Follow
Christian Tiefenau
Christian Tiefenau
Verified email at cs.uni-bonn.de - Homepage
Title
Cited by
Cited by
Year
Why do developers get password storage wrong? A qualitative usability study
A Naiakshina, A Danilova, C Tiefenau, M Herzog, S Dechand, M Smith
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1732017
Deception task design in developer password studies: Exploring a student sample
A Naiakshina, A Danilova, C Tiefenau, M Smith
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 297-313, 2018
732018
Security, availability, and multiple information sources: Exploring update behavior of system administrators
C Tiefenau, M Häring, K Krombholz, E Von Zezschwitz
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 239-258, 2020
452020
A usability evaluation of Let's Encrypt and Certbot: usable security done right
C Tiefenau, E von Zezschwitz, M Häring, K Krombholz, M Smith
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
422019
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the {Corona-Warn-App} in Germany
M Häring, E Gerlitz, C Tiefenau, M Smith, D Wermke, S Fahl, Y Acar
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 77-98, 2021
162021
Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?
C Tiefenau, M Häring, E Gerlitz, E von Zezschwitz
arXiv preprint arXiv:1911.07701, 2019
92019
Please enter your PIN
C Tiefenau, M Häring, M Khamis, E von Zezschwitz
On the risk of bypass attacks on biometric authentication on mobile devices, 2019
62019
What does this update do to my systems?–an analysis of the importance of update-related information to system administrators
F Martius, C Tiefenau
Workshop on Security Information Workers, WSIW 20, 1-12, 2020
52020
" Please enter your PIN"--On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices
C Tiefenau, M Häring, M Khamis, E von Zezschwitz
arXiv preprint arXiv:1911.07692, 2019
42019
Adventures in recovery land: Testing the account recovery of popular websites when the second factor is lost
E Gerlitz, M Häring, CT Mädler, M Smith, C Tiefenau
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 227-243, 2023
32023
Evolution of password expiry in companies: measuring the adoption of recommendations by the german federal office for information security
E Gerlitz, M Häring, M Smith, C Tiefenau
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 191-210, 2023
22023
Towards Understanding User Interaction in Future Smart Homes
S Prange, C Tiefenau, E von Zezschwitz, F Alt
Proceedings of CHI’19 Workshop on New Directions for the IoT: Automate …, 2019
22019
Less About Privacy: Revisiting a Survey about the German COVID-19 Contact Tracing App
M Häring, E Gerlitz, M Smith, C Tiefenau
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023
12023
{SoK}: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact,{Chi-Squared},{McNemar's}, Wilcoxon {Rank-Sum}, Wilcoxon {Signed-Rank} and t-tests in {Developer …
AM Ortloff, C Tiefenau, M Smith
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 341-359, 2023
12023
Replicating a study of ransomware in Germany
AM Ortloff, M Vossen, C Tiefenau
Proceedings of the 2021 European Symposium on Usable Security, 151-164, 2021
12021
Behavioral Studies with IT-Administrators-Updating in Complex Environments and Securing Web Servers
C Tiefenau
Universitäts-und Landesbibliothek Bonn, 2021
2021
The Struggle is Real: Analyzing Ground Truth Data of TLS (Mis-) Configurations
C Tiefenau, E von Zezschwitz
arXiv preprint arXiv:1809.08817, 2018
2018
Folk and Expert Mental Models of Security and Privacy
W Altaf, C Tiefenau
The system can't perform the operation now. Try again later.
Articles 1–18