Katharina Krombholz
Orcid: 0000-0003-2425-3013Affiliations:
- CISPA Helmholtz Center for Information Security, Saarland, Germany
According to our database1,
Katharina Krombholz
authored at least 69 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics.
Proceedings of the 33rd USENIX Security Symposium, 2024
"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the International Conference on Mobile and Ubiquitous Multimedia, 2024
In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera Glasses.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with Experts.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures.
Proceedings of the Applied Cryptography and Network Security, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
Proc. ACM Hum. Comput. Interact., 2023
To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security Mindset.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Why I Can't Authenticate - Understanding the Low Adoption of Authentication Ceremonies with Autoethnography.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
2021
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Trans. Comput. Hum. Interact., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Investigating Car Drivers' Information Demand after Safety and Security Critical Incidents.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction.
Proceedings of the Computer Vision - ECCV 2020 Workshops, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02352-1, 2017
IEEE Internet Comput., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
2016
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the Sicherheit 2016: Sicherheit, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing.
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Business Information Systems Workshops, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations.
Digit. Investig., 2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02338-5, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
2012
Fake identities in social media: A case study on the sustainability of the Facebook business model.
J. Serv. Sci. Res., 2012