direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Page Content

There is no English translation for this web page.

Publications

next >> [3]

2017

Möller, S., Hirsch, T., Kirschnick, N., Sieger, H. and Meyer, J. (2017). Nutzerzentriertes Security & Privacy Engineering mittels Verhaltenssimulationen [7]. Deutsche Telekom Laboratories, 1–5.

Link to publication [8]

2013

Kirschnick, N., Sieger, H. and Möller, S. (2013). Influencing factors on the overall rating of security-relevant applications [9]. British HCI Human Aspects in Mobile Apps Engineering Workshop (HAMAE 2013)

Link to publication [10]

2012

Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J. and Möller, S. (2012). Poster: On the Need for Different Security Methods on Mobile Phones [11]. 2012 Symposium On Usable Privacy and Security (SOUPS 2012). ACM.

Link to publication [12]

Kirschnick, N., Müller, B. and Möller, S. (2012). Poster: Usability Evaluation of Gesture-based Authentication Using an iPhone [13]. 2012 Symposium On Usable Privacy and Security (SOUPS 2012). ACM.


Sieger, H., Kirschnick, N. and Möller, S. (2012). Poster: User perception of usability and security of a mobile payment system [14]. 2012 Symposium On Usable Privacy and Security (SOUPS 2012). ACM.

Link to publication [15]

Möller, S., Engelbrecht, K.-P., Hirsch, T., Kirschnick, N. and Sieger, H. (2012). Usable Security and Privacy [16]. Invited Talk, Berliner Kolloquium für Sicherheitsforschung


Möller, S., Engelbrecht, K.-P., Hirsch, T., Kirschnick, N., Sieger, H. and Westermann, T. (2012). Quantified Self in HCI: Models and Implications [17]. Invited Talk, Symposium „Digitale Selbstvermessung. Leben nach Maß?``, Third Wave und Hybrid Plattform


Kirschnick, N., Müller, B. and Möller, S. (2012). Poster: Usability evaluation of Gesture-based Authentication using an iPhone [18]. Eighth Symposium on Usable Privacy and Security (SOUPS 2012). ACM, 1–4.

Link to publication [19]

2011

Kirschnick, N., Kratz, S. and Möller, S. (2011). Poster: Usability of Gesture-based Authentication [20]. 2011 Symposium On Usable Privacy and Security (SOUPS 2011)

Link to publication [21]

Sieger, H., Kirschnick, N. and Möller, S. (2011). Towards a User Behavior Model in Computer Security [22]. 2011 Symposium On Usable Privacy and Security (SOUPS 2011)

Link to publication [23]

Kirschnick, N., Sieger, H. and Möller (2011). mWallet Acceptance. Experiment and Analysis [24].

Link to publication [25]

Kirschnick, N., Sieger, H. and Möller, S. (2011). mWallet Acceptance Design Guidelines [26].

Link to publication [27]

Möller, S., Hirsch, T., Kirschnick, N., Sieger, H. and Meyer, J. (2011). Nutzerzentriertes Security & Privacy Engineering mittels Verhaltenssimulationen [28]. Security for Society: Berlin Views. Springer, 6.

Link to publication [29]

Möller, S., Hirsch, T., Kirschnick, N., Sieger, H. and Meyer, J. (2011). Nutzerzentriertes Security & Privacy Engineering mittels Verhaltenssimulationen [30]. Security for Society: Berlin Views J. Krüger, J.-P. Seifert, L. Hempel, eds. Springer, DE-Berlin, 6.


Ben-Asher, N., Ben-Oved, A., Meyer, J., Sieger, H., Kirschnick, N. and Möller, S. (2011). On the Need for Different Security Methods on Mobile Phones [31]. MobileHCI 2011. ACM, 465–473.

Link to publication [32]

next >> [35]
------ Links: ------

Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe

Auxiliary Functions

Copyright TU Berlin 2008