default search action
Peter Mayer 0001
Person information
- affiliation: University of Southern Denmark, Odense, Denmark
- affiliation: Karlsruhe Institut of Technology, Germany
- affiliation (former): Technische Universität Darmstadt, Germany
Other persons with the same name
- Peter Mayer — disambiguation page
- Peter Mayer 0002 — TU Wien, Vienna, Austria
- Peter Mayer 0003 — Micron Semiconductor (Deutschland) GmbH, Munich, Germany
- Peter Mayer 0004 — University of St. Gallen, Switzerland
- Peter Mayer 0005 — Siemens, Munich, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Adryana Hutchinson, Collins W. Munyendo, Adam J. Aviv, Peter Mayer:
An Analysis of Password Managers' Password Checkup Tools. CHI Extended Abstracts 2024: 38:1-38:7 - [c38]Lorin Schöni, Victor Carles, Martin Strohmeier, Peter Mayer, Verena Zimmermann:
You Know What? - Evaluation of a Personalised Phishing Training Based on Users' Phishing Knowledge and Detection Skills. EuroUSEC 2024: 1-14 - [c37]Nina Gerber, Alina Stöver, Peter Mayer:
Of Mothers and Managers - The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field. SOUPS @ USENIX Security Symposium 2024: 547-566 - [i3]Yixin Zou, Khue Le, Peter Mayer, Alessandro Acquisti, Adam J. Aviv, Florian Schaub:
Nudging Users to Change Breached Passwords Using the Protection Motivation Theory. CoRR abs/2405.15308 (2024) - 2023
- [j6]Peter Mayer, Yixin Zou, Byron M. Lowens, Hunter A. Dyer, Khue Le, Florian Schaub, Adam J. Aviv:
Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches. ACM Trans. Comput. Hum. Interact. 30(5): 77:1-77:53 (2023) - [c36]Collins W. Munyendo, Peter Mayer, Adam J. Aviv:
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers. CCS 2023: 3123-3137 - [c35]Naheem Noah, Peter Mayer, Sanchari Das:
A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US. CSCW Companion 2023: 317-322 - [c34]Anne Hennig, Nhu Thi Thanh Vuong, Peter Mayer:
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked. EuroUSEC 2023: 312-317 - [i2]Anne Hennig, Lukas Schulte, Steffen Herbold, Oksana Kulyk, Peter Mayer:
Understanding issues related to personal data and data protection in open source projects on GitHub. CoRR abs/2304.06367 (2023) - 2022
- [c33]Reyhan Düzgün, Naheem Noah, Peter Mayer, Sanchari Das, Melanie Volkamer:
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays. ARES 2022: 36:1-36:12 - [c32]Anne Hennig, Fabian Neusser, Aleksandra Alicja Pawelek, Dominik Herrmann, Peter Mayer:
Standing out among the daily spam: How to catch website owners' attention by means of vulnerability notifications. CHI Extended Abstracts 2022: 317:1-317:8 - [c31]Anne Hennig, Heike Dietmann, Franz Lehr, Miriam Mutter, Melanie Volkamer, Peter Mayer:
"Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?". HAISA 2022: 218-227 - [c30]Tobias Länge, Philipp Matheis, Reyhan Düzgün, Peter Mayer, Melanie Volkamer:
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays. MuC (Workshopband) 2022 - [c29]Reyhan Düzgün, Peter Mayer, Melanie Volkamer:
Shoulder-Surfing Resistant Authentication for Augmented Reality. NordiCHI 2022: 29:1-29:13 - [c28]Peter Mayer, Damian Poddebniak, Konstantin Fischer, Marcus Brinkmann, Juraj Somorovsky, M. Angela Sasse, Sebastian Schinzel, Melanie Volkamer:
"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks. SOUPS @ USENIX Security Symposium 2022: 77-96 - [c27]Peter Mayer, Collins W. Munyendo, Michelle L. Mazurek, Adam J. Aviv:
Why Users (Don't) Use Password Managers at a Large Educational Institution. USENIX Security Symposium 2022: 1849-1866 - 2021
- [j5]Karen Renaud, Melanie Volkamer, Peter Mayer, Rüdiger Grimm:
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass. AIS Trans. Hum. Comput. Interact. 13(4): 407-430 (2021) - [c26]Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, Melanie Volkamer:
SMILE - Smart eMaIl Link Domain Extractor. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 403-412 - [c25]Mathieu Christmann, Peter Mayer, Melanie Volkamer:
Vision: What Johnny learns about Password Security from Videos posted on YouTube. EuroUSEC 2021: 124-128 - [c24]John M. Jones, Reyhan Duezguen, Peter Mayer, Melanie Volkamer, Sanchari Das:
A Literature Review on Virtual Reality Authentication. HAISA 2021: 189-198 - [c23]Reyhan Duezguen, Peter Mayer, Benjamin Berens, Christopher Beckmann, Lukas Aldag, Mattia Mossano, Melanie Volkamer, Thorsten Strufe:
How to Increase Smart Home Security and Privacy Risk Perception. TrustCom 2021: 997-1004 - [c22]Peter Mayer, Yixin Zou, Florian Schaub, Adam J. Aviv:
