Markus Dürmuth
Orcid: 0000-0001-5048-3723Affiliations:
- Leibniz University Hannover, Germany
- Ruhr University Bochum, Germany (former)
- Saarland University, Saarbrücken, Germany (former)
According to our database1,
Markus Dürmuth
authored at least 73 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
A Representative Study on Human Detection of Artificially Generated Media Across Countries.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Batman Hacked My Password: A Subtitle-Based Analysis of Password Depiction in Movies.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. ACM Hum. Comput. Interact., 2023
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates.
Proc. Priv. Enhancing Technol., 2022
Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies.
CoRR, 2022
CoRR, 2022
"As soon as it's a risk, I want to require MFA": How Administrators Configure Risk-based Authentication.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
"Fast, Easy, Convenient." Studying Adoption and Perception of Digital Covid Certificates.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
"It's Just a Lot of Prerequisites": A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
2021
Proc. Priv. Enhancing Technol., 2021
IEEE Secur. Priv., 2021
IACR Cryptol. ePrint Arch., 2021
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity (Extended Version).
CoRR, 2021
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity.
Proceedings of the 30th USENIX Security Symposium, 2021
What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics.
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
J. Cybersecur., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
"You still use the password after all" - Exploring FIDO2 Security Keys in a Small Company.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild.
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
2018
A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns.
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
2015
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015
2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Technology and Practice of Passwords, 2014
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
2013
IACR Cryptol. ePrint Arch., 2013
CoRR, 2013
Proceedings of the New Security Paradigms Workshop, 2013
Quantifying the security of graphical passwords: the case of android unlock patterns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms.
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Deniable Encryption with Negligible Detection Probability: An Interactive Construction.
IACR Cryptol. ePrint Arch., 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Computer Security, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Advances in Cryptology, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
2006
2005
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Proceedings of the Computer Security, 2004