Why Eve and Mallory love Android: An analysis of Android SSL (in) security S Fahl, M Harbach, T Muders, L Baumgärtner, B Freisleben, M Smith Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 749 | 2012 |
{It’s} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception M Harbach, E Von Zezschwitz, A Fichtner, A De Luca, M Smith 10th symposium on usable privacy and security (SOUPS 2014), 213-230, 2014 | 385 | 2014 |
Using personal examples to improve risk communication for security & privacy decisions M Harbach, M Hettig, S Weber, M Smith Proceedings of the SIGCHI conference on human factors in computing systems …, 2014 | 252 | 2014 |
Rethinking SSL development in an appified world S Fahl, M Harbach, H Perl, M Koetter, M Smith Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 238 | 2013 |
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers A De Luca, M Harbach, E von Zezschwitz, ME Maurer, BE Slawik, ... Proceedings of the sigchi conference on human factors in computing systems …, 2014 | 168 | 2014 |
The anatomy of smartphone unlocking: A field study of android lock screens M Harbach, A De Luca, S Egelman Proceedings of the 2016 chi conference on human factors in computing systems …, 2016 | 160 | 2016 |
On the ecological validity of a password study S Fahl, M Harbach, Y Acar, M Smith Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013 | 148 | 2013 |
Nudge me right: Personalizing online security nudges to people's decision-making styles E Peer, S Egelman, M Harbach, N Malkin, A Mathur, A Frik Computers in Human Behavior 109, 106347, 2020 | 134 | 2020 |
Behavior ever follows intention? A validation of the Security Behavior Intentions Scale (SeBIS) S Egelman, M Harbach, E Peer Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016 | 128 | 2016 |
Do or do not, there is no try: user engagement may not improve security outcomes A Forget, S Pearman, J Thomas, A Acquisti, N Christin, LF Cranor, ... Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 97-111, 2016 | 116 | 2016 |
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers A Naiakshina, A Danilova, E Gerlitz, E Von Zezschwitz, M Smith Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 100 | 2019 |
Helping Johnny 2.0 to encrypt his Facebook conversations S Fahl, M Harbach, T Muders, M Smith, U Sander Proceedings of the eighth symposium on usable privacy and security, 1-17, 2012 | 92 | 2012 |
Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers S Fahl, M Harbach, M Oltrogge, T Muders, M Smith Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 79 | 2013 |
Keep on lockin'in the free world: A multi-national comparison of smartphone locking M Harbach, A De Luca, N Malkin, S Egelman Proceedings of the 2016 chi conference on human factors in computing systems …, 2016 | 74 | 2016 |
Confidentiality as a service--usable security for the cloud S Fahl, M Harbach, T Muders, M Smith 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 70 | 2012 |
Sorry, I don’t get it: An analysis of warning message texts M Harbach, S Fahl, P Yakovleva, M Smith Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC …, 2013 | 67 | 2013 |
Who's afraid of which bad wolf? A survey of IT security risk awareness M Harbach, S Fahl, M Smith 2014 IEEE 27th Computer Security Foundations Symposium, 97-110, 2014 | 57 | 2014 |
On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards M Harbach, S Fahl, M Rieger, M Smith Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013 | 50 | 2013 |
Quantifying users' beliefs about software updates A Mathur, N Malkin, M Harbach, E Peer, S Egelman arXiv preprint arXiv:1805.04594, 2018 | 32 | 2018 |
The anatomy of smartphone unlocking: Why and how android users around the world lock their phones N Malkin, M Harbach, A De Luca, S Egelman GetMobile: Mobile Computing and Communications 20 (3), 42-46, 2017 | 28 | 2017 |