Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites., , and . NDSS, The Internet Society, (2023)simTPM: User-centric TPM for Mobile Devices (Technical Report)., , and . CoRR, (2019)A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android., , and . USENIX Security Symposium, page 3631-3648. USENIX Association, (2021)Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions., , , , and . USENIX Security Symposium, page 785-802. USENIX Association, (2021)simFIDO: FIDO2 User Authentication with simTPM., and . CCS, page 2569-2571. ACM, (2019)Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication., , , , and . SP, page 268-285. IEEE, (2020)Up-To-Crash: Evaluating Third-Party Library Updatability on Android., , , and . EuroS&P, page 15-30. IEEE, (2019)Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework., and . NDSS, The Internet Society, (2021)Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets (Extended Version)., and . CoRR, (January 2025)Secure multi-execution in Android., , and . SAC, page 1934-1943. ACM, (2019)
OSZAR »