"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them. USENIX Security Symposium 2021: 393-410 - 2020
- [b1]Peter Mayer:
Secure and Usable User Authentication. Karlsruhe Institute of Technology, Germany, 2020 - [j4]Peter Mayer, Fabian Ballreich, Reyhan Düzgün, Christian Schwartz, Melanie Volkamer:
Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit. Datenschutz und Datensicherheit 44(8): 522-527 (2020) - [c21]Mattia Mossano, Kami Vaniea, Lukas Aldag, Reyhan Düzgün, Peter Mayer, Melanie Volkamer:
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector. EuroS&P Workshops 2020: 130-139 - [c20]Oksana Kulyk, Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Nina Gerber, Melanie Volkamer:
Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation. Financial Cryptography Workshops 2020: 84-101 - [c19]Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana von Landesberger, Melanie Volkamer:
An investigation of phishing awareness and education over time: When and how to best remind users. SOUPS @ USENIX Security Symposium 2020: 259-284 - [i1]Reyhan Duezguen, Peter Mayer, Sanchari Das, Melanie Volkamer:
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays. CoRR abs/2007.11663 (2020)
2010 – 2019
- 2019
- [j3]Verena Zimmermann, Nina Gerber, Peter Mayer, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt:
Keep on rating - on the systematic rating and comparison of authentication schemes. Inf. Comput. Secur. 27(5) (2019) - [c18]Peter Mayer, Nina Gerber, Benjamin Reinheimer, Philipp Rack, Kristoffer Braun, Melanie Volkamer:
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads. CHI 2019: 549 - 2018
- [j2]Peter Mayer, Alexandra Kunz, Melanie Volkamer:
Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte. Datenschutz und Datensicherheit 42(5): 307-310 (2018) - [c17]Peter Mayer, Christian Schwartz, Melanie Volkamer:
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials. ACSAC 2018: 733-748 - [c16]Peter Mayer, Alexandra Kunz, Melanie Volkamer:
Motivating Users to Consider Recommendations on Password Management Strategies. HAISA 2018: 28-37 - [c15]Verena Zimmermann, Nina Gerber, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt, Peter Mayer:
The Quest to Replace Passwords Revisited - Rating Authentication Schemes. HAISA 2018: 38-48 - [c14]Karola Marky, Peter Mayer, Nina Gerber, Verena Zimmermann:
Assistance in Daily Password Generation Tasks. UbiComp/ISWC Adjunct 2018: 786-793 - [c13]Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer:
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. SOUPS @ USENIX Security Symposium 2018: 1-11 - [c12]Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber:
Developing and Evaluating a Five Minute Phishing Awareness Video. TrustBus 2018: 119-134 - [c11]Oksana Kulyk, Peter Mayer, Melanie Volkamer, Oliver Kafer:
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface. TrustCom/BigDataSE 2018: 1058-1063 - 2017
- [j1]Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Productivity vs security: mitigating conflicting goals in organizations. Inf. Comput. Secur. 25(2): 137-151 (2017) - [c10]Peter Mayer, Alexandra Kunz, Melanie Volkamer:
Reliable Behavioural Factors in the Information Security Context. ARES 2017: 9:1-9:10 - [c9]Peter Mayer, Jan Kirchner, Melanie Volkamer:
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016. SOUPS 2017: 13-28 - [c8]Peter Mayer, Melanie Volkamer:
Addressing misconceptions about password security effectively. STAST 2017: 16-27 - 2016
- [c7]Peter Mayer, Stephan Neumann, Melanie Volkamer:
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes. CCS 2016: 1817-1819 - [c6]Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade:
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. EuroS&P 2016: 357-371 - [c5]Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer:
Supporting Decision Makers in Choosing Suitable Authentication Schemes. HAISA 2016: 67-77 - [c4]Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann:
Teaching Phishing-Security: Which Way is Best? SEC 2016: 135-149 - 2015
- [c3]Peter Mayer, Melanie Volkamer:
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing. ACSAC 2015: 431-440 - 2014
- [c2]Peter Mayer, Melanie Volkamer, Michaela Kauer:
Authentication Schemes - Comparison and Effective Password Spaces. ICISS 2014: 204-225 - 2013
- [c1]Karen Renaud, Peter Mayer, Melanie Volkamer, Joe Maguire:
Are Graphical Authentication Mechanisms As Strong As Passwords? FedCSIS 2013: 837-844
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint