Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
1_Memorable_And_Secu..> | 2018-05-02 08:57 | 285K | ||
2_Shoulder-surfing_r..> | 2018-05-02 08:57 | 16M | ||
3_Usability_und_Priv..> | 2018-05-02 08:57 | 330K | ||
4_2_Poster_PasswordE..> | 2018-05-02 08:57 | 389K | ||
5_RechtlicheUndTechn..> | 2018-05-02 08:57 | 423K | ||
6_SpotthePhishbyChec..> | 2018-05-02 08:57 | 271K | ||
7_Understanding_info..> | 2018-05-02 08:57 | 107K | ||
8_BewertungDerGMXMai..> | 2018-05-02 08:57 | 225K | ||
9_UsabilityVsPrivacy..> | 2018-05-02 08:57 | 2.0M | ||
11_CapturingAttentio..> | 2018-05-02 08:57 | 140K | ||
12_BuildingCastlesIn..> | 2018-05-02 08:57 | 66K | ||
13_TheUseofLinguisti..> | 2018-05-02 08:57 | 182K | ||
14_UnterstuetzungFue..> | 2018-05-02 08:57 | 9.7M | ||
15_ZertApps_Beitrag-..> | 2018-05-02 08:57 | 868K | ||
16_AccessDescribingA..> | 2018-05-02 08:57 | 361K | ||
558-3.pdf | 2018-05-02 08:57 | 381K | ||
2014.07.16_PETS_pape..> | 2018-05-02 08:57 | 312K | ||
20130228_Folk_models..> | 2018-05-02 08:57 | 71K | ||
ACCESS_CCS.pdf | 2018-05-02 08:57 | 353K | ||
ARES_2012.pdf | 2018-05-02 08:57 | 2.2M | ||
ARES_2013.pdf | 2018-05-02 08:57 | 669K | ||
ARES_2014.pdf | 2018-05-02 08:57 | 1.3M | ||
A_Socio-Technical_In..> | 2018-05-02 08:57 | 598K | ||
AdvancingTrustVisual..> | 2018-05-02 08:57 | 871K | ||
AnEvaluationAndCerti..> | 2018-05-02 08:57 | 249K | ||
BasissatzVonSicherhe..> | 2018-05-02 08:58 | 545K | ||
BitsOrPaper.pdf | 2018-05-02 08:58 | 119K | ||
BoRoVo_ARES-2.pdf | 2018-05-02 08:58 | 125K | ||
Budurushi_EVOTE2014.pdf | 2018-05-02 08:58 | 2.7M | ||
Coercion-resistant_P..> | 2018-05-02 08:58 | 355K | ||
CoercionResistantPro..> | 2018-05-02 08:58 | 391K | ||
DevelopmentOfaFormal..> | 2018-05-02 08:58 | 349K | ||
DieOnlineWahl-Durchb..> | 2018-05-02 08:58 | 415K | ||
EDEM2007_volkamer_kr..> | 2018-05-02 08:58 | 88K | ||
EinPKI-ProtokollFuer..> | 2018-05-02 08:58 | 73K | ||
EmailSecurityCriteri..> | 2018-05-02 08:58 | 64K | ||
EntwicklungEinesForm..> | 2018-05-02 08:58 | 179K | ||
Extending_Helios_Tow..> | 2018-05-02 08:58 | 300K | ||
FUSE-EinInternetwahl..> | 2018-05-02 08:58 | 6.1M | ||
FeasibilityAnalysiso..> | 2018-05-02 08:58 | 453K | ||
GI2014_BNSV.pdf | 2018-05-02 08:58 | 495K | ||
GI_Neumann_et_al.pdf | 2018-05-02 08:58 | 229K | ||
GI_Workshop_2014.pdf | 2018-05-02 08:58 | 1.1M | ||
Goals_Productivity_v..> | 2018-05-02 08:58 | 473K | ||
HAISA-WebPageVersion..> | 2018-05-02 08:58 | 115K | ||
HAISA_VolkamerEtAl20..> | 2018-05-02 08:58 | 141K | ||
HCII_2017.pdf | 2018-05-02 08:58 | 434K | ||
IRIS_2012.pdf | 2018-05-02 08:58 | 281K | ||
IRIS_2013.pdf | 2018-05-02 08:58 | 2.2M | ||
ImplementierbareZust..> | 2018-05-02 08:58 | 256K | ||
Implementingandevalu..> | 2018-05-02 08:58 | 1.7M | ||
InformationFlowAnaly..> | 2018-05-02 08:58 | 755K | ||
InformationFlowContr..> | 2018-05-02 08:58 | 478K | ||
IntroducingPrecautio..> | 2018-05-02 08:58 | 1.6M | ||
IntroducingProxyVoti..> | 2018-05-02 08:58 | 259K | ||
ItIsNotAboutTheDesig..> | 2018-05-02 08:58 | 177K | ||
MMR_HBV14.pdf | 2018-05-02 08:58 | 192K | ||
MPI_IT_Security_2012..> | 2018-05-02 08:58 | 557K | ||
MPI_IT_Security_2012..> | 2018-05-02 08:58 | 1.2M | ||
Machbarkeitsanalysed..> | 2018-05-02 08:58 | 481K | ||
Mayer_PortfolioKeyDe..> | 2018-05-02 08:58 | 550K | ||
Mayer_Volkamer_Kauer..> | 2018-05-02 08:58 | 1.0M | ||
MentalModels.pdf | 2018-05-02 08:58 | 342K | ||
MentalModelsofVerifi..> | 2018-05-02 08:58 | 671K | ||
MotivatingVerifiabil..> | 2018-05-02 08:58 | 644K | ||
MuC_2016_Privacyfrie..> | 2018-05-02 08:58 | 461K | ||
Multiple_Casts_in_on..> | 2018-05-02 08:58 | 284K | ||
NeumannDuD201511_db.pdf | 2018-05-02 08:58 | 18M | ||
NoPhish_IFIP_Sec.pdf | 2018-05-02 08:58 | 619K | ||
NoPhish_STM.pdf | 2018-05-02 08:58 | 476K | ||
NothingComesForFree.pdf | 2018-05-02 08:58 | 178K | ||
NzS_2016_-_NoPhish_-..> | 2018-05-02 08:58 | 160K | ||
OEffentlichkeitsgrun..> | 2018-05-02 08:58 | 414K | ||
ObservingThreatsToE-..> | 2018-05-02 08:58 | 151K | ||
On_the_security-_pri..> | 2018-05-02 08:58 | 1.2M | ||
OnlineWahlenFuerGrem..> | 2018-05-02 08:58 | 117K | ||
OverviewOnlineWahlen..> | 2018-05-02 08:58 | 167K | ||
PaperAuditTrailsandV..> | 2018-05-02 08:58 | 531K | ||
PartialVerifiability..> | 2018-05-02 08:58 | 454K | ||
Password_card_ACSAC_..> | 2018-05-02 08:58 | 720K | ||
PositivebutSkeptical..> | 2018-05-02 08:58 | 831K | ||
Poster_On_the_Usabil..> | 2018-05-02 08:58 | 188K | ||
RecommendationsForUs..> | 2018-05-02 08:58 | 219K | ||
Renaud_Mayer_Volkame..> | 2018-05-02 08:58 | 122K | ||
RiLaHu_10.pdf | 2018-05-02 08:58 | 31K | ||
RiskKom_Gesamtkonzep..> | 2018-05-02 08:58 | 356K | ||
SecurePlatformProble..> | 2018-05-02 08:58 | 339K | ||
SecurityProofsforPar..> | 2018-05-02 08:58 | 689K | ||
SecurityRequirements..> | 2018-05-02 08:58 | 120K | ||
TORPEDO-Final.pdf | 2018-05-02 08:58 | 4.2M | ||
TRUST2015.pdf | 2018-05-02 08:58 | 1.2M | ||
Tauglichkeit_von_Com..> | 2018-05-02 08:58 | 8.6M | ||
Teaching_Phishing-Se..> | 2018-05-02 08:58 | 699K | ||
TheDevelopmentOfRemo..> | 2018-05-02 08:58 | 245K | ||
TowardsLong-TermFree..> | 2018-05-02 08:58 | 200K | ||
TowardsTheImpactOfTh..> | 2018-05-02 08:58 | 156K | ||
TransparencyandTechn..> | 2018-05-02 08:58 | 257K | ||
TrustModelsForRemote..> | 2018-05-02 08:58 | 66K | ||
UntersuchungdesSiche..> | 2018-05-02 08:58 | 258K | ||
Uploaded_TechReport_..> | 2018-05-02 08:58 | 103K | ||
UsabilityAnalysisOfH..> | 2018-05-02 08:58 | 1.5M | ||
UsabilityofNewHelios..> | 2018-05-02 08:58 | 589K | ||
UsableSecurityEvalua..> | 2018-05-02 08:58 | 16M | ||
Ver-Misstrauen.pdf | 2018-05-02 08:58 | 180K | ||
VerifiabilityInElect..> | 2018-05-02 08:58 | 196K | ||
VerifiabilityPolyas.pdf | 2018-05-02 08:58 | 1.1M | ||
VerifizierbarkeitEle..> | 2018-05-02 08:58 | 117K | ||
VoteCastinginanypref..> | 2018-05-02 08:58 | 397K | ||
VoteID_2013_Demo.pdf | 2018-05-02 08:58 | 414K | ||
WaehlenAufDistanz.pdf | 2018-05-02 08:58 | 48K | ||
WirksamkeitVonAntiPh..> | 2018-05-02 08:58 | 323K | ||
ZeTA_author_version.pdf | 2018-05-02 08:58 | 601K | ||
Zertifizierte_Datens..> | 2018-05-02 08:58 | 345K | ||
aFormalIT-SscurityMo..> | 2018-05-02 08:57 | 288K | ||
ares13.pdf | 2018-05-02 08:57 | 283K | ||
automatic_password_c..> | 2018-05-02 08:57 | 204K | ||
bare_conf.pdf | 2018-05-02 08:58 | 7.9M | ||
ePart_2013_01.pdf | 2018-05-02 08:58 | 418K | ||
encouraging-privacy-..> | 2018-05-02 08:58 | 291K | ||
expert-knowledge-sub..> | 2018-05-02 08:58 | 872K | ||
final.pdf | 2018-05-02 08:58 | 388K | ||
final___stast-phishi..> | 2018-05-02 08:58 | 3.1M | ||
main.pdf | 2018-05-02 08:58 | 121K | ||
mobile-security-prec..> | 2018-05-02 08:58 | 1.5M | ||
neumann_IJISP_7_3_.pdf | 2018-05-02 08:58 | 1.1M | ||
neumann_chap_zissis_..> | 2018-05-02 08:58 | 554K | ||
neumann_chapter_4_zi..> | 2018-05-02 08:58 | 1.1M | ||
olembo_chap_saeed_bo..> | 2018-05-02 08:58 | 382K | ||
paper_52_-_final.pdf | 2018-05-02 08:58 | 114K | ||
published_Version.pdf | 2018-05-02 08:58 | 85K | ||
reliable-factors.pdf | 2018-05-02 08:58 | 633K | ||
requirements_for_onl..> | 2018-05-02 08:58 | 329K | ||
riskkom-context-comm..> | 2018-05-02 08:58 | 307K | ||
secsac12-decision.pdf | 2018-05-02 08:58 | 192K | ||
soups13_posters-fina..> | 2018-05-02 08:58 | 106K | ||
trust-context-warnin..> | 2018-05-02 08:58 | 814K | ||