Peter Mayer

Orcid: 0000-0002-6267-4874

Affiliations:
  • University of Southern Denmark, Odense, Denmark
  • Karlsruhe Institut of Technology, Germany
  • Technische Universität Darmstadt, Germany (former)


According to our database1, Peter Mayer authored at least 48 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Nudging Users to Change Breached Passwords Using the Protection Motivation Theory.
CoRR, 2024

Of Mothers and Managers - The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

An Analysis of Password Managers' Password Checkup Tools.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches.
ACM Trans. Comput. Hum. Interact., October, 2023

Understanding issues related to personal data and data protection in open source projects on GitHub.
CoRR, 2023

Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked.
Proceedings of the 2023 European Symposium on Usable Security, 2023

A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Why Users (Don't) Use Password Managers at a Large Educational Institution.
Proceedings of the 31st USENIX Security Symposium, 2022

"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Shoulder-Surfing Resistant Authentication for Augmented Reality.
Proceedings of the NordiCHI '22: Nordic Human-Computer Interaction Conference, Aarhus, Denmark, October 8, 2022

PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays.
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022

"Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?".
Proceedings of the Human Aspects of Information Security and Assurance, 2022

Standing out among the daily spam: How to catch website owners' attention by means of vulnerability notifications.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass.
AIS Trans. Hum. Comput. Interact., December, 2021

"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them.
Proceedings of the 30th USENIX Security Symposium, 2021

How to Increase Smart Home Security and Privacy Risk Perception.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Literature Review on Virtual Reality Authentication.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Vision: What Johnny learns about Password Security from Videos posted on YouTube.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

SMILE - Smart eMaIl Link Domain Extractor.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Secure and Usable User Authentication.
PhD thesis, 2020

Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit.
Datenschutz und Datensicherheit, 2020

Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays.
CoRR, 2020

An investigation of phishing awareness and education over time: When and how to best remind users.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation.
Proceedings of the Financial Cryptography and Data Security, 2020

Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Keep on rating - on the systematic rating and comparison of authentication schemes.
Inf. Comput. Secur., 2019

I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte.
Datenschutz und Datensicherheit, 2018

A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Developing and Evaluating a Five Minute Phishing Awareness Video.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Assistance in Daily Password Generation Tasks.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

The Quest to Replace Passwords Revisited - Rating Authentication Schemes.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Motivating Users to Consider Recommendations on Password Management Strategies.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Productivity vs security: mitigating conflicting goals in organizations.
Inf. Comput. Secur., 2017

Addressing misconceptions about password security effectively.
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017

A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Reliable Behavioural Factors in the Information Security Context.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Teaching Phishing-Security: Which Way is Best?
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Authentication Schemes - Comparison and Effective Password Spaces.
Proceedings of the Information Systems Security - 10th International Conference, 2014

2013
Are Graphical Authentication Mechanisms As Strong As Passwords?
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013


  Loading...