für Informatik e.V., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example., , , and . CODASPY, page 237-243. ACM, (2023)Warn if Secure or How to Deal with Security by Default in Software Development?., , , and . HAISA, page 170-190. University of Plymouth, (2018)What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics., , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 361-381. Springer, (2021)Evaluation of Risk-Based Re-Authentication Methods., , , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 280-294. Springer, (2020)Usability, Sicherheit und Privatsphäre von risikobasierter Authentifizierung.. Sicherheit, volume P-301 of LNI, page 129-134. Gesellschaft für Informatik e.V., (2020)Anwendung der Blockchain außerhalb von Geldwährungen., , and . Datenschutz und Datensicherheit, 41 (8): 482-486 (2017)Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service., , , and . CoRR, (2022)Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild., , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 134-148. Springer, (2019)Usability, security, and privacy of risk-based authentication.. Ruhr University Bochum, Germany, (2023)Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication., , , , and . UbiSec, volume 2034 of Communications in Computer and Information Science, page 401-419. Springer, (2023)