Прати
Oliver Wiese
Oliver Wiese
CISPA Helmholtz Center for Information Security
Верификована је имејл адреса на cispa.de
Наслов
Навело
Навело
Година
The u in crypto stands for usable: An empirical study of user experience with mobile cryptocurrency wallets
A Voskobojnikov, O Wiese, M Mehrabi Koushki, V Roth, K Beznosov
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
742021
See you next time: A model for modern shoulder surfers
O Wiese, V Roth
Proceedings of the 18th International Conference on Human-Computer …, 2016
352016
27 years and 81 million opportunities later: Investigating the use of Email encryption for an entire university
C Stransky, O Wiese, V Roth, Y Acar, S Fahl
2022 IEEE Symposium on Security and Privacy (SP), 860-875, 2022
292022
Pitfalls of shoulder surfing studies
O Wiese, V Roth
NDSS workshop on usable security, 1-6, 2015
292015
What is a secure email
J Lausch, O Wiese, V Roth
European Workshop on Usable Security (EuroUSEC) 11, 2017
152017
Beware the downgrading of secure electronic mail
O Wiese, J Lausch, J Bode, V Roth
Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and …, 2018
102018
Terrapin Attack: Breaking {SSH} Channel Integrity By Sequence Number Manipulation
F Bäumer, W Liu, M Brinkmann, L Peng, J Schwenk, M Oltrogge, ...
33rd USENIX Security Symposium (USENIX Security 24), 7463-7480, 2024
42024
A {Mixed-Methods} Study on User Experiences and Challenges of Recovery Codes for an {End-to-End} Encrypted Service
S Höltervennhoff, N Wöhler, A Möhle, M Oltrogge, Y Acar, O Wiese, S Fahl
33rd USENIX Security Symposium (USENIX Security 24), 7267-7284, 2024
42024
I Need this Back, Later! An Exploration of Practical Secret Sharing
O Wiese, C Weinhold, JO Malchow, V Roth
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
22018
Der Phish und die Nutzerin: Formalisierung, Konzeption und Analyse
O Wiese
12023
SoK: The past decade of user deception in emails and today’s email clients’ susceptibility to phishing techniques
MF Veit, O Wiese, FL Ballreich, M Volkamer, D Engels, P Mayer
Computers & Security 150, 104197, 2025
2025
Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security
JU Holtgrave, K Friedrich, F Fischer, N Huaman, N Busch, JH Klemmer, ...
Network and Distributed System Security (NDSS) Symposium 2025, 2025
2025
“That’s my perspective from 30 years of doing this”: An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code
A Krause, H Kaur, JH Klemmer, O Wiese, S Fahl
Систем тренутно не може да изврши ову радњу. Пробајте поново касније.
Чланци 1–13