default search action
Emanuel von Zezschwitz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c33]Emanuel von Zezschwitz, Serena Chen, Emily Stark:
"It builds trust with the customers" - Exploring User Perceptions of the Padlock Icon in Browser UI. SP (Workshops) 2022: 44-50 - 2020
- [c32]Karoline Busse, Mohammad Tahaei, Katharina Krombholz, Emanuel von Zezschwitz, Matthew Smith, Jing Tian, Wenyuan Xu:
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries. EuroS&P Workshops 2020: 200-209 - [c31]Christian Tiefenau, Maximilian Häring, Katharina Krombholz, Emanuel von Zezschwitz:
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators. SOUPS @ USENIX Security Symposium 2020: 239-258 - [i5]Christian Tiefenau, Maximilian Häring, Katharina Krombholz, Emanuel von Zezschwitz:
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators. CoRR abs/2007.08875 (2020)
2010 – 2019
- 2019
- [j4]Florian Alt, Emanuel von Zezschwitz:
Emerging Trends in Usable Security and Privacy. i-com 18(3): 189-195 (2019) - [j3]Karoline Busse, Sabrina Amft, Daniel Hecker, Emanuel von Zezschwitz:
"Get a Free Item Pack with Every Activation!". i-com 18(3): 217-236 (2019) - [c30]Christian Tiefenau, Emanuel von Zezschwitz, Maximilian Häring, Katharina Krombholz, Matthew Smith:
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right. CCS 2019: 1971-1988 - [c29]Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Emanuel von Zezschwitz, Matthew Smith:
"If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers. CHI 2019: 140 - [c28]Sarah Prange, Emanuel von Zezschwitz, Florian Alt:
Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home. EuroS&P Workshops 2019: 154-158 - [c27]Katharina Krombholz, Karoline Busse, Katharina Pfeffer, Matthew Smith, Emanuel von Zezschwitz:
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS. IEEE Symposium on Security and Privacy 2019: 246-263 - [i4]Karoline Busse, Sabrina Amft, Daniel Hecker, Emanuel von Zezschwitz:
"Get a Free Item Pack with Every Activation!" - Do Incentives Increase the Adoption Rates of Two-Factor Authentication? CoRR abs/1910.07269 (2019) - [i3]Christian Tiefenau, Maximilian Häring, Mohamed Khamis, Emanuel von Zezschwitz:
"Please enter your PIN" - On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices. CoRR abs/1911.07692 (2019) - [i2]Christian Tiefenau, Maximilian Häring, Eva Gerlitz, Emanuel von Zezschwitz:
Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques? CoRR abs/1911.07701 (2019) - 2018
- [j2]Mohamed Khamis, Ludwig Trotter, Ville Mäkelä, Emanuel von Zezschwitz, Jens Le, Andreas Bulling, Florian Alt:
CueAuth: Comparing Touch, Mid-Air Gestures, and Gaze for Cue-based Authentication on Situated Displays. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4): 174:1-174:22 (2018) - [c26]Maria Muszynska, Denise Michels, Emanuel von Zezschwitz:
Not On My Phone: Exploring Users' Conception of Related Permissions. CHI Extended Abstracts 2018 - [i1]Christian Tiefenau, Emanuel von Zezschwitz:
The Struggle is Real: Analyzing Ground Truth Data of TLS (Mis-)Configurations. CoRR abs/1809.08817 (2018) - 2017
- [c25]Malin Eiband, Mohamed Khamis, Emanuel von Zezschwitz, Heinrich Hussmann, Florian Alt:
Understanding Shoulder Surfing in the Wild: Stories from Users and Observers. CHI 2017: 4254-4265 - [c24]Mohamed Khamis, Mariam Hassib, Emanuel von Zezschwitz, Andreas Bulling, Florian Alt:
GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication. ICMI 2017: 446-450 - 2016
- [b1]Emanuel von Zezschwitz:
Risks and potentials of graphical and gesture-based authentication for touchscreen mobile devices: balancing usability and security through user-centered analysis and design. Ludwig Maximilian University of Munich, Germany, 2016 - [j1]Alexander De Luca, Emanuel von Zezschwitz:
Usable privacy and security. it Inf. Technol. 58(5): 215-216 (2016) - [c23]Malin Eiband, Emanuel von Zezschwitz, Daniel Buschek, Heinrich Hußmann:
My Scrawl Hides It All: Protecting Text Messages Against Shoulder Surfing With Handwritten Fonts. CHI Extended Abstracts 2016: 2041-2048 - [c22]Mohamed Khamis, Florian Alt, Mariam Hassib, Emanuel von Zezschwitz, Regina Hasholzner, Andreas Bulling:
GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices. CHI Extended Abstracts 2016: 2156-2164 - [c21]Daniel Buschek, Fabian Hartmann, Emanuel von Zezschwitz, Alexander De Luca, Florian Alt:
SnapApp: Reducing Authentication Overhead with a Time-Constrained Fast Unlock Option. CHI 2016: 3736-3747 - [c20]Emanuel von Zezschwitz, Sigrid Ebbinghaus, Heinrich Hussmann, Alexander De Luca:
You Can't Watch This!: Privacy-Respectful Photo Browsing on Smartphones. CHI 2016: 4320-4324 - [c19]Emanuel von Zezschwitz, Malin Eiband, Daniel Buschek, Sascha Oberhuber, Alexander De Luca, Florian Alt, Heinrich Hussmann:
On quantifying the effective password space of grid-based unlock gestures. MUM 2016: 201-212 - 2015
- [c18]Emanuel von Zezschwitz, Alexander De Luca, Bruno Brunkow, Heinrich Hussmann:
SwiPIN: Fast and Secure PIN-Entry on Smartphones. CHI 2015: 1403-1406 - [c17]Alexander De Luca, Alina Hang, Emanuel von Zezschwitz, Heinrich Hussmann:
I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones. CHI 2015: 1411-1414 - [c16]Emanuel von Zezschwitz, Alexander De Luca, Philipp Janssen, Heinrich Hussmann:
Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns. CHI 2015: 2339-2342 - [c15]Daniel Buschek, Moritz Bader, Emanuel von Zezschwitz, Alexander De Luca:
Automatic Privacy Classification of Personal Photos. INTERACT (2) 2015: 428-435 - [c14]Alina Hang, Alexander De Luca, Emanuel von Zezschwitz, Manuel Demmler, Heinrich Hussmann:
Locked Your Phone? Buy a New One? From Tales of Fallback Authentication on Smartphones to Actual Concepts. MobileHCI 2015: 295-305 - 2014
- [c13]Diogo Marques, Luís Carriço, Tiago João Guerreiro, Alexander De Luca, Pattie Maes, Ildar Muslukhov, Ian Oakley, Emanuel von Zezschwitz:
Workshop on inconspicuous interaction. CHI Extended Abstracts 2014: 91-94 - [c12]Alexander De Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard Ewald Slawik, Heinrich Hussmann, Matthew Smith:
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers. CHI 2014: 2937-2946 - [c11]Emanuel von Zezschwitz, Alexander De Luca, Heinrich Hussmann:
Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance. NordiCHI 2014: 461-470 - [c10]Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, Matthew Smith:
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. SOUPS 2014: 213-230 - 2013
- [c9]Alexander De Luca, Emanuel von Zezschwitz, Ngo Dieu Huong Nguyen, Max-Emanuel Maurer, Elisa Rubegni, Marcello Paolo Scipioni, Marc Langheinrich:
Back-of-device authentication on smartphones. CHI 2013: 2389-2398 - [c8]Alexander De Luca, Emanuel von Zezschwitz, Laurent Pichler, Heinrich Hussmann:
Using fake cursors to secure on-screen password entry. CHI 2013: 2399-2402 - [c7]Emanuel von Zezschwitz, Alexander De Luca, Heinrich Hussmann:
Survival of the Shortest: A Retrospective Analysis of Influencing Factors on Password Composition. INTERACT (3) 2013: 460-467 - [c6]Alina Hang, Alexander De Luca, Katharina Frison, Emanuel von Zezschwitz, Massimo Tedesco, Marcel Kockmann, Heinrich Hussmann:
Travel Routes or Geography Facts? An Evaluation of Voice Authentication User Interfaces. INTERACT (3) 2013: 468-475 - [c5]Max-Emanuel Maurer, Alexander De Luca, Alina Hang, Doris Hausen, Fabian Hennecke, Sebastian Loehmann, Henri Palleis, Hendrik Richter, Simon Stusak, Aurélien Tabard, Sarah Tausch, Emanuel von Zezschwitz, Franziska Schwamb, Heinrich Hussmann, Andreas Butz:
Long-Term Experiences with an Iterative Design of a QR-Code-Based Payment System for Beverages. INTERACT (4) 2013: 587-594 - [c4]Emanuel von Zezschwitz, Anton Koslow, Alexander De Luca, Heinrich Hussmann:
Making graphic-based authentication secure against smudge attacks. IUI 2013: 277-286 - [c3]Emanuel von Zezschwitz, Paul Dunphy, Alexander De Luca:
Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. Mobile HCI 2013: 261-270 - 2012
- [c2]Alina Hang, Emanuel von Zezschwitz, Alexander De Luca, Heinrich Hussmann:
Too much information!: user attitudes towards smartphone sharing. NordiCHI 2012: 284-287
2000 – 2009
- 2009
- [c1]Alexander De Luca, Emanuel von Zezschwitz, Heinrich Hußmann:
Vibrapass: secure authentication based on shared lies. CHI 2009: 913-916
Coauthor Index
aka: Heinrich Hussmann
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint