Marian Harbach
TitleCited byYear
Why Eve and Mallory love Android: An analysis of Android SSL (in) security
S Fahl, M Harbach, T Muders, L Baumgärtner, B Freisleben, M Smith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5092012
It’sa hard lock life: A field study of smartphone (un) locking behavior and risk perception
M Harbach, E Von Zezschwitz, A Fichtner, A De Luca, M Smith
10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 213-230, 2014
2232014
Rethinking SSL development in an appified world
S Fahl, M Harbach, H Perl, M Koetter, M Smith
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1422013
Using personal examples to improve risk communication for security & privacy decisions
M Harbach, M Hettig, S Weber, M Smith
Proceedings of the SIGCHI conference on human factors in computing systems …, 2014
1292014
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers
A De Luca, M Harbach, E von Zezschwitz, ME Maurer, BE Slawik, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1002014
On the ecological validity of a password study
S Fahl, M Harbach, Y Acar, M Smith
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013
962013
The anatomy of smartphone unlocking: A field study of android lock screens
M Harbach, A De Luca, S Egelman
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
812016
Helping Johnny 2.0 to encrypt his Facebook conversations
S Fahl, M Harbach, T Muders, M Smith, U Sander
Proceedings of the Eighth Symposium on Usable Privacy and Security, 1-17, 2012
652012
Confidentiality as a Service--Usable Security for the Cloud
S Fahl, M Harbach, T Muders, M Smith
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
572012
Do or do not, there is no try: user engagement may not improve security outcomes
A Forget, S Pearman, J Thomas, A Acquisti, N Christin, LF Cranor, ...
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 97-111, 2016
502016
Behavior ever follows intention? A validation of the Security Behavior Intentions Scale (SeBIS)
S Egelman, M Harbach, E Peer
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
462016
Hey, you, get off of my clipboard
S Fahl, M Harbach, M Oltrogge, T Muders, M Smith
International Conference on Financial Cryptography and Data Security, 144-161, 2013
462013
On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards
M Harbach, S Fahl, M Rieger, M Smith
International Symposium on Privacy Enhancing Technologies Symposium, 245-264, 2013
342013
Sorry, I don’t get it: An analysis of warning message texts
M Harbach, S Fahl, P Yakovleva, M Smith
International Conference on Financial Cryptography and Data Security, 94-111, 2013
322013
Keep on lockin'in the free world: A multi-national comparison of smartphone locking
M Harbach, A De Luca, N Malkin, S Egelman
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
292016
Addressing physical safety, security, and privacy for people with visual impairments
T Ahmed, P Shaffer, K Connelly, D Crandall, A Kapadia
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 341-354, 2016
232016
Who's afraid of which bad wolf? A survey of IT security risk awareness
M Harbach, S Fahl, M Smith
2014 IEEE 27th Computer Security Foundations Symposium, 97-110, 2014
192014
Open mobile miner: a toolkit for mobile data stream mining
S Krishnaswamy, M Gaber, M Harbach, C Hugues, A Sinha, B Gillick, ...
ACM KDD’09, 2009
182009
A streaming intrusion detection system for grid computing environments
M Smith, F Schwarzer, M Harbach, T Noll, B Freisleben
2009 11th IEEE International Conference on High Performance Computing and …, 2009
182009
Visualizing risk by example: demonstrating threats arising from android apps
M Hettig, E Kiss, JF Kassel, S Weber, M Harbach, M Smith
Symposium on Usable Privacy and Security (SOUPS), 2013
142013
The system can't perform the operation now. Try again later.
Articles 1–20