The u in crypto stands for usable: An empirical study of user experience with mobile cryptocurrency wallets A Voskobojnikov, O Wiese, M Mehrabi Koushki, V Roth, K Beznosov Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021 | 74 | 2021 |
See you next time: A model for modern shoulder surfers O Wiese, V Roth Proceedings of the 18th International Conference on Human-Computer …, 2016 | 35 | 2016 |
27 years and 81 million opportunities later: Investigating the use of Email encryption for an entire university C Stransky, O Wiese, V Roth, Y Acar, S Fahl 2022 IEEE Symposium on Security and Privacy (SP), 860-875, 2022 | 29 | 2022 |
Pitfalls of shoulder surfing studies O Wiese, V Roth NDSS workshop on usable security, 1-6, 2015 | 29 | 2015 |
What is a secure email J Lausch, O Wiese, V Roth European Workshop on Usable Security (EuroUSEC) 11, 2017 | 15 | 2017 |
Beware the downgrading of secure electronic mail O Wiese, J Lausch, J Bode, V Roth Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and …, 2018 | 10 | 2018 |
Terrapin Attack: Breaking {SSH} Channel Integrity By Sequence Number Manipulation F Bäumer, W Liu, M Brinkmann, L Peng, J Schwenk, M Oltrogge, ... 33rd USENIX Security Symposium (USENIX Security 24), 7463-7480, 2024 | 4 | 2024 |
A {Mixed-Methods} Study on User Experiences and Challenges of Recovery Codes for an {End-to-End} Encrypted Service S Höltervennhoff, N Wöhler, A Möhle, M Oltrogge, Y Acar, O Wiese, S Fahl 33rd USENIX Security Symposium (USENIX Security 24), 7267-7284, 2024 | 4 | 2024 |
I Need this Back, Later! An Exploration of Practical Secret Sharing O Wiese, C Weinhold, JO Malchow, V Roth Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 2 | 2018 |
Der Phish und die Nutzerin: Formalisierung, Konzeption und Analyse O Wiese | 1 | 2023 |
SoK: The past decade of user deception in emails and today’s email clients’ susceptibility to phishing techniques MF Veit, O Wiese, FL Ballreich, M Volkamer, D Engels, P Mayer Computers & Security 150, 104197, 2025 | | 2025 |
Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security JU Holtgrave, K Friedrich, F Fischer, N Huaman, N Busch, JH Klemmer, ... Network and Distributed System Security (NDSS) Symposium 2025, 2025 | | 2025 |
“That’s my perspective from 30 years of doing this”: An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code A Krause, H Kaur, JH Klemmer, O Wiese, S Fahl | | |