Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stealing PINs via mobile sensors: actual risk versus user perception., , , and . Int. J. Inf. Sec., 17 (3): 291-313 (2018)The Importance of Collective Privacy in Digital Sexual and Reproductive Health., , and . CoRR, (2023)Making sense of sensors: mobile sensor security awareness and education., , and . STAST, page 40-52. ACM, (2017)Caring for Intimate Data in Fertility Technologies., and . CHI, page 409:1-409:11. ACM, (2021)Vision: Too Little too Late? Do the Risks of FemTech already Outweigh the Benefits?, , , and . EuroUSEC, page 145-150. ACM, (2022)Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems., , and . Int. J. Inf. Sec., 23 (2): 981-997 (April 2024)"My sex-related data is more sensitive than my financial data and I want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies., and . EuroUSEC, page 1-14. ACM, (2023)SSR'19: The 5th Conference on Security Standardisation Research., , and . CCS, page 2699-2700. ACM, (2019)Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment., , and . SSR, volume 9497 of Lecture Notes in Computer Science, page 21-39. Springer, (2015)"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country., , and . USENIX Security Symposium, page 287-304. USENIX Association, (2022)